Loading ...

Play interactive tourEdit tour

Analysis Report gg_2.gif.dll

Overview

General Information

Sample Name:gg_2.gif.dll
Analysis ID:382547
MD5:93b67d2be7ea4060f946c196af2b9f38
SHA1:ef7c7c2fbf1cd70b83811ce794509f4eb14bf370
SHA256:2817053b604f2d5f62400afd737d9124c87cc388f76aa10e5cc2db867a31c5dd
Tags:dllGGGoziISFBUrsnif
Infos:

Most interesting Screenshot:

Detection

Ursnif
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Ursnif
Yara detected Ursnif
Machine Learning detection for sample
Writes or reads registry keys via WMI
Writes registry values via WMI
Antivirus or Machine Learning detection for unpacked file
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 3544 cmdline: loaddll32.exe 'C:\Users\user\Desktop\gg_2.gif.dll' MD5: 542795ADF7CC08EFCF675D65310596E8)
    • cmd.exe (PID: 5424 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\gg_2.gif.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 5408 cmdline: rundll32.exe 'C:\Users\user\Desktop\gg_2.gif.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5420 cmdline: rundll32.exe C:\Users\user\Desktop\gg_2.gif.dll,StartService MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • iexplore.exe (PID: 6788 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6840 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6788 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • iexplore.exe (PID: 7144 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6000 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:7144 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
    • iexplore.exe (PID: 5220 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:7144 CREDAT:82952 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • iexplore.exe (PID: 900 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 4280 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:900 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

Threatname: Ursnif

[[{"RSA Public Key": "Om1HeBhXBR6NHvmWFG5B2kyl5mdcRMsb8ux2uo9VgGW0O2LzHZKk3w9bxw9stgphU0ayytcOYkK6GCNJlKSeMTZJ5WPgZiX+MaXiUccStEUTXkW1ubp0gdr16sb5U4M+rzWWPvc3s7bj9o1yqSJtP7PmMVp7E+3llLULQ9/DZbAD7SXaft6wcY8wFjSkI+8D"}, {"c2_domain": ["bing.com", "update4.microsoft.com", "under17.com", "urs-world.com"], "botnet": "5566", "server": "12", "serpent_key": "10301029JSJUYDWG", "sleep_time": "10", "SetWaitableTimer_value": "0", "DGA_count": "10"}]]

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000003.334082249.000000000317B000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000000.00000003.334133428.000000000317B000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000000.00000002.492240511.0000000000BD0000.00000004.00000001.sdmpJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
        00000002.00000002.260825998.0000000001060000.00000004.00000001.sdmpJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
          00000003.00000003.321638626.0000000005A78000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 17 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.loaddll32.exe.10000000.4.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
              3.2.rundll32.exe.10000000.5.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                3.2.rundll32.exe.1330000.1.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                  0.2.loaddll32.exe.bd0000.0.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                    2.2.rundll32.exe.1060000.1.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 2.2.rundll32.exe.1060000.1.raw.unpackMalware Configuration Extractor: Ursnif [[{"RSA Public Key": "Om1HeBhXBR6NHvmWFG5B2kyl5mdcRMsb8ux2uo9VgGW0O2LzHZKk3w9bxw9stgphU0ayytcOYkK6GCNJlKSeMTZJ5WPgZiX+MaXiUccStEUTXkW1ubp0gdr16sb5U4M+rzWWPvc3s7bj9o1yqSJtP7PmMVp7E+3llLULQ9/DZbAD7SXaft6wcY8wFjSkI+8D"}, {"c2_domain": ["bing.com", "update4.microsoft.com", "under17.com", "urs-world.com"], "botnet": "5566", "server": "12", "serpent_key": "10301029JSJUYDWG", "sleep_time": "10", "SetWaitableTimer_value": "0", "DGA_count": "10"}]]
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: gg_2.gif.dllReversingLabs: Detection: 52%
                      Machine Learning detection for sampleShow sources
                      Source: gg_2.gif.dllJoe Sandbox ML: detected
                      Source: 0.2.loaddll32.exe.10000000.4.unpackAvira: Label: TR/Crypt.XPACK.Gen8
                      Source: 3.2.rundll32.exe.10000000.5.unpackAvira: Label: TR/Crypt.XPACK.Gen8
                      Source: gg_2.gif.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_026712D4 RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,FindCloseChangeNotification,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_034412D4 RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,FindCloseChangeNotification,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
                      Source: Joe Sandbox ViewIP Address: 185.243.114.196 185.243.114.196
                      Source: Joe Sandbox ViewIP Address: 185.186.244.95 185.186.244.95
                      Source: Joe Sandbox ViewASN Name: ACCELERATED-ITDE ACCELERATED-ITDE
                      Source: Joe Sandbox ViewASN Name: WEBZILLANL WEBZILLANL
                      Source: global trafficTCP traffic: 192.168.2.7:49730 -> 185.243.114.196:80
                      Source: global trafficTCP traffic: 192.168.2.7:49756 -> 185.186.244.95:80
                      Source: unknownDNS traffic detected: queries for: login.microsoftonline.com
                      Source: GiGr-rA9TBhE2c3LJn7PvDweiOo.gz[1].js0.13.drString found in binary or memory: http://feross.org
                      Source: rundll32.exe, 00000003.00000003.443272606.000000000352B000.00000004.00000001.sdmpString found in binary or memory: http://under17.com
                      Source: {4554B9A3-96F7-11EB-90E6-ECF4BB82F7E0}.dat.25.drString found in binary or memory: http://under17.com/joomla/7oXts9AORFsG5/i189ZNd4/wxa5zyBcqStFNvDeNtF1KxB/E9musqCc5L/b_2FSJrdUWwLXBbJ
                      Source: {4D761D34-96F7-11EB-90E6-ECF4BB82F7E0}.dat.25.drString found in binary or memory: http://under17.com/joomla/YJmZr0WJXI7/eZbfNM7hm_2BBw/atfJcuVF_2B5yHpeRoV9f/p4iYAB3akKupopXr/3YLvELEn
                      Source: loaddll32.exe, 00000000.00000002.492271076.0000000000BFB000.00000004.00000020.sdmpString found in binary or memory: http://urs-world.com
                      Source: loaddll32.exe, 00000000.00000002.492271076.0000000000BFB000.00000004.00000020.sdmpString found in binary or memory: http://urs-world.com/joomla/ych84zDRIp_2FF7IaYN0/GQoKhDOBhANEIsf1GP9/YE&
                      Source: {5B8FC2C2-96F7-11EB-90E6-ECF4BB82F7E0}.dat.38.drString found in binary or memory: http://urs-world.com/joomla/ych84zDRIp_2FF7IaYN0/GQoKhDOBhANEIsf1GP9/YEQ6PJZPGUhJ_2BK96Ghup/vPTPDIHk
                      Source: {297C5619-96F7-11EB-90E6-ECF4BB82F7E0}.dat.12.drString found in binary or memory: https://login.microsoftonline.com/common/oauth2/authorize?client_id=9ea1ad79-fdb6-4f9a-8bc3-2b70f96e
                      Source: authorize[1].htm.13.drString found in binary or memory: https://login.microsoftonline.com/error?code=50058
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/finanzen/top-stories/datenleck-bei-facebook-wachstum-z
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/finanzen/top-stories/janet-yellen-us-finanzministerin-fordert-weltweite-mi
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/finanzen/top-stories/staatliche-regulierung-allianz-gegen-big-tech-druck-a
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/nachrichten/international/admirale-begehren-auf-gegen-das-verr
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/nachrichten/international/alexej-nawalny-klagt-
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/nachrichten/international/es-h
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/nachrichten/international/so-tickt-kosovos-neue-staatspr
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/nachrichten/international/ukrainekonflikt-maas-warnt-russland-und-ukraine-
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/nachrichten/other/karl-lauterbach-der-blitzableiter-der-republik/ar-BB1fiI
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/nachrichten/politik/coronakrise-laschet-fordert-harten-br
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/nachrichten/politik/das-alles-h
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/nachrichten/politik/fdp-nur-keine-option-von-vornherein-ausschlie
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/nachrichten/politik/l
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/nachrichten/politik/manfred-weber-nennt-eu-beitritt-der-t
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/nachrichten/vermischtes/die-altersheime-hat-man-vergessen/ar-BB1fkRPW?ocid
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/nachrichten/vermischtes/nachtleben-in-israel-eine-nacht-wie-fr
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/news/other/abdullah-sollte-von-erdogan-lernen/ar-BB1fktw7?ocid=BingHPC
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/news/other/das-grosse-impfen-beginnt-geht-es-nun-endlich-vorw
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/news/other/pentagon-usa-beobachten-russlands-aktivit
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/news/other/polizei-sucht-mit-superpuma-nach-vermissten-minderj
                      Source: msnpopularnow[1].json.13.drString found in binary or memory: https://www.msn.com/de-ch/news/other/ressourcen-f

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000002.492240511.0000000000BD0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.260825998.0000000001060000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.492614087.0000000001330000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.loaddll32.exe.10000000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.10000000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.1330000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.bd0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.1060000.1.raw.unpack, type: UNPACKEDPE
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.334082249.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334133428.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321638626.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321709185.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334122359.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321582588.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321610032.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321662691.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.494742479.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321684389.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.480594234.0000000002F7F000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334100411.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321545910.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334161617.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334180863.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.415230609.000000000307D000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321698074.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5408, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 3544, type: MEMORY
                      Source: loaddll32.exe, 00000000.00000002.492271076.0000000000BFB000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                      E-Banking Fraud:

                      barindex
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000002.492240511.0000000000BD0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.260825998.0000000001060000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.492614087.0000000001330000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.loaddll32.exe.10000000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.10000000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.1330000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.bd0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.1060000.1.raw.unpack, type: UNPACKEDPE
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.334082249.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334133428.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321638626.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321709185.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334122359.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321582588.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321610032.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321662691.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.494742479.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321684389.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.480594234.0000000002F7F000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334100411.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321545910.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334161617.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334180863.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.415230609.000000000307D000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321698074.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5408, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 3544, type: MEMORY

                      System Summary:

                      barindex
                      Writes or reads registry keys via WMIShow sources
                      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
                      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                      Writes registry values via WMIShow sources
                      Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                      Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                      Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10001D9F NtMapViewOfSection,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10001EB5 GetProcAddress,NtCreateSection,memset,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10002375 NtQueryVirtualMemory,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_026783B7 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0267B341 NtQueryVirtualMemory,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_034483B7 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0344B341 NtQueryVirtualMemory,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259348F
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02594859
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259554B
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259237B
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259247B
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02591374
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02595C76
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259596E
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02591918
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02593314
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02591000
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02596424
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02593BDB
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02595AF6
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_025928EB
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_025952EC
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_025920EE
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02591B95
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02593A85
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02593FA8
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10002154
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02674094
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0267B11C
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_026797F2
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D348F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D6424
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D1000
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D1918
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D3314
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D596E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D247B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D1374
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D5C76
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D554B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D4859
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D3FA8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D238F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D3A85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D1B95
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D52EC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D20EE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D28EB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D5AF6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D3BDB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0339348F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03396424
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03391918
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03393314
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03391000
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0339237B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0339247B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03391374
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03395C76
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0339596E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03394859
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0339554B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03393FA8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03391B95
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03393A85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03395AF6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_033928EB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_033952EC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_033920EE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03393BDB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0344B11C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_034497F2
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03444094
                      Source: gg_2.gif.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: classification engineClassification label: mal84.troj.winDLL@18/119@10/2
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0267757F CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
                      Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{297C5617-96F7-11EB-90E6-ECF4BB82F7E0}.datJump to behavior
                      Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user~1\AppData\Local\Temp\~DF9F23A32DA34B18FB.TMPJump to behavior
                      Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\gg_2.gif.dll,StartService
                      Source: gg_2.gif.dllReversingLabs: Detection: 52%
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\gg_2.gif.dll'
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\gg_2.gif.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\gg_2.gif.dll,StartService
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\gg_2.gif.dll',#1
                      Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6788 CREDAT:17410 /prefetch:2
                      Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:7144 CREDAT:17410 /prefetch:2
                      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:7144 CREDAT:82952 /prefetch:2
                      Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:900 CREDAT:17410 /prefetch:2
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\gg_2.gif.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\gg_2.gif.dll,StartService
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\gg_2.gif.dll',#1
                      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6788 CREDAT:17410 /prefetch:2
                      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:7144 CREDAT:17410 /prefetch:2
                      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:7144 CREDAT:82952 /prefetch:2
                      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:900 CREDAT:17410 /prefetch:2
                      Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10001745 LoadLibraryA,GetProcAddress,
                      Source: gg_2.gif.dllStatic PE information: section name: .code
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02596194 push eax; mov dword ptr [esp], 00000004h
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02596194 push esi; mov dword ptr [esp], 00001000h
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02596194 push 00000000h; mov dword ptr [esp], ebp
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259348F push dword ptr [ebp-10h]; mov dword ptr [esp], ecx
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259348F push dword ptr [ebp-0Ch]; mov dword ptr [esp], ecx
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259348F push 00000000h; mov dword ptr [esp], edx
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259348F push edx; mov dword ptr [esp], 00000002h
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259348F push 00000000h; mov dword ptr [esp], ecx
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02594859 push dword ptr [ebp-08h]; mov dword ptr [esp], edi
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02594859 push dword ptr [ebp-10h]; mov dword ptr [esp], edx
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02594859 push 00000000h; mov dword ptr [esp], ecx
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02594859 push dword ptr [ebp-10h]; mov dword ptr [esp], edi
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02594859 push dword ptr [ebp-0Ch]; mov dword ptr [esp], ecx
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02594859 push 00000000h; mov dword ptr [esp], ebp
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02594859 push ebx; mov dword ptr [esp], 00000001h
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02594859 push dword ptr [ebp-0Ch]; mov dword ptr [esp], eax
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02594859 push 00000000h; mov dword ptr [esp], edx
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02594859 push dword ptr [ebp-08h]; mov dword ptr [esp], edi
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02594859 push 00000000h; mov dword ptr [esp], edx
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02594859 push 00000000h; mov dword ptr [esp], ecx
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259237B push 00000000h; mov dword ptr [esp], edi
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259237B push 00000000h; mov dword ptr [esp], ecx
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259237B push dword ptr [ebp-10h]; mov dword ptr [esp], ecx
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259237B push dword ptr [ebp-10h]; mov dword ptr [esp], esi
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259237B push edi; mov dword ptr [esp], 00000004h
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259247B push 00000000h; mov dword ptr [esp], eax
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259247B push 00000000h; mov dword ptr [esp], edi
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259247B push 00000000h; mov dword ptr [esp], ecx
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259247B push dword ptr [ebp-10h]; mov dword ptr [esp], ecx
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259247B push dword ptr [ebp-10h]; mov dword ptr [esp], esi
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0259247B push edi; mov dword ptr [esp], 00000004h

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000002.492240511.0000000000BD0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.260825998.0000000001060000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.492614087.0000000001330000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.loaddll32.exe.10000000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.10000000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.1330000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.bd0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.1060000.1.raw.unpack, type: UNPACKEDPE
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.334082249.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334133428.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321638626.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321709185.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334122359.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321582588.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321610032.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321662691.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.494742479.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321684389.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.480594234.0000000002F7F000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334100411.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321545910.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334161617.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334180863.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.415230609.000000000307D000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321698074.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5408, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 3544, type: MEMORY
                      Source: C:\Windows\System32\loaddll32.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
                      Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_026712D4 RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,FindCloseChangeNotification,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_034412D4 RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,FindCloseChangeNotification,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10001745 LoadLibraryA,GetProcAddress,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02592DF5 or edx, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_012D2DF5 or edx, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03392DF5 or edx, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\gg_2.gif.dll',#1
                      Source: loaddll32.exe, 00000000.00000002.492800855.0000000001180000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.494160905.0000000003970000.00000002.00000001.sdmpBinary or memory string: uProgram Manager
                      Source: loaddll32.exe, 00000000.00000002.492800855.0000000001180000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.494160905.0000000003970000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: loaddll32.exe, 00000000.00000002.492800855.0000000001180000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.494160905.0000000003970000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: loaddll32.exe, 00000000.00000002.492800855.0000000001180000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.494160905.0000000003970000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0267269C cpuid
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_1000102F GetSystemTimeAsFileTime,_aulldiv,_snwprintf,CreateFileMappingW,GetLastError,GetLastError,MapViewOfFile,GetLastError,CloseHandle,GetLastError,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0267269C RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10001850 CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000002.492240511.0000000000BD0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.260825998.0000000001060000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.492614087.0000000001330000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.loaddll32.exe.10000000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.10000000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.1330000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.bd0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.1060000.1.raw.unpack, type: UNPACKEDPE
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.334082249.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334133428.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321638626.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321709185.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334122359.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321582588.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321610032.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321662691.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.494742479.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321684389.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.480594234.0000000002F7F000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334100411.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321545910.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334161617.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334180863.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.415230609.000000000307D000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321698074.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5408, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 3544, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000002.492240511.0000000000BD0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.260825998.0000000001060000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.492614087.0000000001330000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.loaddll32.exe.10000000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.10000000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.1330000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.bd0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.1060000.1.raw.unpack, type: UNPACKEDPE
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.334082249.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334133428.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321638626.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321709185.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334122359.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321582588.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321610032.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321662691.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.494742479.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321684389.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.480594234.0000000002F7F000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334100411.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321545910.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334161617.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.334180863.000000000317B000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.415230609.000000000307D000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.321698074.0000000005A78000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5408, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 3544, type: MEMORY

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation2Path InterceptionProcess Injection12Masquerading1Input Capture1System Time Discovery1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsNative API1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemoryQuery Registry1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Rundll321NTDSAccount Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing1LSA SecretsSystem Owner/User Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsFile and Directory Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery13Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 382547 Sample: gg_2.gif.dll Startdate: 06/04/2021 Architecture: WINDOWS Score: 84 33 urs-world.com 2->33 35 prda.aadg.msidentity.com 2->35 37 2 other IPs or domains 2->37 51 Found malware configuration 2->51 53 Multi AV Scanner detection for submitted file 2->53 55 Yara detected  Ursnif 2->55 57 2 other signatures 2->57 8 loaddll32.exe 1 2->8         started        11 iexplore.exe 1 53 2->11         started        13 iexplore.exe 1 50 2->13         started        15 iexplore.exe 1 51 2->15         started        signatures3 process4 signatures5 59 Writes or reads registry keys via WMI 8->59 61 Writes registry values via WMI 8->61 17 rundll32.exe 8->17         started        20 cmd.exe 1 8->20         started        22 iexplore.exe 31 11->22         started        25 iexplore.exe 32 11->25         started        27 iexplore.exe 31 13->27         started        29 iexplore.exe 163 15->29         started        process6 dnsIp7 49 Writes registry values via WMI 17->49 31 rundll32.exe 20->31         started        39 under17.com 185.243.114.196, 80 ACCELERATED-ITDE Netherlands 22->39 41 urs-world.com 185.186.244.95, 80 WEBZILLANL Netherlands 27->41 43 prda.aadg.msidentity.com 29->43 45 login.microsoftonline.com 29->45 47 a.privatelink.msidentity.com 29->47 signatures8 process9

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      gg_2.gif.dll52%ReversingLabsWin32.Trojan.Sdum
                      gg_2.gif.dll100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      3.2.rundll32.exe.3440000.3.unpack100%AviraHEUR/AGEN.1108168Download File
                      0.2.loaddll32.exe.2670000.2.unpack100%AviraHEUR/AGEN.1108168Download File
                      0.2.loaddll32.exe.10000000.4.unpack100%AviraTR/Crypt.XPACK.Gen8Download File
                      3.2.rundll32.exe.10000000.5.unpack100%AviraTR/Crypt.XPACK.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://urs-world.com0%Avira URL Cloudsafe
                      http://under17.com0%Avira URL Cloudsafe
                      http://urs-world.com/joomla/ych84zDRIp_2FF7IaYN0/GQoKhDOBhANEIsf1GP9/YE&0%Avira URL Cloudsafe
                      http://under17.com/joomla/7oXts9AORFsG5/i189ZNd4/wxa5zyBcqStFNvDeNtF1KxB/E9musqCc5L/b_2FSJrdUWwLXBbJ0%Avira URL Cloudsafe
                      http://under17.com/joomla/YJmZr0WJXI7/eZbfNM7hm_2BBw/atfJcuVF_2B5yHpeRoV9f/p4iYAB3akKupopXr/3YLvELEn0%Avira URL Cloudsafe
                      http://urs-world.com/joomla/ych84zDRIp_2FF7IaYN0/GQoKhDOBhANEIsf1GP9/YEQ6PJZPGUhJ_2BK96Ghup/vPTPDIHk0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      urs-world.com
                      185.186.244.95
                      truetrue
                        unknown
                        under17.com
                        185.243.114.196
                        truetrue
                          unknown
                          login.microsoftonline.com
                          unknown
                          unknownfalse
                            high

                            URLs from Memory and Binaries

                            NameSourceMaliciousAntivirus DetectionReputation
                            https://www.msn.com/de-ch/nachrichten/politik/lmsnpopularnow[1].json.13.drfalse
                              high
                              https://www.msn.com/de-ch/news/other/das-grosse-impfen-beginnt-geht-es-nun-endlich-vorwmsnpopularnow[1].json.13.drfalse
                                high
                                https://www.msn.com/de-ch/finanzen/top-stories/janet-yellen-us-finanzministerin-fordert-weltweite-mimsnpopularnow[1].json.13.drfalse
                                  high
                                  https://www.msn.com/de-ch/nachrichten/international/so-tickt-kosovos-neue-staatsprmsnpopularnow[1].json.13.drfalse
                                    high
                                    https://www.msn.com/de-ch/nachrichten/international/es-hmsnpopularnow[1].json.13.drfalse
                                      high
                                      https://www.msn.com/de-ch/news/other/abdullah-sollte-von-erdogan-lernen/ar-BB1fktw7?ocid=BingHPCmsnpopularnow[1].json.13.drfalse
                                        high
                                        https://www.msn.com/de-ch/nachrichten/vermischtes/die-altersheime-hat-man-vergessen/ar-BB1fkRPW?ocidmsnpopularnow[1].json.13.drfalse
                                          high
                                          https://www.msn.com/de-ch/nachrichten/politik/das-alles-hmsnpopularnow[1].json.13.drfalse
                                            high
                                            https://www.msn.com/de-ch/nachrichten/vermischtes/nachtleben-in-israel-eine-nacht-wie-frmsnpopularnow[1].json.13.drfalse
                                              high
                                              http://urs-world.comloaddll32.exe, 00000000.00000002.492271076.0000000000BFB000.00000004.00000020.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://www.msn.com/de-ch/nachrichten/international/alexej-nawalny-klagt-msnpopularnow[1].json.13.drfalse
                                                high
                                                https://www.msn.com/de-ch/nachrichten/politik/manfred-weber-nennt-eu-beitritt-der-tmsnpopularnow[1].json.13.drfalse
                                                  high
                                                  http://under17.comrundll32.exe, 00000003.00000003.443272606.000000000352B000.00000004.00000001.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://urs-world.com/joomla/ych84zDRIp_2FF7IaYN0/GQoKhDOBhANEIsf1GP9/YE&loaddll32.exe, 00000000.00000002.492271076.0000000000BFB000.00000004.00000020.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://www.msn.com/de-ch/nachrichten/politik/coronakrise-laschet-fordert-harten-brmsnpopularnow[1].json.13.drfalse
                                                    high
                                                    https://login.microsoftonline.com/error?code=50058authorize[1].htm.13.drfalse
                                                      high
                                                      https://www.msn.com/de-ch/news/other/polizei-sucht-mit-superpuma-nach-vermissten-minderjmsnpopularnow[1].json.13.drfalse
                                                        high
                                                        https://www.msn.com/de-ch/nachrichten/other/karl-lauterbach-der-blitzableiter-der-republik/ar-BB1fiImsnpopularnow[1].json.13.drfalse
                                                          high
                                                          https://www.msn.com/de-ch/finanzen/top-stories/staatliche-regulierung-allianz-gegen-big-tech-druck-amsnpopularnow[1].json.13.drfalse
                                                            high
                                                            https://www.msn.com/de-ch/nachrichten/politik/fdp-nur-keine-option-von-vornherein-ausschliemsnpopularnow[1].json.13.drfalse
                                                              high
                                                              https://login.microsoftonline.com/common/oauth2/authorize?client_id=9ea1ad79-fdb6-4f9a-8bc3-2b70f96e{297C5619-96F7-11EB-90E6-ECF4BB82F7E0}.dat.12.drfalse
                                                                high
                                                                https://www.msn.com/de-ch/nachrichten/international/ukrainekonflikt-maas-warnt-russland-und-ukraine-msnpopularnow[1].json.13.drfalse
                                                                  high
                                                                  https://www.msn.com/de-ch/nachrichten/international/admirale-begehren-auf-gegen-das-verrmsnpopularnow[1].json.13.drfalse
                                                                    high
                                                                    https://www.msn.com/de-ch/news/other/ressourcen-fmsnpopularnow[1].json.13.drfalse
                                                                      high
                                                                      https://www.msn.com/de-ch/finanzen/top-stories/datenleck-bei-facebook-wachstum-zmsnpopularnow[1].json.13.drfalse
                                                                        high
                                                                        http://under17.com/joomla/7oXts9AORFsG5/i189ZNd4/wxa5zyBcqStFNvDeNtF1KxB/E9musqCc5L/b_2FSJrdUWwLXBbJ{4554B9A3-96F7-11EB-90E6-ECF4BB82F7E0}.dat.25.drfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://www.msn.com/de-ch/news/other/pentagon-usa-beobachten-russlands-aktivitmsnpopularnow[1].json.13.drfalse
                                                                          high
                                                                          http://feross.orgGiGr-rA9TBhE2c3LJn7PvDweiOo.gz[1].js0.13.drfalse
                                                                            high
                                                                            http://under17.com/joomla/YJmZr0WJXI7/eZbfNM7hm_2BBw/atfJcuVF_2B5yHpeRoV9f/p4iYAB3akKupopXr/3YLvELEn{4D761D34-96F7-11EB-90E6-ECF4BB82F7E0}.dat.25.drfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            http://urs-world.com/joomla/ych84zDRIp_2FF7IaYN0/GQoKhDOBhANEIsf1GP9/YEQ6PJZPGUhJ_2BK96Ghup/vPTPDIHk{5B8FC2C2-96F7-11EB-90E6-ECF4BB82F7E0}.dat.38.drfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown

                                                                            Contacted IPs

                                                                            • No. of IPs < 25%
                                                                            • 25% < No. of IPs < 50%
                                                                            • 50% < No. of IPs < 75%
                                                                            • 75% < No. of IPs

                                                                            Public

                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                            185.243.114.196
                                                                            under17.comNetherlands
                                                                            31400ACCELERATED-ITDEtrue
                                                                            185.186.244.95
                                                                            urs-world.comNetherlands
                                                                            35415WEBZILLANLtrue

                                                                            General Information

                                                                            Joe Sandbox Version:31.0.0 Emerald
                                                                            Analysis ID:382547
                                                                            Start date:06.04.2021
                                                                            Start time:09:41:51
                                                                            Joe Sandbox Product:CloudBasic
                                                                            Overall analysis duration:0h 10m 48s
                                                                            Hypervisor based Inspection enabled:false
                                                                            Report type:light
                                                                            Sample file name:gg_2.gif.dll
                                                                            Cookbook file name:default.jbs
                                                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                            Number of analysed new started processes analysed:40
                                                                            Number of new started drivers analysed:0
                                                                            Number of existing processes analysed:0
                                                                            Number of existing drivers analysed:0
                                                                            Number of injected processes analysed:0
                                                                            Technologies:
                                                                            • HCA enabled
                                                                            • EGA enabled
                                                                            • HDC enabled
                                                                            • AMSI enabled
                                                                            Analysis Mode:default
                                                                            Analysis stop reason:Timeout
                                                                            Detection:MAL
                                                                            Classification:mal84.troj.winDLL@18/119@10/2
                                                                            EGA Information:Failed
                                                                            HDC Information:
                                                                            • Successful, ratio: 54.3% (good quality ratio 51.8%)
                                                                            • Quality average: 79.9%
                                                                            • Quality standard deviation: 28.3%
                                                                            HCA Information:
                                                                            • Successful, ratio: 86%
                                                                            • Number of executed functions: 0
                                                                            • Number of non-executed functions: 0
                                                                            Cookbook Comments:
                                                                            • Adjust boot time
                                                                            • Enable AMSI
                                                                            • Found application associated with file extension: .dll
                                                                            Warnings:
                                                                            Show All
                                                                            • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                                                            • Created / dropped Files have been reduced to 100
                                                                            • Excluded IPs from analysis (whitelisted): 168.61.161.212, 104.42.151.234, 92.122.145.220, 13.88.21.125, 184.30.20.56, 40.88.32.150, 88.221.62.148, 13.107.21.200, 204.79.197.200, 40.126.31.136, 40.126.31.3, 40.126.31.142, 20.190.159.133, 40.126.31.2, 40.126.31.9, 20.190.159.135, 40.126.31.5, 20.190.160.9, 20.190.160.7, 20.190.160.72, 20.190.160.131, 20.190.160.1, 20.190.160.68, 20.190.160.5, 20.190.160.70, 131.253.33.200, 13.107.22.200, 20.50.102.62, 92.122.213.247, 92.122.213.194, 93.184.221.240, 2.20.142.210, 2.20.142.209, 152.199.19.161, 52.255.188.83, 13.64.90.137, 52.155.217.156, 20.54.26.129, 20.190.160.132, 20.190.160.73, 20.190.160.71, 20.190.160.75, 20.190.160.134, 20.190.160.2, 20.190.160.8, 20.190.160.67, 40.126.31.135, 20.190.159.132, 20.190.159.138, 40.126.31.141, 40.126.31.139, 40.126.31.143, 40.126.31.137, 40.126.31.6
                                                                            • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, www.tm.lg.prod.aadmsa.akadns.net, fs-wildcard.microsoft.com.edgekey.net, www.tm.a.prd.aadg.trafficmanager.net, e11290.dspg.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, login.live.com, audownload.windowsupdate.nsatc.net, www-bing-com.dual-a-0001.a-msedge.net, hlb.apr-52dd2-0.edgecastdns.net, watson.telemetry.microsoft.com, au-bg-shim.trafficmanager.net, www.bing.com, fs.microsoft.com, dual-a-0001.a-msedge.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, www.tm.a.prd.aadg.akadns.net, dual-a-0001.dc-msedge.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net, cs9.wpc.v0cdn.net, au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, bing.com, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, iecvlist.microsoft.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, go.microsoft.com, cs11.wpc.v0cdn.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, wu.wpc.apr-52dd2.edgecastdns.net, www2.bing.com, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, ie9comview.vo.msecnd.net, wu.ec.azureedge.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, login.msa.msidentity.com, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, www2-bing-com.dual-a-0001.a-msedge.net, go.microsoft.com.edgekey.net, skypedataprdcolwus16.cloudapp.net, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, ams2.current.a.prd.aadg.trafficmanager.net
                                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                                            • Report size getting too big, too many NtOpenKeyEx calls found.

                                                                            Simulations

                                                                            Behavior and APIs

                                                                            No simulations

                                                                            Joe Sandbox View / Context

                                                                            IPs

                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                            185.243.114.196KcFVz0y2si.dllGet hashmaliciousBrowse
                                                                              bTjvWUTLid.dllGet hashmaliciousBrowse
                                                                                KAsJ2r4XYY.dllGet hashmaliciousBrowse
                                                                                  swlsGbeQwT.dllGet hashmaliciousBrowse
                                                                                    document-1048628209.xlsGet hashmaliciousBrowse
                                                                                      document-1771131239.xlsGet hashmaliciousBrowse
                                                                                        document-1370071295.xlsGet hashmaliciousBrowse
                                                                                          document-69564892.xlsGet hashmaliciousBrowse
                                                                                            document-1320073816.xlsGet hashmaliciousBrowse
                                                                                              document-184653858.xlsGet hashmaliciousBrowse
                                                                                                document-1729033050.xlsGet hashmaliciousBrowse
                                                                                                  document-540475316.xlsGet hashmaliciousBrowse
                                                                                                    document-1456634656.xlsGet hashmaliciousBrowse
                                                                                                      document-1376447212.xlsGet hashmaliciousBrowse
                                                                                                        document-1813856412.xlsGet hashmaliciousBrowse
                                                                                                          document-1776123548.xlsGet hashmaliciousBrowse
                                                                                                            document-684762271.xlsGet hashmaliciousBrowse
                                                                                                              document-1590815978.xlsGet hashmaliciousBrowse
                                                                                                                document-66411652.xlsGet hashmaliciousBrowse
                                                                                                                  document-415601328.xlsGet hashmaliciousBrowse
                                                                                                                    185.186.244.95document-1048628209.xlsGet hashmaliciousBrowse
                                                                                                                    • urs-world.com/favicon.ico
                                                                                                                    document-1771131239.xlsGet hashmaliciousBrowse
                                                                                                                    • urs-world.com/favicon.ico
                                                                                                                    document-69564892.xlsGet hashmaliciousBrowse
                                                                                                                    • urs-world.com/favicon.ico
                                                                                                                    document-1813856412.xlsGet hashmaliciousBrowse
                                                                                                                    • urs-world.com/favicon.ico
                                                                                                                    document-1776123548.xlsGet hashmaliciousBrowse
                                                                                                                    • urs-world.com/favicon.ico
                                                                                                                    document-647734423.xlsGet hashmaliciousBrowse
                                                                                                                    • urs-world.com/favicon.ico
                                                                                                                    document-1579869720.xlsGet hashmaliciousBrowse
                                                                                                                    • urs-world.com/favicon.ico
                                                                                                                    document-806281169.xlsGet hashmaliciousBrowse
                                                                                                                    • urs-world.com/favicon.ico
                                                                                                                    document-839860086.xlsGet hashmaliciousBrowse
                                                                                                                    • urs-world.com/favicon.ico
                                                                                                                    document-1061603179.xlsGet hashmaliciousBrowse
                                                                                                                    • urs-world.com/favicon.ico
                                                                                                                    document-909428158.xlsGet hashmaliciousBrowse
                                                                                                                    • urs-world.com/favicon.ico
                                                                                                                    document-1822768538.xlsGet hashmaliciousBrowse
                                                                                                                    • urs-world.com/favicon.ico
                                                                                                                    document-1952275091.xlsGet hashmaliciousBrowse
                                                                                                                    • urs-world.com/favicon.ico
                                                                                                                    document-583955381.xlsGet hashmaliciousBrowse
                                                                                                                    • urs-world.com/favicon.ico
                                                                                                                    document-1312908141.xlsGet hashmaliciousBrowse
                                                                                                                    • urs-world.com/favicon.ico
                                                                                                                    document-1612462533.xlsGet hashmaliciousBrowse
                                                                                                                    • urs-world.com/favicon.ico
                                                                                                                    document-1669060840.xlsGet hashmaliciousBrowse
                                                                                                                    • urs-world.com/favicon.ico
                                                                                                                    document-203135823.xlsGet hashmaliciousBrowse
                                                                                                                    • urs-world.com/favicon.ico
                                                                                                                    document-1042699213.xlsGet hashmaliciousBrowse
                                                                                                                    • urs-world.com/favicon.ico
                                                                                                                    document-980795635.xlsGet hashmaliciousBrowse
                                                                                                                    • urs-world.com/favicon.ico

                                                                                                                    Domains

                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                    urs-world.combTjvWUTLid.dllGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    KAsJ2r4XYY.dllGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    swlsGbeQwT.dllGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1048628209.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1771131239.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-69564892.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1729033050.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1813856412.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1776123548.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-647734423.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1579869720.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-895003104.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-779106205.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-806281169.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-839860086.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1061603179.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-909428158.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1747349663.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1822768538.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1952275091.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    under17.comKcFVz0y2si.dllGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    bTjvWUTLid.dllGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    KAsJ2r4XYY.dllGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    swlsGbeQwT.dllGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-1048628209.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-1771131239.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-1370071295.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-69564892.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-1320073816.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-184653858.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-1729033050.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-540475316.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-1456634656.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-1376447212.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-1813856412.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-1776123548.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-684762271.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-1590815978.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-66411652.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-415601328.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196

                                                                                                                    ASN

                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                    ACCELERATED-ITDEKcFVz0y2si.dllGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    bTjvWUTLid.dllGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    BnJvVt951o.exeGet hashmaliciousBrowse
                                                                                                                    • 152.89.236.214
                                                                                                                    BnJvVt951o.exeGet hashmaliciousBrowse
                                                                                                                    • 152.89.236.214
                                                                                                                    SMtbg7yHyR.exeGet hashmaliciousBrowse
                                                                                                                    • 152.89.236.214
                                                                                                                    KAsJ2r4XYY.dllGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    swlsGbeQwT.dllGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-1048628209.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-1771131239.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-1370071295.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-69564892.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-1320073816.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-184653858.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-1729033050.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-540475316.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-1456634656.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-1376447212.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-1813856412.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-1776123548.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    document-684762271.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.243.114.196
                                                                                                                    WEBZILLANLbTjvWUTLid.dllGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1048628209.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1771131239.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-69564892.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1813856412.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1776123548.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-647734423.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1579869720.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-806281169.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-839860086.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1061603179.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-909428158.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1822768538.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1952275091.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-583955381.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1312908141.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1612462533.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1669060840.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-203135823.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95
                                                                                                                    document-1042699213.xlsGet hashmaliciousBrowse
                                                                                                                    • 185.186.244.95

                                                                                                                    JA3 Fingerprints

                                                                                                                    No context

                                                                                                                    Dropped Files

                                                                                                                    No context

                                                                                                                    Created / dropped Files

                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{297C5617-96F7-11EB-90E6-ECF4BB82F7E0}.dat
                                                                                                                    Process:C:\Program Files\internet explorer\iexplore.exe
                                                                                                                    File Type:Microsoft Word Document
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):29272
                                                                                                                    Entropy (8bit):1.76904977404343
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:48:IwkGcprTGwpLVG/ap8YGIpcBGvnZpv7GomqAUPqp9cGo4aqAUAqAUzpmNGWmqAUx:r4ZNZx24WOt9ifH9DzMpLj6ZPBjMpB
                                                                                                                    MD5:52D070A3431689C786E24901B46AC1A4
                                                                                                                    SHA1:01D8368785DFE6835EF4CD2B5121748170DF2BC3
                                                                                                                    SHA-256:34181F65927B4C8AF9CCF2A8A39804EA1BF67B8A0EE46D38D59AE93A982402EC
                                                                                                                    SHA-512:1A7924B7C63B22DF97D12C1A3DCFA7EFE3CC994D544D4B52272B33664A5E00AC4CFFAB2253F8A5B951C3B1456BB141061FED035EF7A82965934D3DCC0154FE68
                                                                                                                    Malicious:false
                                                                                                                    Reputation:low
                                                                                                                    Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{4554B9A1-96F7-11EB-90E6-ECF4BB82F7E0}.dat
                                                                                                                    Process:C:\Program Files\internet explorer\iexplore.exe
                                                                                                                    File Type:Microsoft Word Document
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):50344
                                                                                                                    Entropy (8bit):2.002644326335674
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:rrOytF5FIFCFKFuFyIZFyYFtFdftFdEPRdn:O
                                                                                                                    MD5:AFF33309F1392D6955015982CB277BED
                                                                                                                    SHA1:7CA7E4877DE96E1F07CB840E0F12756FA5DF1F79
                                                                                                                    SHA-256:AC7D0C025D85280BA3C360192109F262313D71FD93A117073A99C983FD5AA20F
                                                                                                                    SHA-512:7A4D508C86BDACE4875B95A652508CDE6B60357D13BB30E01B5C6246789ACE15EBC5F790117A895CF10013E754BD27B8657CEBD57818691553C1DC35CEBE6323
                                                                                                                    Malicious:false
                                                                                                                    Reputation:low
                                                                                                                    Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5B8FC2C0-96F7-11EB-90E6-ECF4BB82F7E0}.dat
                                                                                                                    Process:C:\Program Files\internet explorer\iexplore.exe
                                                                                                                    File Type:Microsoft Word Document
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):29272
                                                                                                                    Entropy (8bit):1.7696992315198818
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:rUrZumZDv2H3WHhPtHhpifHhOWUzMHhCcj65IBHiLpB:raZlZj2XWZt3ifQWUzMIcj65IBCLpB
                                                                                                                    MD5:7B45FD64DC2681F721F3E42F07E1E00E
                                                                                                                    SHA1:CE48A309762ADACB1A13F0CA854A9618752DD05A
                                                                                                                    SHA-256:109FC7F8D4B237D0711C67163AB830F6486F50952369DD24EFC0CE130ED0FEA2
                                                                                                                    SHA-512:0FB29E947DFC24097F7477E35091220E7C42A09DE536459A28D60E0C6D74A930FABE8162CE3D3AD88ED7F69A9954CD4B7F4EF5DDE2F9345BE58EE3BB4B050FD7
                                                                                                                    Malicious:false
                                                                                                                    Reputation:low
                                                                                                                    Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{297C5619-96F7-11EB-90E6-ECF4BB82F7E0}.dat
                                                                                                                    Process:C:\Program Files\internet explorer\iexplore.exe
                                                                                                                    File Type:Microsoft Word Document
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):43324
                                                                                                                    Entropy (8bit):2.5068842035466607
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:ryWXHw8QRu6NCFE97Agf5lf5oTf5N6VbUJ5rc:W55l5I5IxJ
                                                                                                                    MD5:43A5A2F1F085ABB4AC6FB08A1FB7759C
                                                                                                                    SHA1:347B990E18B6FCA2983B5C8859D859794B30971B
                                                                                                                    SHA-256:1EE3D968EAF78E98CE19B70825E72F7BCD11376F627208692F799B96FF58E2CE
                                                                                                                    SHA-512:DF143B44DD76973B306C994103FF100709545CE47F050607BF7E34207B0EA857412E0A5ACAA3584986CF68DD7A92B142379CCB221E53D3ABF2A9339AA7ADA4CD
                                                                                                                    Malicious:false
                                                                                                                    Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{4554B9A3-96F7-11EB-90E6-ECF4BB82F7E0}.dat
                                                                                                                    Process:C:\Program Files\internet explorer\iexplore.exe
                                                                                                                    File Type:Microsoft Word Document
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):27384
                                                                                                                    Entropy (8bit):1.8463390897024414
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:rvZYQk6lBS7j52dW6MeyGbAgBRGbAgfbA7A:rvZYQk6lk7j52dW6Mey1gBR1gU7A
                                                                                                                    MD5:EC9E19B6321574D931F57E7FC88A88C2
                                                                                                                    SHA1:DD68436ACBD57FF99506001E2E303B36528469AE
                                                                                                                    SHA-256:BD9E147401F67DA1FF6BCF14134303ED5633CAF39436EC6C62B52A9DEABFEF8F
                                                                                                                    SHA-512:D96837DE8AD25E3D6D4C2B16DBB1F1F16FA63045674AFC68C0626A4442BC92C15DF3E46B6331D340654F15866F4DA692B2305D57DEE462B767527A5306F72CA2
                                                                                                                    Malicious:false
                                                                                                                    Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{4D761D34-96F7-11EB-90E6-ECF4BB82F7E0}.dat
                                                                                                                    Process:C:\Program Files\internet explorer\iexplore.exe
                                                                                                                    File Type:Microsoft Word Document
                                                                                                                    Category:modified
                                                                                                                    Size (bytes):27864
                                                                                                                    Entropy (8bit):1.8243772117528771
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:192:rvZgQ86ekCjA82AIWAxMAdSC5b/RC5bObr:rR5H/8iGHJI1IiH
                                                                                                                    MD5:B8C6AAC821775CD87FA9CAC4452A17CD
                                                                                                                    SHA1:24515DB074BEC8166B1AD97431C8C2474A04897A
                                                                                                                    SHA-256:446586DA30CE20B0D08E3463823E755554C2DCD8CE074EA065D8C6C209211B8C
                                                                                                                    SHA-512:855F7CA3D0658F7CEE379C06C3EA17179234BAA7B0165C9C695B15FDE294C83700FABC4B77F7EA04F2F221AE516A97BA61E6D7ED6E5120F145CC29530098BB94
                                                                                                                    Malicious:false
                                                                                                                    Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{5B8FC2C2-96F7-11EB-90E6-ECF4BB82F7E0}.dat
                                                                                                                    Process:C:\Program Files\internet explorer\iexplore.exe
                                                                                                                    File Type:Microsoft Word Document
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):27928
                                                                                                                    Entropy (8bit):1.8482918177809553
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:192:rRZzQM6OkJjS2+WDMLSooyVm5RooyVmAtr:rX8XvFR1AOooBooyp
                                                                                                                    MD5:9D4B3CDBDFCB87293E3100DF075A0E2F
                                                                                                                    SHA1:211A3CB74048C74E82A29701C3366E150C18F409
                                                                                                                    SHA-256:A40B4CAA851EB892BEE01CB81149AA00719A6274AD82E13D7418E0890B7B9649
                                                                                                                    SHA-512:128BD353BEF4A753FB07E3AF9CFA2EEF781E47FD631F6D0730ABCE8A1B56211A88B16A0139F920666AFA7A93150258ABD6B7AE290A681D99FAB0EAE78D584376
                                                                                                                    Malicious:false
                                                                                                                    Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Internet Explorer\imagestore\po60zt0\imagestore.dat
                                                                                                                    Process:C:\Program Files\internet explorer\iexplore.exe
                                                                                                                    File Type:data
                                                                                                                    Category:modified
                                                                                                                    Size (bytes):5096
                                                                                                                    Entropy (8bit):4.534892892006223
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:48:wXLBRh+sCBykteatiBn4KWi1+NKXaYgDehYa3DCu:0Ph+Qhato4xPDehrmu
                                                                                                                    MD5:C2A2A7C7CF44BC09ADA4866335E37B1B
                                                                                                                    SHA1:D8241782533BB9689A449DE460173853685BD582
                                                                                                                    SHA-256:A831E68DA6F776864944FE91375BD17E1147D76969EF06AA187457DCA4B90A01
                                                                                                                    SHA-512:A25DE9E49DC50E56D0F382B04F829991E3146D7B1CA1C6D04C0FE9630E2858483053A5B195A8D7CE38190083C922FDF22F1D2CF2870672014D90140716696EFD
                                                                                                                    Malicious:false
                                                                                                                    Preview: +.h.t.t.p.s.:././.w.w.w...b.i.n.g...c.o.m./.s.a./.s.i.m.g./.f.a.v.i.c.o.n.-.2.x...i.c.o........... .... .........(... ...@..... ...................................................................................................................................................................................................N...Sz..R...R...P...N..L..H..DG..........................................................................................R6..U...U...S...R...P...N..L..I..F..B...7...............................................................................S6..V...V...U...S...R...P...N..L..I..F..C...?..:z......................................................................O...W...V...V...U...S...R...P...N..L..I..E..C...?...;..{7..q2$..............................................................T..D..]...S)..p6..J...R...P...N..L..I..E..B..>..;..z7..p2..f,X.........................................................A..O#..N!..N!..N!..P$..q:...P...N..K..I..E..
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\GiGr-rA9TBhE2c3LJn7PvDweiOo.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):206664
                                                                                                                    Entropy (8bit):5.137265787270688
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:6144:1irrzbB3LH7gaV6Z8LAfP0Rp6Izc04YFI:aW
                                                                                                                    MD5:4A6B9BF79B6C1520048853F610D7185E
                                                                                                                    SHA1:C5D70FF293203737D908818DD263A2FFF777E023
                                                                                                                    SHA-256:46F569153841521AA8910124E31B72794ED4FFEFCEFDF4F88B624D6F3DFBEE88
                                                                                                                    SHA-512:24BA18A7836F982208844833A0AC03F52AE7EB41E8B5A8F2996BF19376ACC7A70434C94E0FA521F51A71DB70EACDCE3978F2F9039C7C4D63984D0110584FA23F
                                                                                                                    Malicious:false
                                                                                                                    Preview: (function(n){function t(r){if(i[r])return i[r].exports;var u=i[r]={i:r,l:!1,exports:{}};return n[r].call(u.exports,u,u.exports,t),u.l=!0,u.exports}var i={};return t.m=n,t.c=i,t.d=function(n,i,r){t.o(n,i)||Object.defineProperty(n,i,{enumerable:!0,get:r})},t.r=function(n){typeof Symbol!="undefined"&&Symbol.toStringTag&&Object.defineProperty(n,Symbol.toStringTag,{value:"Module"});Object.defineProperty(n,"__esModule",{value:!0})},t.t=function(n,i){var r,u;if((i&1&&(n=t(n)),i&8)||i&4&&typeof n=="object"&&n&&n.__esModule)return n;if(r=Object.create(null),t.r(r),Object.defineProperty(r,"default",{enumerable:!0,value:n}),i&2&&typeof n!="string")for(u in n)t.d(r,u,function(t){return n[t]}.bind(null,u));return r},t.n=function(n){var i=n&&n.__esModule?function(){return n["default"]}:function(){return n};return t.d(i,"a",i),i},t.o=function(n,t){return Object.prototype.hasOwnProperty.call(n,t)},t.p="",t(t.s=0)})([function(n,t,i){window.SpeechSDK=i(1)},function(n,t,i){"use strict";function r(n){for(
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\H_VmuFPRwWZ4UrVl0mPztnf3z5U[1].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:[TIFF image data, little-endian, direntries=5, xresolution=74, yresolution=82, resolutionunit=2, software=GIMP 2.10.8, datetime=2019:08:01 11:38:22], progressive, precision 8, 160x160, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):13897
                                                                                                                    Entropy (8bit):7.900268685598436
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:hE9ZTKqcnOdNOEX35wsXK/vWqv/CAU7zXwn1sIQcoo43P:hE9oqcOdfX35wsaWqv6HUn1H4P
                                                                                                                    MD5:B545C910F9993F7F930513DB793F4EE0
                                                                                                                    SHA1:1FF566B853D1C1667852B565D263F3B677F7CF95
                                                                                                                    SHA-256:A797D6446620B867248B43792B9AA457B42ADBB7099D9B3129E0D7743DAF67ED
                                                                                                                    SHA-512:12A3A9EC217F8B05151D2BDC76B6B2942C86098F1182AD76B7119B959B9937ACFCACC0361188CDF17A629B1D4E76985DFC6AB409939496AF62354AE9FCEB162D
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/H_VmuFPRwWZ4UrVl0mPztnf3z5U.jpg
                                                                                                                    Preview: ......JFIF.....H.H....!.Exif..II*...............J...........R...(...........1.......Z...2.......f...z...H.......H.......GIMP 2.10.8.2019:08:01 11:38:22................................................................................................ ..................JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..-#".Uj..........b.T..Gj.#..E..XD..0...ML...H....i.UN}.p}?:].pE8&O....*q.~UOR@l&...m;...jJE....v..8.p...Z..f'
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\KC_nX2_tPPyFvVw1RK20Yu1FyDk[1].svg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):726
                                                                                                                    Entropy (8bit):4.636787858533541
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:12:tbH41nlcWYiB1+Xl0ML2t1iOfEmmgaUEUZQ6nMAIPWSxs4yPISEIe9t8aayPISEx:t741nTYifqLL2+O7mgaxSQ6MFnE3nkO
                                                                                                                    MD5:6601E4A25AB847203E1015B32514B16C
                                                                                                                    SHA1:282FE75F6FED3CFC85BD5C3544ADB462ED45C839
                                                                                                                    SHA-256:6E5D3FFF70EEC85FF6D42C84062076688CB092A3D605F47260DBBE6B3B836B21
                                                                                                                    SHA-512:305C325EAD714D7BCBD25F3ACED4D7B6AED6AE58D7D4C2F2DFFCE3DFDEB0F427EC812639AD50708EA08BC79E4FAD8AC2D9562B142E0808936053715938638B7C
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/KC_nX2_tPPyFvVw1RK20Yu1FyDk.svg
                                                                                                                    Preview: <svg focusable="false" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" enable-background="new 0 0 16 16">.. <path d="M0 0h16v16h-16v-16z" fill="none"/>.. <path fill="#007DAA" d="M11 4h4l-5-4v3c0 .552.447 1 1 1zm-3-1v-3h-4.5c-.828 0-1.5.672-1.5 1.5v13c0 .828.672 1.5 1.5 1.5h10c.828 0 1.5-.672 1.5-1.5v-8.5h-4c-1.654 0-3-1.346-3-3zm4.707 10.707c-.181.181-.431.293-.707.293h-7c-.276 0-.526-.112-.707-.293s-.293-.431-.293-.707.112-.526.293-.707.431-.293.707-.293h7c.276 0 .526.112.707.293s.293.431.293.707-.112.526-.293.707zm0-5.414c.181.181.293.431.293.707s-.112.526-.293.707-.431.293-.707.293h-7c-.276 0-.526-.112-.707-.293s-.293-.431-.293-.707.112-.526.293-.707.431-.293.707-.293h7c.276 0 .526.112.707.293z"/>..</svg>
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\P3LN8DHh0udC9Pbh8UHnw5FJ8R8.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):1516
                                                                                                                    Entropy (8bit):5.30762660027466
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:24:+FE64YTsQF61KWllWeM2lSoiLKiUfpIYdk+fzvOMuHMH34tDO8XgGQE3BUf4JPwk:+FdF6UYXEBi9kIHIB1UY
                                                                                                                    MD5:EF3DA257078C6DD8C4825032B4375869
                                                                                                                    SHA1:35FE0961C2CAF7666A38F2D1DE2B4B5EC75310A1
                                                                                                                    SHA-256:D94AC1E4ADA7A269E194A8F8F275C18A5331FE39C2857DCED3830872FFAE7B15
                                                                                                                    SHA-512:DBA7D04CDF199E68F04C2FECFDADE32C2E9EC20B4596097285188D96C0E87F40E3875F65F6B1FF5B567DCB7A27C3E9E8288A97EC881E00608E8C6798B24EF3AF
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/P3LN8DHh0udC9Pbh8UHnw5FJ8R8.gz.js
                                                                                                                    Preview: var Identity=Identity||{},ham_id_js_downloaded=!1;(function(n,t,i,r,u,f,e){e.wlProfile=function(){var r=sj_cook.get,u="WLS",t=r(u,"N"),i=r(u,"C");return i&&e.wlImgSm&&e.wlImgLg?{displayName:t?t.replace(/\+/g," "):"",name:n(t.replace(/\+/g," ")),img:e.wlImgSm.replace(/\{0\}/g,f(i)),imgL:e.wlImgLg.replace(/\{0\}/g,f(i)),idp:"WL"}:null};e.headerLoginMode=0;e.popupAuthenticate=function(n,i,r){var o,u,h,c,v=sb_gt(),l=Math.floor(v/1e3).toString(),s="ct",a=new RegExp("([?&])"+s+"=.*?(&|$)","i");return n.toString()==="WindowsLiveId"&&(o=e.popupLoginUrls,u=o[n],u=u.match(a)?u.replace(a,"$1"+s+"="+l+"$2"):u+"?"+s+"="+l,e.popupLoginUrls.WindowsLiveId=u),(o=e.popupLoginUrls)&&(u=o[n]+(i?"&perms="+f(i):"")+(r?"&src="+f(r):""))&&(h=e.pop(u))&&(c=setInterval(function(){h.closed&&(t.fire("id:popup:close"),clearInterval(c))},100))};e.pop=function(n){return r.open(n,"idl","location=no,menubar=no,resizable=no,scrollbars=yes,status=no,titlebar=no,toolbar=no,width=1000,height=620")};var o=u("id_h"),s=u("id
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\PA3TC2iNXZkiG2C3IJp5VAvC_yY.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):930
                                                                                                                    Entropy (8bit):5.191402456846154
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:24:GFUFqJYYmaLOTCE20aOtZP9F3a6MakIq+lvyUJ9sq5aOB:BWOWEZP9U6MHEvyUJ9s6
                                                                                                                    MD5:73BFB9BB67A7271E257A4547007469A5
                                                                                                                    SHA1:28F7B820679A99318E0DC596A54480D6AD5C3661
                                                                                                                    SHA-256:A22BB5BD48C4C578C6BC4FDC4B8FF18F9162848F14E05AE283EC848B08EC8C15
                                                                                                                    SHA-512:432142851A492C7635B764AC5293B6EFC943624FBD2FEA5D0F2D8900208B5F6233F5563B7CC08F314E29889B2628F298355484700816A3679F6A3315E63581F0
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/PA3TC2iNXZkiG2C3IJp5VAvC_yY.gz.js
                                                                                                                    Preview: var ShareDialog;(function(n){function i(){t("bootstrap",arguments)}function r(){t("show",arguments)}function u(){t("showError",arguments)}function t(n,t){for(var r=["shdlgapi",n],i=0;i<t.length;i++)r.push(t[i]);sj_evt.fire.apply(null,r)}n.bootstrap=i;n.show=r;n.showError=u})(ShareDialog||(ShareDialog={})),function(n){function i(){t==0&&u()}function r(){sj_evt.unbind("shdlgapi",i)}function u(){t=1;var n=ShareDialogConfig.shareDialogUrl+"&IG="+_G.IG;n=e(n,["uncrunched","testhooks"]);sj_ajax(n,{callback:function(n,i){n?(t=2,i.appendTo(_d.body),r(),f()):t=3},timeout:0})}function f(){var n="rms";_w[n]&_w[n].start()}function e(n,t){var i,r,u;for(r in t)u=new RegExp("[?&]"+t[r]+"=[^?&#]*","i"),(i=location.href.match(u))&&i[0]&&(n+="&"+i[0].substring(1));return n}function o(){n.inited=0}function s(){n.inited||(n.inited=1,sj_evt.bind("shdlgapi",i,!0),sj_evt.bind("ajax.unload",o,!1))}var t=0;s()}(ShareDialog||(ShareDialog={}))
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\Passport[1].htm
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:HTML document, ASCII text
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):329
                                                                                                                    Entropy (8bit):5.086971439676268
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:6:qzxUe3X965+zAqEFtTNfYEAn4TXQ3SOFCL0H4WZhCroOI:kxFkXq6tTRYEVTAx4IHH7CroOI
                                                                                                                    MD5:7B7D5DA1B057EB0D5A58C2585E80BACA
                                                                                                                    SHA1:29714CD8C570E321C1C1C991E77ACE3945312AC6
                                                                                                                    SHA-256:023CD9B7315636BE1BE24DC78144554B0E76777BD476ED581378172DE9B12A05
                                                                                                                    SHA-512:1A4E36E3124968166579C04D05A1325242E1DFE20DF4C804081487A019B88395A679A439525488F78B73334C5B0BD38D61E24F8E23F2F8274C6BAC323291CEE8
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/secure/Passport.aspx?popup=1&ssl=1
                                                                                                                    Preview: <html><head><title>Bing</title></head><body>Loading...<script type="application/x-javascript">//<![CDATA[.var _w = window; var o = _w.opener; var mainWindow; (mainWindow = o) || (mainWindow = _w.parent); if (mainWindow) {mainWindow.sj_evt && mainWindow.sj_evt.fire("wl:cancel"); };if (o) _w.close();;.// </script></body></html>
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\Ue4YP_2B[1].htm
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:gzip compressed data, max speed, from TOPS/20
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):373
                                                                                                                    Entropy (8bit):7.426422982462042
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:6:Xtb9leJTLhH+rvS0pPveSTCIMmYIfOhtT1oZ4pglBZtnHL7KsbRKHYKvQTF5nQCU:XtHIZH+u0FWSTCPmYAqiH/KmRpKerQCU
                                                                                                                    MD5:BBAEC9C609B9250AA09919999916EFE6
                                                                                                                    SHA1:3B4C916D3529E480344FE4F77AD840FC7F8DB510
                                                                                                                    SHA-256:6CE7ED64ECF776EAB3736456CDFE7F28F96584DD0CEFAA35B1D31CE3BF921629
                                                                                                                    SHA-512:5EF35F950667BC03BA08DD9D246E83B63A194BBFD7A3C5203F775855EF656A5B28E39D7C42C39368780148846DFA119A61C40AB4D547D907B6B3BFCA1D792E89
                                                                                                                    Malicious:false
                                                                                                                    Preview: ..........T..R.0.@.......|6...:.Z.EA...NJ..h.ICk}zG]..:.s-..sF....Y...N..lX..a.3R.u.....?..e...W,.\q.?.[..m..*.;)n-......SO.?:v&1......S.....s...P....\.9.Z,.f.t...dj..gu...v>..A....1-...0Z...\oVm..H......hU....j..9.\!............y..l85.|od.I..9.....LQ>.w....}..(.......>=...v`\S..O.l_.l....C.-........{..y$._..)...}........~.\^|.........R.....
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\XvRHqJwJt19aXQca73hQTfvNMxk[1].svg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):545
                                                                                                                    Entropy (8bit):5.028824557535963
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:12:t4102hriVtBr4pFm9z0kjhlHJW1QOYIX+Xw5RxnnS8K0ML2wtp:t41jiVt5wIz0kjhlHJW1QNCRxS8KLL2a
                                                                                                                    MD5:58725E06FABDC207D4350D6F3C5B33D0
                                                                                                                    SHA1:5EF447A89C09B75F5A5D071AEF78504DFBCD3319
                                                                                                                    SHA-256:EDD5715C42AD596AFE1CF07A400D4F33A2F5388C18ADFDD169A7E9467BC9E9DB
                                                                                                                    SHA-512:69F8A2161EDE8AA0BE70ECF641D1C05D7E9B5E6952DD41255E02B7AE9FAFDC94A9547DDDB46A2FF9A56C852239558E3C6634D93A1D6D7669C719956C8D2F5DD6
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/XvRHqJwJt19aXQca73hQTfvNMxk.svg
                                                                                                                    Preview: <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 20 20" enable-background="new 0 0 20 20">.. <circle fill="#00809D" cx="10" cy="10" r="3"/>.. <circle fill="#00809D" cx="5.5" cy="5.5" r="1.25"/>.. <path stroke="#00809D" stroke-width="2" stroke-linecap="round" stroke-miterlimit="10" d="M1 7.25v-2.5c0-2.071 1.679-3.75 3.75-3.75h2.5M7.25 19h-2.5c-2.071 0-3.75-1.679-3.75-3.75v-2.5M19 12.75v2.5c0 2.071-1.679 3.75-3.75 3.75h-2.5M12.75 1h2.5c2.071 0 3.75 1.679 3.75 3.75v2.5" fill="none"/>.. <path fill="none" d="M0 0h20v20h-20z"/>..</svg>..
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\a282eRIAnHsW_URoyogdzsukm_o.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):423
                                                                                                                    Entropy (8bit):5.117319003552808
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:12:2gSYjthM4GF4aaXtdhI9DfaUZnsMQYAQI:2gSW/bS9/ZnsMAj
                                                                                                                    MD5:3A5049DB26AF9CE03DB6A53D3541082D
                                                                                                                    SHA1:934DAEA4EDDE2568CA02AB89AF23FDCFEB57339A
                                                                                                                    SHA-256:AF8C36DEFED55D79106513865F69933E546E1E4C361E41C29F65905DED009047
                                                                                                                    SHA-512:5E21B6E184CBB0013DCCE174345DAC14BB64D391CCA3B253F73C7373253FDCA5E0BB297A0BD2FAD237E4F796895807660369680621C49C8F99DF428ED3218C9E
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/a282eRIAnHsW_URoyogdzsukm_o.gz.js
                                                                                                                    Preview: (function(n){function i(){var e,o,u,s,f,r;if(document.querySelector&&document.querySelectorAll){e=[];o=n.rules;for(u in o)for(s=o[u],u+=!s[2]?"":" >*",f=document.querySelectorAll(u),r=0;r<f.length;r++){var i=f[r],h=0,c=0,l=i.offsetWidth,a=i.offsetHeight;do h+=i.offsetLeft,c+=i.offsetTop;while(i=i.offsetParent);e.push({_e:f[r],x:h,y:c,w:l,h:a})}n.enqueue(t,e)}}var t="L";n.wireup(t,{load:null,compute:i,unload:null})})(BM)
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\fdVZU4ttbw8NDRm6H3I5BW3_vCo[1].svg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):671
                                                                                                                    Entropy (8bit):5.014579690661168
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:12:tbH4/KYf3UnlcWYl7qy/gk63xsV8tGXcqecDDWUV8jEPsycd23Wt+MKsAnueOc+d:t74LfEnTYpq+gTxs6GUUQEPssmYsAnuH
                                                                                                                    MD5:D9ED1A42342F37695571419070F8E818
                                                                                                                    SHA1:7DD559538B6D6F0F0D0D19BA1F7239056DFFBC2A
                                                                                                                    SHA-256:0C1E2169110DD2B16F43A9BC2621B78CC55423D769B0716EDAA24F95E8C2E9FE
                                                                                                                    SHA-512:67F0BC641D78D5C12671FDD418D541F70517C3CA72C7B4682E7CAC80ABE6730A60D7C3C9778095AAB02C1BA43C8DD4038F48A1A17DA6A5E6C5189B30CA19A115
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/fdVZU4ttbw8NDRm6H3I5BW3_vCo.svg
                                                                                                                    Preview: <svg focusable="false" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px"... viewBox="0 0 16 16" enable-background="new 0 0 16 16" xml:space="preserve">..<path fill="#919191" d="M15.707,0.293c-0.391-0.391-1.024-0.391-1.415,0L7.994,6.591L1.696,0.293C1.298-0.091,0.665-0.08,0.281,0.318...c-0.375,0.388-0.375,1.003,0,1.391l6.298,6.298l-6.298,6.298c-0.384,0.398-0.373,1.031,0.025,1.415c0.388,0.375,1.003,0.375,1.391,0...l6.298-6.298l6.298,6.298c0.398,0.384,1.031,0.373,1.415-0.025c0.375-0.388,0.375-1.003,0-1.39L9.409,8.006l6.298-6.298...C16.098,1.317,16.098,0.684,15.707,0.293z"/>..<path fill="none" d="M0,0h16v16H0V0z"/>..</svg>..
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\hqx6FcD0hjfzrON5oLgx2RMMD1s.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):443
                                                                                                                    Entropy (8bit):4.86644754379557
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:12:kdXCJAUQECJA5MeMJA561cnGfbs4Hbrk86fYXChdJAjU:8CJWECJKMeMJK61cuo47rk8WYMdJyU
                                                                                                                    MD5:56583BD882D9571EC02FBDF69D854205
                                                                                                                    SHA1:8DFF13B78F4CBCC482DC5C7FC1495390200C0B94
                                                                                                                    SHA-256:DF0089A92B304A88F35AA0117CF8647695659AAF68B38B1B7A72A7C53465E9C7
                                                                                                                    SHA-512:418B3003B568F2FDB862035EE624CE93087861AEBB6680CDC0E0F1212297B64D30596EEF931B8C6E818292C4AB14C8C17FF0BAF9E58ED93392AD7A80621EBBE4
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/hqx6FcD0hjfzrON5oLgx2RMMD1s.gz.js
                                                                                                                    Preview: var OutlinePolyfil=function(){function n(){var n=this;this.attachHandlers=function(){n.attachHandlersForOutline()};this.attachHandlersForOutline=function(){addEventListener("keydown",n.onTabKey);addEventListener("mousedown",n.onMouseDown)};this.onTabKey=function(n){n.keyCode==9&&document.body.classList.add("tabbing")};this.onMouseDown=function(){document.body.classList.remove("tabbing")};this.attachHandlers()}return n}();new OutlinePolyfil
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\kBH4DSEA84cgV7IKw7_Bwvm2NpI[1].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:[TIFF image data, little-endian, direntries=5, xresolution=74, yresolution=82, resolutionunit=2, software=GIMP 2.10.8, datetime=2019:07:31 17:58:04], progressive, precision 8, 160x160, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):11847
                                                                                                                    Entropy (8bit):7.82741108986083
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:192:dhK4s5Is9xn1pwLz+SHW36K+Oas6GKNQsjM+N7WzAVrzj+cq615Te+Se:d4ZOOloH/HW3Rp5Ka2tWzAVrzjv55ia
                                                                                                                    MD5:5CCC9B225B51915169D6F4C27FA26C9A
                                                                                                                    SHA1:9011F80D2100F3872057B20AC3BFC1C2F9B63692
                                                                                                                    SHA-256:10D8D2141A01589A82B139B01A75B74D9DFAB16D273C9B2EC7F5087D3EF16B3B
                                                                                                                    SHA-512:E2AEB96F6FEC6710AAFF6E52CC24E773CD194F9DEE1BC01FEED88A8EC48033DD9BD8AD0A18C14502DCB6A6ECF05418F18D125E00C4E0E06533495A00F3AF411F
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/kBH4DSEA84cgV7IKw7_Bwvm2NpI.jpg
                                                                                                                    Preview: ......JFIF.....H.H......Exif..II*...............J...........R...(...........1.......Z...2.......f...z...H.......H.......GIMP 2.10.8.2019:07:31 17:58:04...................................................................................................................JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...LT...{..3....P.1F)....1N....b.S.F(....;.b...\S.F(.....Q..n(.?.b...1O...cqF)....R.1@....b....R.\P.1K.v(. ..\S
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\lK_FmcR4naKX9hpIwfe9ify1hf4.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):49696
                                                                                                                    Entropy (8bit):5.616251749262072
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:768:kP5wtNTkCMrK9rQSR4lQlzN6SuDHTzXd2kfrGwIee9:ppkCMu1Rv0SuDHT4kfr5IR9
                                                                                                                    MD5:DCC31AB3EF173D31686F46F398F952E9
                                                                                                                    SHA1:14E10A76227175A839DEA8FE493A8AC287016014
                                                                                                                    SHA-256:CB7EB9302E6B64C71401F89ADD673A90131277FE61AE7FF1E27A4F018DD030D9
                                                                                                                    SHA-512:4BFB54F70E3AE1E692511916F851228596D54155AF3E78B9E5D808F7895AB1416B550BC76EAD93642457234F4EEB2FC47716F10CF57B5F2513779F2C30CEB037
                                                                                                                    Malicious:false
                                                                                                                    Preview: var __assign=this&&this.__assign||function(){return __assign=Object.assign||function(n){for(var t,r,i=1,u=arguments.length;i<u;i++){t=arguments[i];for(r in t)Object.prototype.hasOwnProperty.call(t,r)&&(n[r]=t[r])}return n},__assign.apply(this,arguments)},__rest=this&&this.__rest||function(n,t){var u={},r;for(var i in n)Object.prototype.hasOwnProperty.call(n,i)&&t.indexOf(i)<0&&(u[i]=n[i]);if(n!=null&&typeof Object.getOwnPropertySymbols=="function")for(r=0,i=Object.getOwnPropertySymbols(n);r<i.length;r++)t.indexOf(i[r])<0&&Object.prototype.propertyIsEnumerable.call(n,i[r])&&(u[i[r]]=n[i[r]]);return u},__spreadArrays=this&&this.__spreadArrays||function(){for(var i=0,n=0,r=arguments.length;n<r;n++)i+=arguments[n].length;for(var u=Array(i),f=0,n=0;n<r;n++)for(var e=arguments[n],t=0,o=e.length;t<o;t++,f++)u[f]=e[t];return u},__awaiter=this&&this.__awaiter||function(n,t,i,r){function u(n){return n instanceof i?n:new i(function(t){t(n)})}return new(i||(i=Promise))(function(i,f){function o(n){
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\model[1].json
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:UTF-8 Unicode text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):16168
                                                                                                                    Entropy (8bit):5.527579595880806
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:HUQyIePm3yt9YYQ5bV5u5hOuKsVMhu3kx0m4iDewY/rfrEraIO1uYPW:0yZ3yjYY85uTOuKsV2u3kx0m4iDewY/i
                                                                                                                    MD5:B12C190DFA30C8EF3CACFB2304F8A6BB
                                                                                                                    SHA1:4485BA9BCEC741F844120DA43AD4C67EED5EFF0F
                                                                                                                    SHA-256:E18575EBB4698CD7418A52E923B8815AA1B288FB160F12A9B8DFE69C816FCA67
                                                                                                                    SHA-512:0BE8328FD43826911A8BDD74E85C052F47EA08AF97F36C5C8296648B037C60CFEDA186F81A08C1620728FD50F5D3F36C634CCD2D943C41BEE3DDF3F69515B738
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/hp/api/model?form=REDIRERR
                                                                                                                    Preview: {"ClientSettings":{"Pn":{"Cn":1,"St":0,"Qs":0,"Prod":"P"},"Sc":{"Cn":1,"St":0,"Qs":0,"Prod":"H"},"Qz":{"Cn":1,"St":0,"Qs":0,"Prod":"T"},"Ap":true,"Mute":true,"Lad":"2021-04-06T00:00:00Z","Iotd":0,"Dft":null,"Mvs":0,"Flt":0,"Imp":2},"MediaContents":[{"ImageContent":{"Description":"The first modern Olympic Games were held 125 years ago in Athens in 1896 . 1,500 years after they were banned by the Roman Emperor. The 1896 Games were held in the Panathenaic Stadium, in the shadow of the Acropolis of Athens, shown here. They included athletes from 14 countries, with the largest delegations from Greece, Germany, France and Great Britain. The 43 events included a marathon, tennis, cycling, fencing, shooting, Greco-Roman wrestling and swimming. And while some things haven't changed over the years, some were different back then. Swimmers were taken out to sea by boat for the longer races and had to swim back to shore. Winners were given a silver medal (copper for second place), as well as an o
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\msnpopularnow[1].json
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:UTF-8 Unicode text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):10423
                                                                                                                    Entropy (8bit):5.524868443864616
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:192:uIrvLoZvJZvtcwyltHEZdrXgsqBtCQv6SHGjHHAHaBaZvkr1qPUaDQAbSE5A3GMQ:uOUzaDePrwsUBS/k6Ba52qPJQZEKbNSZ
                                                                                                                    MD5:54CD333FA1228D57F2DAEB0617134235
                                                                                                                    SHA1:CBA447E953F17FB044B4455A0E36916F1E264E4E
                                                                                                                    SHA-256:C0EAE134519D55C8FC8C1E86772F43569FB54FFA44DF785E387F3CC48D106DCD
                                                                                                                    SHA-512:4A997C3509A3C5795F39526435886C3F37DB5BE8F11589324075BA689E0770B84F1071288E4EE6AA33E85CFEAF1FA3914E42C4CEE45F740CA1F25AE3AFE7ABD3
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/hp/api/v1/msnpopularnow?&format=json&ecount=20&efirst=0&&form=REDIRERR
                                                                                                                    Preview: {"title":"","data":[{"typeName":"Msn","items":[{"url":"https://www.msn.com/de-ch/finanzen/top-stories/staatliche-regulierung-allianz-gegen-big-tech-druck-auf-facebook-und-google-w.chst/ar-BB1fkLCT?ocid=BingHPC","imageUrl":"/th?u=https%3a%2f%2fimg-s-msn-com.akamaized.net%2ftenant%2famp%2fentityid%2fBB1fkGpp.img&ehk=EoXsvHvTz25OeDlk8%2f1AsQ0JRbPiNyy0iD13c2N9OGI%3d&w=150&h=150&c=8&rs=2&pid=WP0","shortTitle":"Handelsblatt","longTitle":"Staatliche Regulierung: Allianz gegen Big Tech: Druck auf Facebo.","accessibilityTitle":"","subtext":"","isRecommendedNews":false},{"url":"https://www.msn.com/de-ch/news/other/polizei-sucht-mit-superpuma-nach-vermissten-minderj.hrigen-person/ar-BB1flh1z?ocid=BingHPC","imageUrl":"/th?u=https%3a%2f%2fimg-s-msn-com.akamaized.net%2ftenant%2famp%2fentityid%2fBB1flksC.img&ehk=H0FCoWHkkRHx9dwEmzqiKOqgx9bfKAuVCxCQfuDoLvw%3d&w=150&h=150&c=8&rs=2&pid=WP0","shortTitle":"20 Minuten","longTitle":"Polizei sucht mit Superpuma nach vermissten minderj.hrigen Pe.","acc
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\n8-O_KIRNSMPFWQWrGjn0BRH6SM.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:UTF-8 Unicode text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):1567
                                                                                                                    Entropy (8bit):5.248121948925214
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:48:KyskFELvJnSYVtXpQyL93NzpGaQJWA6vrIhf7:KybivJnSE5aU93HGaQJWAiIh
                                                                                                                    MD5:F9D8B007B765D2D1D4A09779E792FE62
                                                                                                                    SHA1:C2CBDA98252249E9E1114D1D48679B493CBFA52D
                                                                                                                    SHA-256:9400DF53D61861DF8BCD0F53134DF500D58C02B61E65691F39F82659E780F403
                                                                                                                    SHA-512:07032D7D9A55D3EA91F0C34C9CD504700095ED8A47E27269D2DDF5360E4CAC9D0FAD1E6BBFC40B79A3BF89AA00C39683388F690BB5196B40E5D662627A2C495A
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/n8-O_KIRNSMPFWQWrGjn0BRH6SM.gz.js
                                                                                                                    Preview: var wln=wln||"",Identity;(function(n){function i(n){n.style.display="none";n.setAttribute("aria-hidden","true")}function r(n){n.style.display="inline-block";n.setAttribute("aria-hidden","false")}var u,t;n&&n.sglid&&sj_be&&sj_cook&&sj_evt&&_d&&typeof _d.querySelectorAll!="undefined"&&(u=function(n){var i=n.getAttribute("data-a"),t=n.getAttribute("data-p");i==="false"&&t!=null&&sj_be(n,"click",function(){sj_cook.set("SRCHUSR","POEX",t,!0,"/")})},sj_evt.bind("identityHeaderShown",function(){var n=!1;sj_be(_ge("id_l"),"click",function(){var i,t;if(!n){for(i=_d.querySelectorAll(".b_imi"),t=0;t<i.length;t++)u(i[t]);n=!0}})},!0));sj_evt&&n&&(t=function(t){var h;if(t==null||t.idp!=="orgid"||(h=n.wlProfile(),h==null||h.name==null||t.name!=null)){var e=_ge("id_n"),u=_ge("id_p"),o=_ge("id_s"),s=_ge("id_a"),f=t?t.displayName:wln,c=t?t.img:null,l=t?t.idp:null,a=t?t.cid:null;e&&s&&(a||f)?(u&&c&&(u.title=f,u.src=c,r(u)),f.length>10&&(f=f.substring(0,10).replace(/\s+$/,"")+"."),e.textContent=f,e.inn
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\n_C4vBfAV3O9RfkGjfduaZoxjAs[1].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:[TIFF image data, little-endian, direntries=5, xresolution=74, yresolution=82, resolutionunit=2, software=GIMP 2.10.8, datetime=2019:08:01 11:40:12], progressive, precision 8, 160x160, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):17171
                                                                                                                    Entropy (8bit):7.923606790170532
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:oYOT4bsa8uRaCLYIrdjf7xR346jojxR0WKHfoe:oYOT4Ya8uRnxT/346AhKHfoe
                                                                                                                    MD5:D7AE018EA70FA15F5E5389E4F96AD768
                                                                                                                    SHA1:9FF0B8BC17C05773BD45F9068DF76E699A318C0B
                                                                                                                    SHA-256:A4F4A44961E03A073E3F351F296EC19C50005AA96360A9E5CEE50E0587738FBB
                                                                                                                    SHA-512:FD5B341BECCBBE7C16065217BBCAF6DF2C44629DE778E1263FE6A071565718C920335DBA220FDDF8EB18ECBBF2BEBC698B03BCF555949CB3DD66575249471406
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/n_C4vBfAV3O9RfkGjfduaZoxjAs.jpg
                                                                                                                    Preview: ......JFIF.....H.H....(.Exif..II*...............J...........R...(...........1.......Z...2.......f...z...H.......H.......GIMP 2.10.8.2019:08:01 11:40:12................................................................................................(..................JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...3J8...D....m8P...\.L..c..%.4.R...@.iqJ.4.CCJ.o.....-.!...1.Q.LB...S.U~...iXw.1J(..b.o.b.zSsHb.@..(... .H:...M.O4.
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\ozS3T0fsBUPZy4zlY0UX_e0TUwY.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):226
                                                                                                                    Entropy (8bit):4.923112772413901
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:6:2LGfGIEW65JcYCgfkF2/WHRMB58IIR/QxbM76Bhl:2RWIyYCwk4/EMB5ZccbM+B/
                                                                                                                    MD5:A5363C37B617D36DFD6D25BFB89CA56B
                                                                                                                    SHA1:31682AFCE628850B8CB31FAA8E9C4C5EC9EBB957
                                                                                                                    SHA-256:8B4D85985E62C264C03C88B31E68DBABDCC9BD42F40032A43800902261FF373F
                                                                                                                    SHA-512:E70F996B09E9FA94BA32F83B7AA348DC3A912146F21F9F7A7B5DEEA0F68CF81723AB4FEDF1BA12B46AA4591758339F752A4EBA11539BEB16E0E34AD7EC946763
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/ozS3T0fsBUPZy4zlY0UX_e0TUwY.gz.js
                                                                                                                    Preview: (function(n,t,i){if(t){var r=!1,f=function(){r||(r=!0,typeof wlc!="undefined"&&wlc(sj_evt,sj_cook.set,wlc_t))},u=function(){setTimeout(f,t)};n.bind("onP1",function(){i?n.bind("aad:signedout",u):u()},1)}})(sj_evt,wlc_d,wlc_wfa)
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\sbi[1].htm
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:HTML document, ASCII text, with very long lines, with CRLF, LF line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):46137
                                                                                                                    Entropy (8bit):5.492718429280291
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:768:WkuL2ym/YIZE2u1U5l7Ez+YIdQFSO4FWCPPZPzATfZjFwummSczZxG3IuO7JUDWB:plB1FWCpPwkNijuSjyir
                                                                                                                    MD5:8147A3C6CCDAD2147CA32BA6DB54E40A
                                                                                                                    SHA1:3257CCC8CED1107ACBE3697B61F1C5ED3A86A4E6
                                                                                                                    SHA-256:E783F26B771F68588FF468DE04C50E6A3E7BC4A11FEBDB52A17511E9DFE91297
                                                                                                                    SHA-512:005695CB7F9FBB397109F11FDD375F23D5C678C7F26036E3937C916F75C96857F6A7C1B10D5820588461479A14B69026A3277389E5C02D09359D5A2BD9CF3C67
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/images/sbi?mmasync=1&ptn=Homepage&IID=SBI&IG=E7B3AF7955464F659FE96ADB4631F87B&form=REDIRERR
                                                                                                                    Preview: <style type="text/css">#sbiarea,#sbicom{display:none}.hassbi #sbiarea{display:inline-block}#sbiarea{margin:0 0 0 18px}.sbox #sb_form #sbiarea{margin:0}#sb_sbi{display:inline-block;cursor:pointer}img#sbi_b{vertical-align:-2px;height:20px;width:20px}#detailPage #detailheader img#sbi_b,.blue2#miniheader img#sbi_b,.sbox img#sbi_b{vertical-align:-3px}.blue2#miniheader img#sbi_b{vertical-align:-1px}#sbi_b.grayscaled{filter:grayscale(1) brightness(1.4);-webkit-filter:grayscale(1) brightness(1.4)}#sbi_b.grayscaled:hover{filter:grayscale(1) brightness(1);-webkit-filter:grayscale(1) brightness(1)}#sb_sbip[shdlg] #sbi_b{filter:grayscale(0);-webkit-filter:grayscale(0)}#sb_sbip .rms_iac{display:inline-block}#sb_sbip:not(.disableTooltip):hover::before,#sb_sbip.shtip:not(.disableTooltip)::before,#sb_sbip[vptest]::before{bottom:-27px;left:10px;z-index:6}#sb_sbip:not(.disableTooltip):hover::after,#sb_sbip.shtip:not(.disableTooltip)::after,#sb_sbip[vptest]::after{top:40px;left:10px;z-index:4}#hp_contain
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\th[1].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 0x0, segment length 16, baseline, precision 8, 1920x1080, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):344983
                                                                                                                    Entropy (8bit):7.987666031914428
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:6144:uhr6bFSzjuZdOJGR0u6FY7Kq1u9ktnbQ9uJ4g2FUXoIQc1tYJsDr0j:AwFEjSOJbuYphkZQ9uJX22TQc1qJwa
                                                                                                                    MD5:DDCE5ED235CCBFFDA3F3735F75F80C0F
                                                                                                                    SHA1:F266C24FA6F01459F51C97ADB00523BD214C653C
                                                                                                                    SHA-256:78EB4A3213EBE7BB95F87D206AE29064D514628E6A430334D0E13756AA131DE5
                                                                                                                    SHA-512:A0C70871BC52467524A0107F09B93C1BE11FFBD9CF68E1F3C567F97B0F810AA5B0CEE584AE1BA720F4A0B30F42E4290A06E99B9EA640437B0DABF158F2DB0625
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/th?id=OHR.Olympics125_ROW9889344454_1920x1080.jpg&rf=LaDigue_1920x1080.jpg
                                                                                                                    Preview: ......JFIF.............C............................................ "" .,,,.3333333333...C............................. ...... .......## ##,,),,3333333333......8....".......................................S........................!1A.."Q2aq..B...#R...b.3r....$C.....4Scs..%DT...u.5t....................................B.....................!..1AQ."aq.2.......BR..#br.$34..C....Ss...c............?.#...9.%qx..fL.Z..+p.....+...X.2m..,..X.<..W...}Dk.\J....f9.~.....b.../.7C&.V.Y.9`.|.rV0'>.9........3._>.6.@...ML-...+].Q......]......'>.`e..W>.9.......|.d...>.9..VJ.Es./.%e....,..y.7.....l.........g.4.3g)..d.99Bk....+r.:e$.ca.SH.|.........m...}.YRO9...j.vd..9V..5..@e...{.<hA...:........9K#.....q.H...`....q>NiF=.[..2C.8X...*......L(.{.....s.3.W.!....{^..'..~....9.!..^A.y...1.A..[......I!a....i ..)L.D.D.8#.{../.0.\.M..r..qg3...t.N..^....L.I3'.........eQ.`3{........Yh...sK...k..I...m.o.t^%e...O..e&a.....9..v.x....&.E!.e..p.....n.UQ.x$S\........1}DqH
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\th[2].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 150x150, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):5038
                                                                                                                    Entropy (8bit):7.913300499070733
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:pPEvzuSDKiT+ERod8yBN0X/HmlRJJ+Fn8h3fzh+LZvwk:pPOCSmHhW/H4JJ+F8xzh+L9wk
                                                                                                                    MD5:B4253CC44B582EBE891CBCDF0EF5CA8B
                                                                                                                    SHA1:2D179CB4C761077F9EFB53625FE0B34D01AE3107
                                                                                                                    SHA-256:9358906D6A9154E881A96AA4E9EDED3CCFDF3DC87B1B922B8FC4C09B970130F5
                                                                                                                    SHA-512:6D3EA094D383E370E85CBDD445B76D8B2986B3F175145F8DB93112A63E48DF8FA1877BBFD25C2CA73CE66B2C1DECF7FAB01D9556855CF9DD1F9462D4432F608B
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/th?u=https%3a%2f%2fimg-s-msn-com.akamaized.net%2ftenant%2famp%2fentityid%2fBB1flcl7.img&ehk=n4zxNzUaGmaWvZYudQOxjiEm8O7nfdAvG5P6LGtz8zo%3d&w=150&h=150&c=8&rs=2&pid=WP0
                                                                                                                    Preview: ......JFIF.....,.,.....C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..(...).C$..$gbp..z=.P..`Tz...i.&..+nO._..f7'......:........[ ..zf..a..E.U.(...(...(...(...(...(.6v.....!..V.k.@......N...>...Rxc.7:.i......#.cz..k.4..[i6...bL1c......../.8./.Iob.D+....#,.s..O.I..U7......z|.i2m.Y...[..j......Xjodp'HXG..sw>.kJ...Fv2..(..z...D.9L.....b..-./..'....U....t..:}...DV-.u....>u..y...b...Xn.)' ..:........<>t.e..0...U....=.oN..f...8.(
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\th[3].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 150x150, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):6321
                                                                                                                    Entropy (8bit):7.930428341817175
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:pPEFWBYC3qBZJigkG/FdQS5zwu3LHBaWc4TUpz35BH7zQx5+FixuTKn7xF:pPGYYCaHsSdQSy8LHBaV4TU15tnQub2F
                                                                                                                    MD5:AFF39E85868825504E8463C5CDD11BD7
                                                                                                                    SHA1:DEF891B9A50BA0F8DA20DC93D5DFD80FFE330478
                                                                                                                    SHA-256:17C3E9E4228BCBF6E56795D6D8539791483D4B1A07E4A542F32282D99C94FB75
                                                                                                                    SHA-512:019D7C4382FEEC7EA3E7E26C20620327A9644A10AA13AEA9161C70DB8AAAD22BE452D4AF3D25E2C153C875BBA7D7C4B68D1EB2E128A212FB3E95C1F2568D9EB7
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/th?u=https%3a%2f%2fimg-s-msn-com.akamaized.net%2ftenant%2famp%2fentityid%2fBB1fkGZS.img&ehk=QmtuVlo%2bL0J6PRmZTHf5eMhHSpsWN3gSG5N88RqgPWU%3d&w=150&h=150&c=8&rs=2&pid=WP0
                                                                                                                    Preview: ......JFIF.....,.,.....C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..4.._.]...O..X...k...^=.D........k.m.H..$....C.kP[I,%.K..........G\....x..v....B.......?..uT....K.q.Kn".YV01.x.3A..O.I.a:......R.!.#.e..YSqv{y....=y^...f......W.Yx...!.d.........+..\.....h.....S.L../X{.2..V...^.*q../Q[...f.....)...m..z..#.d.......v.~&.......#.V..A..z..W.i..O.B.HF2Y....T. ..FO..7....*G...xJ....r}.........;....';...P..N.G.R?..T.fq..........x
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\th[4].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 150x150, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):3742
                                                                                                                    Entropy (8bit):7.867632755628144
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:48:pyYcuERAFyZuPbJdd/1D9uU8lPjsEO/pjKnTLdyW+Tm8bV8SANcggbCPdXBUAxaB:pPECyZ6DEU8SEOOLuSMHBggupBBYBzf
                                                                                                                    MD5:76A08CC374F645ADFD2D574AEA9E1F67
                                                                                                                    SHA1:EF6301792289F45E1914290BD3901BE5C3C08ED7
                                                                                                                    SHA-256:6D4A8E2E63961DF63F503AC5A323D9FAD4F738E8720BD98C9A302794CB62847C
                                                                                                                    SHA-512:19AADD5296DEA0C5F8D8165911C2ABF00A7BED8E98C7090448664715E99559D92DE6D6196EBE8D7A546A33704BD36A596A85F847DFFBAA3C2BC6E818707F31BA
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/th?u=https%3a%2f%2fimg-s-msn-com.akamaized.net%2ftenant%2famp%2fentityid%2fBB1fjVGq.img&ehk=CUJArgAlYOIs%2fdufnie%2fHn0v5FuoJklhhKQfEtkFJ8I%3d&w=150&h=150&c=8&rs=2&pid=WP0
                                                                                                                    Preview: ......JFIF.....,.,.....C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..r).r)..4..T..(..........'....m.m./....cjd..$D ..v...qj........}+SN.}.p.Y.F..*[CQfI.Y..1......>.....!..8..2@.U....Yn.9..F..[....0.o.#)R.@....z3..o..$..3.1....{..%OQ......S..!$}.{}k............y....-Y.KF)qV .!....G....|..K.@.R.J.3.-S(..W..~*......+CD...lZ..(d...P.b.?6.P3....Q.j7.}.4t...........8.......X.YC5.ae.....V"....n.0'..i.`.....a.v (fo....S....S\.
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\th[5].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 150x150, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):4103
                                                                                                                    Entropy (8bit):7.905624591549082
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:pPE7azjJGnUjIWZ3fWfX6c11tzgyuBDgYNgdZ/z:pPQkJHsccXV11tzgDBDgYaz
                                                                                                                    MD5:D79048C62D1919EBD68359F962DE7D0C
                                                                                                                    SHA1:56CA765E294DD844FCD7D56339AC81647DEF4D8E
                                                                                                                    SHA-256:92B97018B5A41B256E26BDCB5764E3076A44FF3B2DD3C89FC3E1C20A024EA559
                                                                                                                    SHA-512:1F91EC0DF06E58899F1EC644F654C1CE069DDFC6DFB6B8F545B6C66D71867797D420D899D7152EE99729B86888589E3FBED27CE56277B3B2DB3C4FFD829AEA4B
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/th?u=https%3a%2f%2fimg-s-msn-com.akamaized.net%2ftenant%2famp%2fentityid%2fBB1fiIcx.img&ehk=u4rkWZofWQoQJ11NQ%2fu8JYLsufAv%2fujiPAfuy3supnc%3d&w=150&h=150&c=8&rs=2&pid=WP0
                                                                                                                    Preview: ......JFIF.....`.`.....C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..H..C...7CVWED..1a..-.....<R].O....(..6...w..T.R..mS..6.%.@b.......Uf...C.%.o..T....M..N...]Iw4P..<[.I.3).)$... d{sM..g.V..S...~..W...khU}H..B.)\.!..&'M.F..f.:.'#.tFI..b2)P..U.`..m;.%".......AKE..))i. .......bo.j.......A..4.,...<.K4.$..pOz.........-:..... .'''.....v..T.\g.O.=MQ.E..fV..|.l/....U.....ZRB..Q.~..V.....K.o(r.E.....t$.....P.<H..3.~......{.
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\th[6].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 150x150, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):6319
                                                                                                                    Entropy (8bit):7.921601448672384
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:pPE3Um+CGqdS0RiboPJ5pa8ao3aO+MmlFKzJC1u/b8D8z2Lu0J+Vwe7qC:pPWrpU+5Rao3/LmuzJCM/bzgAz
                                                                                                                    MD5:35639C3C895B57D5E4B5F764ABE5D940
                                                                                                                    SHA1:269D5DE5F01924ADF9665A9F4D163EA553794BAA
                                                                                                                    SHA-256:EA18037D4EB9771263CCA340B2AD31DA0CA807DAE7CDF8FD437266A853DE3D00
                                                                                                                    SHA-512:6EB07EF59332D95985DA086B8FC1CA8A762D31CC6FCC14418C736CF211FB5B06381F876BF77C334C7140800BA5DBDEB1EAF07A401E47F0C4ABDEAD2D83638982
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/th?u=https%3a%2f%2fimg-s-msn-com.akamaized.net%2ftenant%2famp%2fentityid%2fBB1fkJLx.img&ehk=ab4NFwKPiOUcoMjMzCCRK%2fouai5ROn4RlXwrt3nrHLY%3d&w=150&h=150&c=8&rs=2&pid=WP0
                                                                                                                    Preview: ......JFIF.....,.,.....C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?....L..]..:0..!t3<.....?x}k....tEgv..")ff'........s.....Q..=...S....W.z....x...........X......}..Z......[}....\......>....X(6i*.lbi..u[..P...O...y..E..l...%..:....Qwu.?...qz..u._r.|.B...........M(..$.p...).9.z....zW......[......?C.m...dE..(.h.M.....v<..q..S6Yn...G.<....T.>V..|T.O]>............-.....j.?L..X....S.@.H...L...P".Y..TT...~O..!..n....ecp.n..H...
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\th[7].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 150x150, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):5639
                                                                                                                    Entropy (8bit):7.924649163999842
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:pPECr5OAvlqY/K2/QGjfn7I0xXDUduR+Ksxd18Up0FlXDmR6vhOjUEbDdl:pPnOAvlh/KXGf7LxXDUd2kd6XbbOgEbT
                                                                                                                    MD5:CB467408920B249304F096825FAD3555
                                                                                                                    SHA1:34B1FB66BB1993D6F421D03E60571B2D6B8BD82B
                                                                                                                    SHA-256:6244F0B65FD5FDB55035289E22AE746FDA4FB8A73FA5099AC1765FE40EBF15F3
                                                                                                                    SHA-512:66499CCD7720806D8D469F36F1BA68B8654C4113F6EC8952C30B0B7A5456CE7B942E53538902653231505407003DF5D6EC55402114F39FEB6EE135B6B803BC60
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/th?u=https%3a%2f%2fimg-s-msn-com.akamaized.net%2ftenant%2famp%2fentityid%2fBB1fk8uF.img&ehk=3yVhb5eiLjVCrnzpfMt8vNf6P4rYdQzaUR6b8msklWU%3d&w=150&h=150&c=8&rs=2&pid=WP0
                                                                                                                    Preview: ......JFIF.....,.,.....C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?....I.5Zo1..{V}.W..3.w...@..>..^...8I.U..b..k........<..1J".[..>..."f...`.U...$V..C...ZfzF...V.R...-....r=G4.....LD....[.D\..*....w.h..R1&..z...'.1.#..i.w..{PH*p.@/..B..&..9..{]].0..{.RT....>.....0.Y.Q...3[).....q.....>.}OX...Y..:....r.@k.@..Fy0.<....i.j.......t.9\gp..j.v...~.+..#...&q.5zH.JYW.cry.,...9o.3..r...G .z..j.'..{X.-t..(S8.;...Q....N.<...._....'..Z.:.
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\BJp5dDFvoQm12CHBfp4PC6aiyg4.gz[1].css
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):73202
                                                                                                                    Entropy (8bit):5.307816444057117
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:1536:kcGJTL/mKzAAFl7JlsG0GRe1cxnoWC1kuyOYkTs/Kun:LGJ4AFl7JlsG0GRCcxnoWC1kuyOYkT0
                                                                                                                    MD5:C912DA2683E71660357A600EE34A7873
                                                                                                                    SHA1:5DFD028307D4CD8A66492E807B848FEC177AEC3A
                                                                                                                    SHA-256:525D57B5D38D8212993C66A33F4CD15EDBD0F260A5AFCF539D092047A908D6EE
                                                                                                                    SHA-512:31E2A56C27CC037AD903292DFA518E86642C2A610E9923DD4F7A2FD1347167E042E957A85E98561CC9178318D121DEA3EF165F88EEC79915D0687939DC25BBC9
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/BJp5dDFvoQm12CHBfp4PC6aiyg4.gz.css
                                                                                                                    Preview: .scopes{color:rgba(255,255,255,.8);display:inline-block;left:0;white-space:nowrap;list-style:none;line-height:39px}.scopes.sc_hide{display:none}.scopes .scope{font-size:.8125rem;cursor:pointer;vertical-align:middle;margin-right:36px;background-repeat:no-repeat;position:relative;display:inline-block}.scopes .scope:hover,.scopes .scope.focusin{color:#fff}.scopes .scope:hover .overflow_menu,.scopes .scope.focusin .overflow_menu{transform:none}.scopes .scope:focus-within .overflow_menu{color:#fff;transform:none}.scopes .scope a{color:inherit;cursor:pointer;text-decoration:none}.scopes .scope.dots{margin-bottom:8px;font-weight:bold}.scopes .scope.dots:before{display:inline-block;content:'. . .'}.scopes .scope.dots.hover_focus:focus{outline:none}.scopes .scope .overflow_menu{color:#666;cursor:pointer;transform:scale(0);position:absolute;background-color:#fff;border-radius:6px;padding:4px 0;box-shadow:0 4px 12px 1px rgba(0,0,0,.14);min-width:155px}.scopes .scope .overflow_menu .overflow_item{
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\FvkosEDIbuCPhD1mwLAN-LJ7Coc.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):328
                                                                                                                    Entropy (8bit):4.873055432724158
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:6:qLYyKBrT1rDvMhkXkJGf9FM/fwT0EqeGXGQW4RiXUqkvJOyEFnVQE4MDUKOKHsM:yWFBb3yG3cJO1Vi5rgsM
                                                                                                                    MD5:CDDDAB121EB434876615391AD4107B9A
                                                                                                                    SHA1:8038444C80B8E76DDF8AE5C00AB5784207E5AEFF
                                                                                                                    SHA-256:243D212A9FF764CCDA9B19C3C823B2F408A0718E56A3E7A8B5B533E108DB56CB
                                                                                                                    SHA-512:1964D190BF10B9D686626097188B6D0B2A02C0039993D97A135355D8A44399DED3D42465D1EDC7B55287AA9380835373FD921C00CF92CE234CCE92B0C2453084
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/FvkosEDIbuCPhD1mwLAN-LJ7Coc.gz.js
                                                                                                                    Preview: var BingAtWork;(function(n){var t;(function(n){function t(t){t.isAuthenticated&&n.raiseAuthEventAndLog(t)}function i(n){n&&n.length==2&&t(n[1])}n.bindToConditionalSignIn=function(){sj_evt.bind("ssofirstquery",function(n){return i(n)},!0,null,!1)}})(t=n.ConditionalSignIn||(n.ConditionalSignIn={}))})(BingAtWork||(BingAtWork={}))
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\HdepnBaFj-yarvouFUIlfV4Q9D8.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):3201
                                                                                                                    Entropy (8bit):5.369958740257869
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:48:rmo6TIPx85uuYPXznTBB0D6e7htJETfD8QJLxDO7KTUx42Z3rtki:sYuYPXznb0DR7dw8QhIWTQrt7
                                                                                                                    MD5:4AADD0F43326BAD8EFD82C85B6D9A20E
                                                                                                                    SHA1:4093FC4AB9821B646D64C98051A1CF0679CB2188
                                                                                                                    SHA-256:968849A1E6AAED249C78B6CF1AF585AB6C8482A8C5398AB1D2DC3CB92E9EA68F
                                                                                                                    SHA-512:616B06A6E3B2385E5487C819FC7F595D473B2F14E8CB76EFB894EDEAB3B26D2C9B679A9B275D924BECC37E156C70B0B56126CCFB62C8B23ABBA9DE07BD93D72A
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/HdepnBaFj-yarvouFUIlfV4Q9D8.gz.js
                                                                                                                    Preview: var __spreadArrays=this&&this.__spreadArrays||function(){for(var i=0,n=0,r=arguments.length;n<r;n++)i+=arguments[n].length;for(var u=Array(i),f=0,n=0;n<r;n++)for(var e=arguments[n],t=0,o=e.length;t<o;t++,f++)u[f]=e[t];return u};define("clientinst",["require","exports"],function(n,t){function it(){a=0;u()}function u(){var n,s,t,o;e&&clearTimeout(e);for(n in i)if(i.hasOwnProperty(n)){s=n!=_G.IG?_G.lsUrl.replace(_G.IG,n):_G.lsUrl;for(t in i[n])i[n].hasOwnProperty(t)&&(o=b+s+"&TYPE=Event."+t+"&DATA="+f("[")+i[n][t]+f("]"),ut(o)||(g().src=o));delete i[n]}typeof r!="undefined"&&r.setTimeout&&(e=r.setTimeout(u,w))}function rt(){return _G!==undefined&&_G.EF!==undefined&&_G.EF.logsb!==undefined&&_G.EF.logsb===1}function ut(n){return rt()?ft(n,""):!1}function ft(n,t){var i="sendBeacon",r=!1;if(navigator&&navigator[i])try{navigator[i](n,t);r=!0}catch(u){}return r}var y,d,i,g,o,p;t.__esModule=!0;t.Wrap=t.Log2=t.LogInstrumented=t.Log=t.LogCustomEvent=void 0;var r=n("env"),s=n("event.native"),h=n("e
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\MDr1f9aJs4rBVf1F5DAtlALvweY.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):257
                                                                                                                    Entropy (8bit):4.781091704776374
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:3:qMH4WXMHwmnIB4JmhyfAIB4Jmml0X2IUJIB4JrNOsK1A4JWW7jKYHVA4JRGYdA4S:q6XzD4jr43ldI74FNQlNj7jM9TlMlbSr
                                                                                                                    MD5:51A9EA95D5ED461ED98AC3D23A66AA15
                                                                                                                    SHA1:62FBB857B873BD79BEE7F16D0766A452FA2798A3
                                                                                                                    SHA-256:A5B4181611E951FAECD6C164D704569C633E95FE68D3D1934B911A089EBF70E8
                                                                                                                    SHA-512:CEE4231894F82627E50EC746D7C150E5303A1BF8864D7B084173B9D17663A27CC2915F5D0D4DC0602FE26D9EAA10DD98CF3422E7601F520EF34D45C9A506D6F7
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/MDr1f9aJs4rBVf1F5DAtlALvweY.gz.js
                                                                                                                    Preview: var BM=BM||{};BM.rules={"#sc_hdu":[-1,-1,1],"#hp_id_hdr":[-1,-1,1],"#hp_container":[-1,-1,1],".hp_sw_logo":[-1,-1,0],".b_searchboxForm":[-1,-1,0],"#crs_pane":[-1,-1,0],"#sb_foot":[-1,-1,0],"#sh_rdiv":[-1,-1,0],"img,div[data-src]":[-1,-1,0],iframe:[-1,-1,0]}
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\MstqcgNaYngCBavkktAoSE0--po.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):391
                                                                                                                    Entropy (8bit):5.184440623275194
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:12:2Qxjl/mLAHPWEaaGRHkj6iLUEkFKgs5qHT:2QC8H+aGRHk+i1kFKgs5qHT
                                                                                                                    MD5:55EC2297C0CF262C5FA9332F97C1B77A
                                                                                                                    SHA1:92640E3D0A7CBE5D47BC8F0F7CC9362E82489D23
                                                                                                                    SHA-256:342C3DD52A8A456F53093671D8D91F7AF5B3299D72D60EDB28E4F506368C6467
                                                                                                                    SHA-512:D070B9C415298A0F25234D1D7EAFB8BAE0D709590D3C806FCEAEC6631FDA37DFFCA40F785C86C4655AA075522E804B79A7843C647F1E98D97CCE599336DD9D59
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/MstqcgNaYngCBavkktAoSE0--po.gz.js
                                                                                                                    Preview: (function(){function n(){var n=_ge("id_p"),t,i;n&&(t="",i="",n.dataset?(t=n.dataset.src,i=n.dataset.alt):(t=n.getAttribute("data-src"),i=n.getAttribute("data-alt")),t&&t!=""&&(n.onerror=function(){n.onerror=null;n.src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNgYAAAAAMAASsJTYQAAAAASUVORK5CYII=";n.alt=""},n.onload=function(){n.alt=i},n.src=t))}n()})()
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\NGDGShwgz5vCvyjNFyZiaPlHGCE.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):252
                                                                                                                    Entropy (8bit):4.837090729138339
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:6:qbLkyK4hImTzBwhLM1whA+XzFE8KSiQLGPQQgnaqza:IQD2IkzaLMGAMzDBVKY+ia
                                                                                                                    MD5:1F62E9FDC6CA43F3FC2C4FA56856F368
                                                                                                                    SHA1:75ADD74C4E04DB88023404099B9B4AAEA6437AE7
                                                                                                                    SHA-256:E1436445696905DF9E8A225930F37015D0EF7160EB9A723BAFC3F9B798365DF6
                                                                                                                    SHA-512:6AADAA42E0D86CAD3A44672A57C37ACBA3CB7F85E5104EB68FA44B845C0ED70B3085AA20A504A37DDEDEA7E847F2D53DB18B6455CDA69FB540847CEA6419CDBC
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/NGDGShwgz5vCvyjNFyZiaPlHGCE.gz.js
                                                                                                                    Preview: var Button;(function(){WireUp.init("button_init",function(n){var t=n.getAttribute("data-appns"),i=n.getAttribute("data-k");sj_be(n,"click",function(){Log.Log("Click","Button","",!1,"AppNS",t,"K",i,"Category","CommonControls")})})})(Button||(Button={}))
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\NewErrorPageTemplate[1]
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):1612
                                                                                                                    Entropy (8bit):4.869554560514657
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                                                                                                                    MD5:DFEABDE84792228093A5A270352395B6
                                                                                                                    SHA1:E41258C9576721025926326F76063C2305586F76
                                                                                                                    SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                                                                                                                    SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                                                                                                                    Malicious:false
                                                                                                                    Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\RXZtj0lYpFm5XDPMpuGSsNG8i9I.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):1220
                                                                                                                    Entropy (8bit):5.024732410536042
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:24:6Vj1V5FrGj6BBEEo6maDU6CWi4dDRRE0Slc7qHy5++vY:8v5TBG6U6C+DLSiL+P
                                                                                                                    MD5:E34F2CDADA9986F52CCFAB129645ABAC
                                                                                                                    SHA1:93FF6CA74EB48A6825F9BC21BEE52159987C0A82
                                                                                                                    SHA-256:79C181E7D29CF735AE99FD86C42934D7FD6FB51E6481D788E1CB812C7DC63DF6
                                                                                                                    SHA-512:671EF1DB12BEE74E8E6BAEE8850F4F6A278E51F2236A851A24D889CE40040273088B2D206F2AA42BD1475F4F88F7B4420BC4CE6922023DE205308C56A3C96A4C
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/RXZtj0lYpFm5XDPMpuGSsNG8i9I.gz.js
                                                                                                                    Preview: var Feedback;(function(n){var t;(function(){"use strict";function u(t,i){var u=t.getAttribute("id"),f;u||(u="genId"+n.length,t.setAttribute("id",u));f=new r(u,i,t.getAttribute(i));n.push(f)}function i(n,t,i){i===null?n.removeAttribute(t):n.setAttribute(t,i)}function t(n,t,r,f){for(var e,s=_d.querySelectorAll(r),o=0;o<s.length;o++)(e=s[o],f&&e.id&&f[e.id])||(u(e,n),i(e,n,t))}function f(n){for(var u=_d.querySelectorAll(n),e=1,f={},t,i,r=0;r<u.length;++r){if(t=u[r],!t.id){for(;;)if(i="fbpgdgelem"+e++,!_ge(i))break;t.id=i}f[t.id]=t}return f}function e(){var i="tabindex",r="-1",n=f("#fbpgdg, #fbpgdg *");t(i,r,"div",n);t(i,r,"svg",n);t(i,r,"a",n);t(i,r,"li",n);t(i,r,"input",n);t(i,r,"select",n);t("aria-hidden","true","body :not(script):not(style)",n)}function o(){for(var r,t=0;t<n.length;t++)r=_d.getElementById(n[t].id),r&&i(r,n[t].attributeName,n[t].originalAttributeValue);n.length=0}function s(){typeof sj_evt!="undefined"&&(sj_evt.bind("onFeedbackStarting",function(){e()}),sj_evt.bind("onF
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\Xp-HPHGHOZznHBwdn7OWdva404Y.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):576
                                                                                                                    Entropy (8bit):5.192163014367754
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:12:9mPi891gAseP24yXNbdPd1dPkelrR5MdKIKG/OgrfYc3tOfIvHbt:9mPlP5smDy1dV1dHrLMdKIKG/OgLYgtV
                                                                                                                    MD5:F5712E664873FDE8EE9044F693CD2DB7
                                                                                                                    SHA1:2A30817F3B99E3BE735F4F85BB66DD5EDF6A89F4
                                                                                                                    SHA-256:1562669AD323019CDA49A6CF3BDDECE1672282E7275F9D963031B30EA845FFB2
                                                                                                                    SHA-512:CA0EB961E52D37CAA75F0F22012C045876A8B1A69DB583FE3232EA6A7787A85BEABC282F104C9FD236DA9A500BA15FDF7BD83C1639BFD73EF8EB6A910B75290D
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/Xp-HPHGHOZznHBwdn7OWdva404Y.gz.js
                                                                                                                    Preview: var SsoFrame;(function(n){function t(n){if(n&&n.url&&n.sandbox){var t=sj_ce("iframe"),i=t.style;i.visibility="hidden";i.position="absolute";i.height="0";i.width="0";i.border="none";t.src=decodeURIComponent(n.url);t.id="aadssofr";t.setAttribute("sandbox",n.sandbox);_d.body.appendChild(t);n.currentEpoch&&sj_cook.set("SRCHUSR","T",n.currentEpoch,!0,"/");Log&&Log.Log&&Log.Log("ClientInst","NoSignInAttempt","OrgId",!1)}}function i(n){try{n&&n.length===2&&t(n[1])}catch(i){}}n.createFrame=t;n.ssoFrameEntry=i;sj_evt.bind("ssoFrameExists",i,!0,null,!1)})(SsoFrame||(SsoFrame={}))
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\errorPageStrings[1]
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):4720
                                                                                                                    Entropy (8bit):5.164796203267696
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                                                                                                                    MD5:D65EC06F21C379C87040B83CC1ABAC6B
                                                                                                                    SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                                                                                                                    SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                                                                                                                    SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:res://ieframe.dll/errorPageStrings.js
                                                                                                                    Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\hceflue5sqxkKta9dP3R-IFtPuY.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):426
                                                                                                                    Entropy (8bit):4.904019517984965
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:12:2gcmRRt9Y4LF1Zd4XV4LFUXCdg/qUWYzP++xAQI:2gcmRRFfgiUb6MAj
                                                                                                                    MD5:857A0DE0BBF14F3427A1AFA5CD985BCE
                                                                                                                    SHA1:0C1D2E767F07E5C0F14EA64980DB213D379CC6F7
                                                                                                                    SHA-256:3ED65F33193430C0B9DB61FFE7F5FE27B29F86A28563992C3AFC47D4C22C23D7
                                                                                                                    SHA-512:E7F2603855A16464417B772517676F080CCEFFB8069C687BAC798B7EB2875FCDC207E40E8C56E7CFFD4D56CED572270988599D1D2B73FB8AAA7FDD076FE3E7B7
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/hceflue5sqxkKta9dP3R-IFtPuY.gz.js
                                                                                                                    Preview: (function(n){function i(){var i=document.documentElement,r=document.body,u="innerWidth"in window?window.innerWidth:i.clientWidth,f="innerHeight"in window?window.innerHeight:i.clientHeight,e=window.pageXOffset||i.scrollLeft,o=window.pageYOffset||i.scrollTop,s=document.visibilityState||"default";n.enqueue(t,{x:e,y:o,w:u,h:f,dw:r.clientWidth,dh:r.clientHeight,v:s})}var t="V";n.wireup(t,{load:null,compute:i,unload:null})})(BM)
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\pXscrbCrewUD-UetJTvW5F7YMxo.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):511
                                                                                                                    Entropy (8bit):4.980041296618112
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:12:yWF4eguIWKvU9bEMsR5OErixCvJO1Vi5rgsM:LF4mKctEMYOK4CvJUVYM
                                                                                                                    MD5:D6741608BA48E400A406ACA7F3464765
                                                                                                                    SHA1:8961CA85AD82BB701436FFC64642833CFBAFF303
                                                                                                                    SHA-256:B1DB1D8C0E5316D2C8A14E778B7220AC75ADAE5333A6D58BA7FD07F4E6EAA83C
                                                                                                                    SHA-512:E85360DBBB0881792B86DCAF56789434152ED69E00A99202B880F19D551B8C78EEFF38A5836024F5D61DBC36818A39A921957F13FBF592BAAFD06ACB1AED244B
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/pXscrbCrewUD-UetJTvW5F7YMxo.gz.js
                                                                                                                    Preview: var BingAtWork;(function(n){var t;(function(n){function t(t,i){var u,r;t.isAuthenticated&&(n.raiseAuthEventAndLog(t),u=_ge("sb_form_q"),u&&(r=u.getAttribute("value"),r&&(n.fetchLowerHeader(r),n.fetchScopeBar(r),i.notifEnabled&&i.notifFetchAsync&&n.fetchNotificationConditional())))}function i(n,i){n&&n.length==2&&t(n[1],i)}n.bindToConditionalSignIn=function(n){sj_evt.bind("ssofirstquery",function(t){return i(t,n)},!0,null,!1)}})(t=n.ConditionalSignIn||(n.ConditionalSignIn={}))})(BingAtWork||(BingAtWork={}))
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\svI82uPNFRD54V4bMLaeahXQXBI.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):425
                                                                                                                    Entropy (8bit):4.963129739598361
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:12:2gXsmzwKN0yApFkRLNF1Jfa1VTWPMg9pIGywV:2gX9zwKN0yAqr1Jfa1V059V
                                                                                                                    MD5:016ECFDB34031F881FA5E34DFBD0B7A1
                                                                                                                    SHA1:16D3BA1049939D00AE47AAD053993B4762D9B102
                                                                                                                    SHA-256:08021ED3BCA5532304B597E636BEB939FF7BAA6D08DCA4E94C0DDE1FDF940389
                                                                                                                    SHA-512:D61045D1F07ED241626B8233D388F5E1AD54DBE224871E1CE872ECFD0E29F05A21F0EA02FFDE688FACB134DD969533615493BD35EBA4D5E755840C30A687EE00
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/svI82uPNFRD54V4bMLaeahXQXBI.gz.js
                                                                                                                    Preview: (function(n){function f(){u(sj_be,r)}function r(i){return i&&n.enqueue(t,i),!0}function e(){u(sj_ue,r)}function u(n,t){for(var u,r=0;r<i.length;r++)u=i[r],n(u==="resize"?window:document,window.navigator.pointerEnabled?u.replace("mouse","pointer"):u,t,!1)}var t="EVT",i=["click","mousedown","mouseup","touchstart","touchend","mousemove","touchmove","scroll","keydown","resize"];n.wireup(t,{load:f,compute:null,unload:e})})(BM)
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\test[1].htm
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):64
                                                                                                                    Entropy (8bit):4.373593025747649
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:3:UMs1TE5LH0cHrJU4YCf:U37cVUof
                                                                                                                    MD5:E82D9BD501B46DF5CB2B650AF9E1B126
                                                                                                                    SHA1:0FE6876226E88D8104ED51CB6329EB172BBA8D68
                                                                                                                    SHA-256:C2BA8FCCFC980BCC8FC24E7A41BFCFEE88CCA9331C8D4D62890D7DFAB4A12226
                                                                                                                    SHA-512:D3715E6A3C9012F2D8E1269E5C4B3E2F77FD2CD8E793AD39E51F1E1BE30F0818DDD01FAF3708EF789FDF347B92C6477C10A1155DEC582FF68185CBFD41C662E4
                                                                                                                    Malicious:false
                                                                                                                    Preview: IPv6Tests.TestIPv6Response('{&quot;type&quot;: &quot;4&quot;}');
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\th[1].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 150x150, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):5777
                                                                                                                    Entropy (8bit):7.917920871216737
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:pPEQBGjpz1df7dAJrDp5OiC9PchAeKBc9VSwpCcGpZcU1DwGO1pHRsKdDcn:pPTBGjlrf7dNchnrCnZcUwG4Rldon
                                                                                                                    MD5:7D10F16EA455E49470853BE05415E27E
                                                                                                                    SHA1:0370FE7D24274A9A5909355C042EBBF9E795FD85
                                                                                                                    SHA-256:1DB14FB96D4E49265DEFB60E98BD6C39A2724B1EBC21D50E0F2E60F3859EE93A
                                                                                                                    SHA-512:DF233159BC504BA5C8D8759AE631A2D5CE9AB48060EDC84EEF2674749AEE1D5E0A3B5BD5AE8EF3F54FDFBBD1F7FE0B9D26FD1FC99593DAC78396EE2209CE1B0C
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/th?u=https%3a%2f%2fimg-s-msn-com.akamaized.net%2ftenant%2famp%2fentityid%2fBB1flksC.img&ehk=H0FCoWHkkRHx9dwEmzqiKOqgx9bfKAuVCxCQfuDoLvw%3d&w=150&h=150&c=8&rs=2&pid=WP0
                                                                                                                    Preview: ......JFIF.....,.,.....C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....;@..^H[~O.=..l.5.s......8......%'=..Hd.q..?.W'..... .;..J$...=.E$.P1.h../..7.z......ZxF.....f1...R.~...i\v!..... .>...u!...9........\<.I..A....8......#....-.....h..|.#tcV..e....1Q.A..W].qV..*..B.i$.z7...Kz.(..l7.#....T?3...o7..H..c(..O..qYF-d.w.\.#.P...y..Hn&~J.S.c5j..6..c....b...N6.L..F.=..M.(.dw..2....f.ce;GC..W*.x|......*5.....4....v!.c.t4.+7.9.5".J
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\th[2].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 144x144, segment length 16, baseline, precision 8, 150x150, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):4662
                                                                                                                    Entropy (8bit):7.906652539569635
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:pPE9fuJsPbx60IPg+MMuPecZoXnNRLW/wG+fWRY:pPaf7bx6rg+7XnNRnGRY
                                                                                                                    MD5:49A2DFF8082FCF50F4311C7867ECEDAD
                                                                                                                    SHA1:A125B14C82BFB9A78C711C13CC479FDD1C9266EA
                                                                                                                    SHA-256:442192ACEE743DBF8DBEC6A3BA8212AF4FDCFA1E08E96894168F11011176F525
                                                                                                                    SHA-512:088A01E123048CB37238D611B7F01218EEDDF846FF42875AEDB756D91819B06A131ED272067E66C76C538112C14F676213D6EC5EA4B0D353B68E7BE056F0F08A
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/th?u=https%3a%2f%2fimg-s-msn-com.akamaized.net%2ftenant%2famp%2fentityid%2fBB1fkzlb.img&ehk=VW7SkyKxbL7LXUGh4v%2fSqtV2Ju%2b%2fdtlvyipIBuf1oQo%3d&w=150&h=150&c=8&rs=2&pid=WP0
                                                                                                                    Preview: ......JFIF.............C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?....4..@.j.=AA9$....M..R.1..&...M#....:.C..@..?.!.=i.A.j..-.......*.`...".".sH.)s.Oj.z...T.O4...N.....wz.6.....=.....@.....E .(.P.w.M'&.z.Zg.4.....Tc.g.L..ny.(.i......C[..e.G...7{..Y.Ff.P...}.vvL..G....K.6.,..........a@..jve. .#"...c.m.8.X{.T..b..9....+..4X%?....Eq.v..N.L.#......P.T..<W/.L...>e9..{..ja<.j3..,Py.. ...h.t..J8...~R=...i..v.0.4Ss..RP..iI.R..9{.S..j^.CG
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\th[3].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 150x150, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):4602
                                                                                                                    Entropy (8bit):7.919085409507157
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:pPEQIac5U07wxonYM7ZCOPHZ3V4DItC+Es/YzbvLSLIBpxrDn5M:pPjeyynnlCoZ32In4TL6CHD+
                                                                                                                    MD5:8816AF91855EFB0BB97FAF7429A17E5A
                                                                                                                    SHA1:7FFA5A24554D8CA448E6D1F98A7AC31F36CB2FC7
                                                                                                                    SHA-256:1C54DB3F6FA0501AB0C6ACC1BFFC8629009F76BE5AA6DE4239FEB24E3C6AEBFC
                                                                                                                    SHA-512:F615D37B9E117B9E1A8DC287DC4FD5888BE85F8CB9E9C66E49B547A0D39696117716603225117D05D7E30734131D15A5C651EFD0B6E9DA546825352B25CCF082
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/th?u=https%3a%2f%2fimg-s-msn-com.akamaized.net%2ftenant%2famp%2fentityid%2fBB1fjIfk.img&ehk=fogkfx9NpBv%2brwC9WfPL2X5KtkEuDG5AjpDW%2f%2bCifdo%3d&w=150&h=150&c=8&rs=2&pid=WP0
                                                                                                                    Preview: ......JFIF.....`.`.....C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..XqBS.N)..i.,'..H..uH..(..(..5H..$..$...u$...j^/..]4.[...h.).z.V...+.jt1.7E'.).V/........O...(..c......8...!ei.|.Y.py...4...=...y_Q.....R{G2Z\4,9"'.........7.iz.>..p...zP..lz.)....<J.z..P..OZn).H......h.4P..>(.. S$..J.&.P...(.....e...Py......mjH...}.#.u..g..@.'.j...v.r.zd..kR..[...$.p......P.....".b|...9.....8_A.......9.i[J.Y.(#..[.:Ai.<".....k...;d.j:w.\.
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\th[4].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 150x150, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):5718
                                                                                                                    Entropy (8bit):7.9318718460651025
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:pPEJOqsYH47+dCCG6wRGFkXNcO8XOnW81LsImKDFLMwLXZUIEAWgKhE1:pPeOKH470Cv6wRGFSGO8kZ1L8+oiZUrg
                                                                                                                    MD5:5ABBBE53C535080AE3BE91FE6F0B93C1
                                                                                                                    SHA1:6A991409D0A6886057BBD0DC9AE71AAFB111E8C1
                                                                                                                    SHA-256:B692C27DDDA4FFE62BB2C57AA229EB9298EBDA7726BC227089CEEFDF5E05AD4C
                                                                                                                    SHA-512:2283634663D24B2C87399A5C562C5E73C68905BF799FD41367D15E4BCF336B5BA5511706998D9C439016799E56B20E5693BCCECA1D9037223D07659410570EC6
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/th?u=https%3a%2f%2fimg-s-msn-com.akamaized.net%2ftenant%2famp%2fentityid%2fBB1fkfuX.img&ehk=Al75D9k%2bIhZGZEnhR9bRctnjlt4TfOCoHOzqmGEyQNE%3d&w=150&h=150&c=8&rs=2&pid=WP0
                                                                                                                    Preview: ......JFIF.....`.`.....C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..5..Z...9.{...<....[w..G..W7;..........P.-%V.c..L.>....`A..5.i.".i..A.<.k.....^.Z..u.............8.....&.9.I........&..\l.>Ty(.xs...b..........U.*id...r....}zV...Xk>cm.*.[..5.(.u.F......P....;.x....{c..mxfR..........fk....;>..]....[H.u.eO.....4<..C..m.a.....J`..c...z....-.`.B.._.S._....!.......l9.N1...PZ.....z.N...)...M~/.i.p.y.H.b.xP}Y....k......4.X]).l.Fb
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\th[5].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 150x150, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):6795
                                                                                                                    Entropy (8bit):7.939267233088054
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:192:pPFWzMAm+TL7LZ895qWynOjJN52aPjP2D9a1R0:5FWmM7y7TZFNoaLc9Ai
                                                                                                                    MD5:140F382635756FE19E1CD67D8CDAB923
                                                                                                                    SHA1:1B0F1B61C068E01CE6FFDC5FFCADDD5E039D0DA5
                                                                                                                    SHA-256:216E799943B615F3EBF0FC09391810AF53FDE0EDCBEC4300F2B01B98AF346FAE
                                                                                                                    SHA-512:A7403C2FB1E2C858C3B3A1F6860441A8B820033E5D6E0049DF6922A1BFB0F74180A2538CFD82F292219629FB1FCA6AB8D3AAAA97129C4C86BC8D15FACDD405F3
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/th?u=https%3a%2f%2fimg-s-msn-com.akamaized.net%2ftenant%2famp%2fentityid%2fBB1fk3tJ.img&ehk=VNetxfVLBzRQk0Hk9PeD6wuxhnc6QG%2bQVORzTT762Ms%3d&w=150&h=150&c=8&rs=2&pid=WP0
                                                                                                                    Preview: ......JFIF.....,.,.....C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...3Fj.E.[.$\..M..+.ij.!...{..,........j\..|.\....>..7......}kVo.(bD..U...Pj....XO.......$.[..|....<...p._0..n*...k..O...D6.L.`....?..U-..D...f.......h.'z^(...&j...[h:S..."..........O.k.o...7..@..`.n.~R.....Px...m ;.3X...E........D..Cm.$..8>....F(...VrB.1..4S.....u.&.w.Oe3...1.C..2.....1..5.j......!&._..n.h...'.r.=I..y...Y..2.\....a$...$.;.$..v..,......YR..%.....;.N
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\th[6].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 150x150, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):4579
                                                                                                                    Entropy (8bit):7.899738415633208
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:pPElQIszgVi+8yJg1On37lfYKgsaU4AzO/wVie:pPk50gd8ysW5QKgizce
                                                                                                                    MD5:6252E142AFB55FA1C5DD093059E5B784
                                                                                                                    SHA1:FA2DEDFB97B7BF7B2D1052EA4B0DEC214E4217A1
                                                                                                                    SHA-256:24461B5094C1DC8AA9F6741AD78006FF35954478933E003E2CD036EA8E303EA4
                                                                                                                    SHA-512:A6156F1C962CE251B79C86F5A5B5BBA8C3D8C1060251CD69365C650D5BF2480ED14A6F36CFF4235BB0E53DC15903086CF901891B2DEEC050271A851D88C3DE21
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/th?u=https%3a%2f%2fimg-s-msn-com.akamaized.net%2ftenant%2famp%2fentityid%2fBB1fket7.img&ehk=x1iCxRdz8nKwKjWtFCBaxEx1tovE7Q0NcYc3bmTeH%2fI%3d&w=150&h=150&c=8&rs=2&pid=WP0
                                                                                                                    Preview: ......JFIF.....,.,.....C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..f..$H.."(.f'..rk..9.......B<...9.c.:...E,..........=...w........._h.....yttW=.....tr..>l0..+.fE.,z..s..js......5,......i......+.Cm=.3Sj.6.|.r...>.G.....W.Z.]){..i[..&.C...,.*A...s.u......s.S.>ni..t.;....OH..i.3N.R.[..2..7..*.#.}SP..O.X@......zt98.YzR..2..9.`Y..r..ZN.,..+9Tp.....C.cS.>.PT..X......S..8S..moJV..<.>..Z.U.).7ZV..!..h.0.S.\..eX5k)..Gp.O....J..
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\th[7].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 150x150, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):5109
                                                                                                                    Entropy (8bit):7.913384769447657
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:pPELkaw+eKa2pvAJqZbK+VEYjHOxNtlurSUmBjQFr5i8T:pP0kaw+eKXfG+VEYyx1eSUmBI5/T
                                                                                                                    MD5:27368154F2C3CF4EDEBC0A95CED35B43
                                                                                                                    SHA1:5CAE3ECA10C9A32BC77AF7AEE1E2944590B8BD37
                                                                                                                    SHA-256:4406423DC5F852B966777DE5272126839793C96251AB2F063A099C347BE396D9
                                                                                                                    SHA-512:8313894648ADD4EF180464FA901403AB911B67A256DE09ACA665D66BA9EAEAE62A67624C3985F3E22BE537E4E8764FD32BD85C06BE7C3CD37A2418FDAD963E0C
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/th?u=https%3a%2f%2fimg-s-msn-com.akamaized.net%2ftenant%2famp%2fentityid%2fBB1fk2g2.img&ehk=6LEOa661FEfcyTEYPdN22SbtYfGFBqG3UnhDMs6fDjo%3d&w=150&h=150&c=8&rs=2&pid=WP0
                                                                                                                    Preview: ......JFIF.....`.`.....C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...<V>..........l..y5..t.z.K.Z.o.8.Y....]N.e"^Jv....:.+..$K..m..v.}..v./0R._j.....w.?...=.0.g.E>`..>...P>.Gc]..3.mb=......Jq..M.H=k.k..B.dg.8.N.....3o .]..*z.P..?.O.9N(...M7i...}..v.}...|..9z+.}.....b;Q..cQZm.7....X...X.......1.c..IIK..k...b3.k.x..N{5q..|.\.:1.5Y.eQ..\.'...&..~.O+..9u.{...a].......|:.8Z,3.....C..l.....[z..V.-...Q.....x.......Y.g..q....mN.
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\uYzy_SF_Qx-quOm8IecsaqSoOd0[1].svg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):1400
                                                                                                                    Entropy (8bit):4.810462023135915
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:24:t4LxHXU4dxCey0fA53J/S/7/sG5BmefEqrR5GTGOby2NF2E/:+x3U4S55Z/aB5BmefEqrRYK6
                                                                                                                    MD5:2C4837A751CDB1A7366A56A0BD33EF59
                                                                                                                    SHA1:B98CF2FD217F431FAAB8E9BC21E72C6AA4A839DD
                                                                                                                    SHA-256:AA593C656009A40AC1782DD6FEE1EF31F9D4CCAD9F3F657DDF9A72C1EB7E553A
                                                                                                                    SHA-512:79DBB36F29034FCB52BA9C51A01346F9CEA694CAEBA9B149EEB66DB732B73C01C71FB7F4FBA892E67523E955153FAE4D0148C1024291CBBA0CBFC26FC5C8641E
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/uYzy_SF_Qx-quOm8IecsaqSoOd0.svg
                                                                                                                    Preview: <svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" viewBox="0 0 40 40" style="width:64px;height:64px;">.. <style type="text/css">.. .anim {.. animation-name: blink;.. animation-duration: 1s;.. animation-iteration-count: infinite;.. fill: #05E9F5;.. transition-timing-function: linear;.. }.. @keyframes blink {.. 0% {.. opacity: 0.. }.. 50% {.. opacity: 1.. }.. 75% {.. opacity: 1.. }.. 100% {.. opacity: 1.. }.. }.. .delay1 {.. animation-delay: 0s;.. }.. .delay2 {.. animation-delay: .125s;.. }.. .delay3 {.. animation-delay: .25s;.. }.. .delay4 {.. animation-delay: .375s;.. }.. .delay5 {.. animation-delay: .5s;.. }.. .delay6 {.. animation-delay: .675s;.. }.. .delay7 {.. animation-delay: .75s;.. }.. .delay8 {.. animation-delay: .875s;.. }.. </style>.. <circle class="delay1 anim" cx="20" cy="8" r="3" />.. <circle class="dela
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\6sxhavkE4_SZHA_K4rwWmg67vF0.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):20320
                                                                                                                    Entropy (8bit):5.35616705330287
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:Kh4xTJXiXZ4sb4ZENXjTDDoFWZ3BnqIfP5IDV6s4RKAvKXAL5Nuwbv++9O:YoTdiJpjBpBnqIH+Z6se4XALueO
                                                                                                                    MD5:07F6B49331D0BD13597934A20FAC385B
                                                                                                                    SHA1:B39E1439D7FC072AF4961D4AB6DE07D0BC64B986
                                                                                                                    SHA-256:4752E030AC235C73E92EC8BBF124D9A32A424457CA9A6D6027A9595DA76F98D7
                                                                                                                    SHA-512:333B12B6BC7F72156026829E820A4F24759E15973B474E2FFB264DEE4C50B0E478128255E416F3194E8C170A28DF02AA425D720CC5E15BC2382EA2D6D57A6F5B
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/6sxhavkE4_SZHA_K4rwWmg67vF0.gz.js
                                                                                                                    Preview: /*!DisableJavascriptProfiler*/.var BM=BM||{};BM.config={B:{timeout:250,delay:750,maxUrlLength:300,sendlimit:20,maxPayloadSize:14e3},V:{distance:20},N:{maxUrlLength:300},E:{buffer:30,timeout:5e3,maxUrlLength:300},C:{distance:10}},function(n){function vt(){if(!document.querySelector||!document.querySelectorAll){k({FN:"init",S:"QuerySelector"});return}w={};e=[];ft=1;ut=0;rt=0;o=[];s=0;h=!1;var n=Math.floor(Math.random()*1e4).toString(36);t={P:{C:0,N:0,I:n,S:fi,M:r,T:0,K:r,F:0}};vi()}function ei(n,t){var r={};for(var i in n)i.indexOf("_")!==0&&(i in t&&(n[i]!==t[i]||i==="i")?(r[i]=t[i],n[i]=t[i]):r[i]=null);return r}function oi(n){var i={};for(var t in n)n.hasOwnProperty(t)&&(i[t]=n[t]);return i}function b(n,t,r,u){if(!h){k({FN:"snapshot",S:n});return}r=r||gt;t=t||!1;var f=g()+r;ot(o,n)===-1&&o.push(n);t?(yt(),pt(t,u)):f>s&&(yt(),rt=sb_st(pt,r),s=f)}function k(n){var u={T:"CI.BoxModelError",FID:"CI",Name:ht,SV:ct,P:t&&"P"in t?d(t.P):r,TS:f(),ST:v},i,e;for(i in n)u[i]=n[i];e=d(u);wt(e)}func
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\CMm2G4GK3T9XHTMByeN2QI1OVUs[1].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:[TIFF image data, little-endian, direntries=5, xresolution=74, yresolution=82, resolutionunit=2, software=GIMP 2.10.8, datetime=2019:07:31 17:51:08], progressive, precision 8, 160x158, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):12415
                                                                                                                    Entropy (8bit):7.878337322573188
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:dnoYiTiJAAcGIs8E76ZFIN92VPGeBe+ELS:dnyiCAcGIu2FIN92REm
                                                                                                                    MD5:A0BFF1A68EAB91DAC459F3B2EB4B3DE3
                                                                                                                    SHA1:08C9B61B818ADD3F571D3301C9E376408D4E554B
                                                                                                                    SHA-256:7DB453C22084AEF847E1CA04E9FC1B1CF0D468A5C11ABF3C09968C840CD96A87
                                                                                                                    SHA-512:3685F5DD0B8869A0B71C4CADF4FE8559094DC431FEE1E14C349BF6E933702B90136EE45277A97627F69BBB6FAB5ED9EF98AFEBCF88079C5EFFEBD4100B64CE21
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/CMm2G4GK3T9XHTMByeN2QI1OVUs.jpg
                                                                                                                    Preview: ......JFIF.....H.H.....>Exif..II*...............J...........R...(...........1.......Z...2.......f...z...H.......H.......GIMP 2.10.8.2019:07:31 17:51:08...............................................................................................P...................JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.........,f.iJ..b..vR..6.@...*T..8..0%H...8...cH.I.S.F(.....yZLS.....P..1.,i1F(.s.&.....+..iqR/.(.E.".Q.M)VYiR
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\ELqKWpA6KkapLUFbOLS-IQ2zfXc[1].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:[TIFF image data, little-endian, direntries=5, xresolution=74, yresolution=82, resolutionunit=2, software=GIMP 2.10.8, datetime=2019:08:01 11:43:45], progressive, precision 8, 160x160, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):9908
                                                                                                                    Entropy (8bit):7.8062296698930025
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:192:sWK8UVOGWSkbr43J1ZBpYKL2wth0XM2Cc8AyJKl4xV0KamWtOb+SP0cX:s18bVBrK9B6G2whJ2i/cmygrP0e
                                                                                                                    MD5:968C49AC8A1A3EF85F2884F226C55742
                                                                                                                    SHA1:10BA8A5A903A2A46A92D415B38B4BE210DB37D77
                                                                                                                    SHA-256:E441AFC03F067D1D85DF1F69EB8F482BFDA697CC217E11E1547B3CE964B15B2A
                                                                                                                    SHA-512:07B13D6E736683E36091E5BC52F953F9077AD9CD656F0F91E52F17C4630BE3D7524000AA37CFD6CB29ECBB5315F973086630F240118DBE248B4F8A3E79B2B524
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/ELqKWpA6KkapLUFbOLS-IQ2zfXc.jpg
                                                                                                                    Preview: ......JFIF.....H.H.....PExif..II*...............J...........R...(...........1.......Z...2.......f...z...H.......H.......GIMP 2.10.8.2019:08:01 11:43:45...............................................................................................a...................JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...M......*.i.@.=h......)(.....)i(....(.h...)h...ZJZ.(...(...(....(...)i(......M.N4...S..4..!.E......(......(...Z(..
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\Fsa_OI0AplCnVoXGca8ALOo0S0s[1].svg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):282
                                                                                                                    Entropy (8bit):4.768675821769942
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:6:tbXH4mc4sl3UY7eERI1+N9H5R0MLERIwoVNdJMvdIXyCWfuBIAFfu:tbH41niB1+bj0MLBnpavdqyVGBIAFm
                                                                                                                    MD5:E38795B634154EC1FF41C6BCDA54EE52
                                                                                                                    SHA1:16C6BF388D00A650A75685C671AF002CEA344B4B
                                                                                                                    SHA-256:66B589F920473F0FD69C45C8E3C93A95BB456B219CBA3D52873F2A3A1880F3F0
                                                                                                                    SHA-512:DCA2E67C46CFF1B9BE39CE8B0D83C34173E6B77EC08FA4EB4BA18A4555144523C570D785549FED7A9909C2E2C3B48D705B6E332832CA4D5DE424B5F7C3CD59BE
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/Fsa_OI0AplCnVoXGca8ALOo0S0s.svg
                                                                                                                    Preview: <svg focusable="false" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16">.. <path d="M0 0h16v16h-16z" fill="none"/>.. <path d="M8 1a7 7 0 1 0 7 7 7 7 0 0 0-7-7zm1 10a1 1 0 0 1-2 0v-3a1 1 0 0 1 2 0zm-.293-5.293a1 1 0 1 1 .293-.707 1 1 0 0 1-.293.707z" fill="#767676"/>..</svg>
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\GiGr-rA9TBhE2c3LJn7PvDweiOo.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):374771
                                                                                                                    Entropy (8bit):5.158592433297743
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:6144:1irrzbB3LH7gaV6Z8LAfP0Rp6Izc04YFdNwRm2EjXi4SG7oIBYQmzeH:aHNfi4KwYQmzeH
                                                                                                                    MD5:F279A46B56038C41BB3FC11D67D0FE46
                                                                                                                    SHA1:B48121E695FD6483CAA7F48DE73FE9F121777109
                                                                                                                    SHA-256:A9EA274B393E34591387AC0B4DE594BEE296386543DE34F4897281324DB0DCBB
                                                                                                                    SHA-512:4C1754CF5E368D8CE86B135B789A4FF4BAAD1419F30A1EB3B65EAB62217C054D0066EA5FC22B5AA7643EA959854EBC2029B39CB7D1AEAAFB78B95A2A46430F84
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/GiGr-rA9TBhE2c3LJn7PvDweiOo.gz.js
                                                                                                                    Preview: (function(n){function t(r){if(i[r])return i[r].exports;var u=i[r]={i:r,l:!1,exports:{}};return n[r].call(u.exports,u,u.exports,t),u.l=!0,u.exports}var i={};return t.m=n,t.c=i,t.d=function(n,i,r){t.o(n,i)||Object.defineProperty(n,i,{enumerable:!0,get:r})},t.r=function(n){typeof Symbol!="undefined"&&Symbol.toStringTag&&Object.defineProperty(n,Symbol.toStringTag,{value:"Module"});Object.defineProperty(n,"__esModule",{value:!0})},t.t=function(n,i){var r,u;if((i&1&&(n=t(n)),i&8)||i&4&&typeof n=="object"&&n&&n.__esModule)return n;if(r=Object.create(null),t.r(r),Object.defineProperty(r,"default",{enumerable:!0,value:n}),i&2&&typeof n!="string")for(u in n)t.d(r,u,function(t){return n[t]}.bind(null,u));return r},t.n=function(n){var i=n&&n.__esModule?function(){return n["default"]}:function(){return n};return t.d(i,"a",i),i},t.o=function(n,t){return Object.prototype.hasOwnProperty.call(n,t)},t.p="",t(t.s=0)})([function(n,t,i){window.SpeechSDK=i(1)},function(n,t,i){"use strict";function r(n){for(
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\JDHEvZVDnqsG9UcxzgIdtGb6thw.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):408
                                                                                                                    Entropy (8bit):5.040387533075148
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:12:2QWV6yRZ1nkDXAn357CXYX0cO2mAICL2b3TRn:2QO6P+5OYXJPi3TRn
                                                                                                                    MD5:B4D53E840DB74C55CC3E3E6B44C3DAC1
                                                                                                                    SHA1:89616D8595CF2D26B581287239AFB62655426315
                                                                                                                    SHA-256:622B88D7D03DDACC92B81FE80A30B3D5A04072268BF9473BB29621E884AAB5F6
                                                                                                                    SHA-512:4798E4E1E907EAE161E67B9BAB42206CE0F22530871EEC63582161E29DD00D2D7034E7D12CB3FE56FFF673BC9BB01F0646F9CA5DAED288134CB25978EFBBEC8F
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/JDHEvZVDnqsG9UcxzgIdtGb6thw.gz.js
                                                                                                                    Preview: (function(){function u(){n&&(n.value.length>0?Lib.CssClass.add(sj_b,t):Lib.CssClass.remove(sj_b,t))}function f(r){n.value="";Lib.CssClass.remove(sj_b,t);sj_log("CI.XButton","Clicked","1");i&&Lib.CssClass.add(i,"b_focus");n.focus();n.click();r&&(r.preventDefault(),r.stopPropagation())}var i=_ge("b_header"),n=_ge("sb_form_q"),r=_ge("sb_clt"),t="b_sbText";n&&r&&(sj_be(r,"click",f),sj_be(n,"keyup",u),u())})()
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\Jl2vUSlEIqWjk-99MuYp4W74zvQ[1].svg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):1529
                                                                                                                    Entropy (8bit):4.135964697042234
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:24:tVvnjuJOeUsc4wg5a2/gt+lm/3HljKR99U1TrD3ptYZ7GDlh6mI0jeI4dIwDq8rz:rn1edcjg5pm/lKRXU1TrD5tJf6mzjidJ
                                                                                                                    MD5:6D8EF11CB1C03B39D9ED4E4C9A2190B9
                                                                                                                    SHA1:265DAF51294422A5A393EF7D32E629E16EF8CEF4
                                                                                                                    SHA-256:D72BEAE30A6B2B36C3E03847CE4EA04211D7373D4066FF937A7A05DF4E0C3DB6
                                                                                                                    SHA-512:C8820BDF2FC34CCFF7018A1C1E3E74ED1FE0B287926050F9B6BA59C08DCC216E8732F862AB0BF086BC05275C51E6F81132AFA60F6D50A19585642BC906DCDD92
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/Jl2vUSlEIqWjk-99MuYp4W74zvQ.svg
                                                                                                                    Preview: <svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg">..<path d="M8 0C6.41775 0 4.87103 0.469192 3.55544 1.34824C2.23985 2.22729 1.21447 3.47672 0.608967 4.93853C0.00346629 6.40034 -0.15496 8.00887 0.153721 9.56072C0.462403 11.1126 1.22433 12.538 2.34315 13.6569C3.46197 14.7757 4.88743 15.5376 6.43928 15.8463C7.99113 16.155 9.59966 15.9965 11.0615 15.391C12.5233 14.7855 13.7727 13.7602 14.6518 12.4446C15.5308 11.129 16 9.58225 16 8C16 5.87827 15.1571 3.84344 13.6569 2.34315C12.1566 0.842854 10.1217 0 8 0V0Z" fill="white"/>..<path d="M3.72395 9.60957L5.72394 11.6096C5.97398 11.8595 6.31306 12 6.66661 12C7.02016 12 7.35924 11.8595 7.60928 11.6096L12.2759 6.9429C12.4033 6.81991 12.5049 6.67278 12.5747 6.51011C12.6446 6.34744 12.6814 6.17248 12.6829 5.99544C12.6845 5.8184 12.6507 5.64283 12.5837 5.47897C12.5167 5.3151 12.4177 5.16623 12.2925 5.04104C12.1673 4.91585 12.0184 4.81685 11.8545 4.74981C11.6907 4.68277 11.5151 4.64903 11.3381 4.65057C11.16
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\N3874DX7.htm
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:HTML document, UTF-8 Unicode text, with very long lines, with CRLF, LF line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):63186
                                                                                                                    Entropy (8bit):5.7611173791709875
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:1536:GKrSCXrLQPo3H/8cpUQ1qETOuKsIecFXdAjvd894fJLYvwjo4r8b09v2Q53OpZ:GGLQw3f/mQ1bd89ReeZ
                                                                                                                    MD5:7780EE91F8A86F9E983056CE6C0FA543
                                                                                                                    SHA1:E590A3F6F977A67D25BD54A22C23B59647D92F83
                                                                                                                    SHA-256:64C0A21CE99857CAA0F4C58AAE2363395EB5C211BB0A7AC00C8D1721A7F6D230
                                                                                                                    SHA-512:369207A22CE9AE7B08B324A0120FC0820096EAFD3FC94AC8A88281306EE96168ED90E304987D95AE6B303B30900D1E31366A8F3779522E5843951DE47563B373
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/?form=REDIRERR
                                                                                                                    Preview: <!doctype html><html lang="en" dir="ltr"><head><meta name="theme-color" content="#4F4F4F" /><meta name="description" content="Bing helps you turn information into action, making it faster and easier to go from searching to doing." /><meta http-equiv="X-UA-Compatible" content="IE=edge" /><meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta property="fb:app_id" content="570810223073062" /><meta property="og:type" content="website" /><meta property="og:title" content="Info" /><meta property="og:image" content="https://www.bing.com/th?id=OHR.Olympics125_ROW9889344454_tmb.jpg&amp;rf=" /><meta property="og:image:width" content="1366" /><meta property="og:image:height" content="768" /><meta property="og:url" content="https://www.bing.com/?form=HPFBBK&amp;ssd=20210406_0700&amp;mkt=de-CH" /><meta property="og:site_name" content="Bing" /><meta property="og:description" content="The first modern Olympic Games were held 125 years" /><title>Bing</title><link rel="shortcut i
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\NewErrorPageTemplate[1]
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):1612
                                                                                                                    Entropy (8bit):4.869554560514657
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                                                                                                                    MD5:DFEABDE84792228093A5A270352395B6
                                                                                                                    SHA1:E41258C9576721025926326F76063C2305586F76
                                                                                                                    SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                                                                                                                    SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:res://ieframe.dll/NewErrorPageTemplate.css
                                                                                                                    Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\RrvsBuqGHDpqG7NAz4Q0BMOqQBg.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):4140
                                                                                                                    Entropy (8bit):5.268233767834181
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:cithlPK4kMRX+1XewlYONYyuGNc22nDmSOsDg:ciJALYONEGNc22nbOsDg
                                                                                                                    MD5:7651609B4BE35F5DE8024F570EF6CF87
                                                                                                                    SHA1:4B72E4BB1D8F170D6B17FA1D769584A7D0F02F70
                                                                                                                    SHA-256:4CA5C607D14D17F8A9EEA9FB0A624BC00C49BFDFBB6A78E1292EAE1461B7D9F0
                                                                                                                    SHA-512:7BE114BD02AA079F01FBFC343811F74896BB247ABB79C67998B7DB0F20F8ED1260DEA83523F61CDD0E2231F2428437F9FBF88F39DAD821A3F09A5116C5DA7A2D
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/RrvsBuqGHDpqG7NAz4Q0BMOqQBg.gz.js
                                                                                                                    Preview: var Feedback;(function(n){var t;(function(){function r(i,r,u,f,e,o){i=typeof i===t?!1:i;i&&scrollTo(0,0);u=typeof u===t?!0:u;n.PackageLoad.Load(r,u,f,e,o)}function e(n,t){for(var r=0,i=null;n&&n.getAttribute&&(!(t>=1)||r<t);){if(i=n.getAttribute("data-fbhlsel"),i!=null)break;r++;n=n.parentNode}return i}var u="feedbackformrequested",c="feedbackInitialized",i,f="",o="feedback-binded",s="clicked",t="undefined",h;n.Bootstrap.InitializeFeedback=function(l,a,v,y,p,w,b,k){function tt(t){var r=null,i;return t&&(i=new h,n.fel("ajax.feedback.collectsettings","gsf",i),r=i.findSettings(t)),r}var d=_ge(a),g,nt;d&&d.classList&&d.classList.contains(o)||(p=typeof p===t?!1:p,g=e(d,3),f!=="sb_feedback"&&(f=a,typeof sj_evt!==t&&(i&&sj_evt.unbind(u,i),i=function(n){var u=null,t=null,f=null,o,i,s;n&&n.length>1&&(i=n[1],i.tagName!==undefined&&i.nodeType!==undefined?(u=i,t=tt(u)):t=i,o=t&&t.elementToHighlight||u,f=e(o));s=t&&t.linkId||a;r(y,l,v,s,f,t)},sj_evt.bind(u,i,1)),typeof SearchAppWrapper!==t&&SearchA
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\UYtUYDcn1oZlFG-YfBPz59zejYI[1].svg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):964
                                                                                                                    Entropy (8bit):4.421237058266115
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:24:t741nTY2jmYXhgauOwgXl3gHuWg9cZLzix9QiVCVCTikxQmQ6Nkpgeoo7:dQnkwXhnuOwIlwHuW7nC9QkaUzQm3Nk5
                                                                                                                    MD5:88E3ED3DD7EEE133F73FFB9D36B04B6F
                                                                                                                    SHA1:518B54603727D68665146F987C13F3E7DCDE8D82
                                                                                                                    SHA-256:A39AB0A67C08D907EDDB18741460399232202C26648D676A22AD06E9C1D874CB
                                                                                                                    SHA-512:90FF1284A7FEB9555DFC869644BD5DF8A022AE7873547292D8F6A31BA0808613B6A7F23CB416572ADB298EEE0998E0270B78F41C619D84AB379D0CA9D1D9DA6B
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/UYtUYDcn1oZlFG-YfBPz59zejYI.svg
                                                                                                                    Preview: <svg focusable="false" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" enable-background="new 0 0 16 16"><g fill="#00809D"><path d="M2.25 0h-1.25c-.263 0-.521.107-.707.293-.186.186-.293.444-.293.707v1.25c0 .552.448 1 1 1s1-.448 1-1v-.25h.25c.552 0 1-.448 1-1s-.448-1-1-1zM1 8.75c.552 0 1-.448 1-1v-1.5c0-.552-.448-1-1-1s-1 .448-1 1v1.5c0 .552.448 1 1 1zM2.25 12h-.25v-.25c0-.552-.448-1-1-1s-1 .448-1 1v1.25c0 .263.107.521.293.707s.444.293.707.293h1.25c.552 0 1-.448 1-1s-.448-1-1-1zM11.75 2h.25v.25c0 .552.448 1 1 1s1-.448 1-1v-1.25c0-.263-.107-.521-.293-.707-.186-.186-.444-.293-.707-.293h-1.25c-.552 0-1 .448-1 1s.448 1 1 1zM6.25 2h1.5c.552 0 1-.448 1-1s-.448-1-1-1h-1.5c-.552 0-1 .448-1 1s.448 1 1 1zM14.5 7h-.5v-.75c0-.552-.448-1-1-1s-1 .448-1 1v.75h-3.5c-.828 0-1.5.671-1.5 1.5v3.5h-.75c-.552 0-1 .448-1 1s.448 1 1 1h.75v.5c0 .828.672 1.5 1.5 1.5h6c.828 0 1.5-.672 1.5-1.5v-6c0-.829-.672-1.5-1.5-1.5z"/></g><path fill="none" d="M0 0h16v16h-16z"/></svg>
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\b4Jy0kwhnsWcsDQyuzAEsN7RmhQ[1].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:[TIFF image data, little-endian, direntries=5, xresolution=74, yresolution=82, resolutionunit=2, software=GIMP 2.10.8, datetime=2019:07:31 17:59:08], progressive, precision 8, 160x160, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):14848
                                                                                                                    Entropy (8bit):7.9161237402148545
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:192:d5KKqPy60pSDqRxY0cKZR+dG0cDizbS4z0GoJmsrod96rIE1KRCLHXl4DPzEmISD:dg9PJvoe0LsG0IiF+TVERCjgEmgDG
                                                                                                                    MD5:094FAB391B9B906B8A88922CE6827471
                                                                                                                    SHA1:6F8272D24C219EC59CB03432BB3004B0DED19A14
                                                                                                                    SHA-256:E7DAFF9BBB32681540E010FB10BA87D51938B42B275D0C422E253CED0DD96B79
                                                                                                                    SHA-512:B0BE13E1A3E4B5758DFF4B36C1FF49020565FD316295A7413E5312FB90B0EE4B7D93B4FE4AC5DBB4F122E4CAC0705307A29DA52DBF66A3AC0DA91CC94F5B3EF4
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/b4Jy0kwhnsWcsDQyuzAEsN7RmhQ.jpg
                                                                                                                    Preview: ......JFIF.....H.H....#JExif..II*...............J...........R...(...........1.......Z...2.......f...z...H.......H.......GIMP 2.10.8.2019:07:31 17:59:08...............................................................................................["..................JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?....{Ry..J.#..uj..\..\~...f.9..v...M[.....q..Px....(<P.E.P.E.P.J.!8....<.I.T-%F\..Ld.Ff..Sr)........@..M74.i.~.i4
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\bLULVERLX4vU6bjspboNMw9vl_0.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:very short file (no magic)
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):1
                                                                                                                    Entropy (8bit):0.0
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:3:V:V
                                                                                                                    MD5:CFCD208495D565EF66E7DFF9F98764DA
                                                                                                                    SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                                                                                                                    SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                                                                                                                    SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/bLULVERLX4vU6bjspboNMw9vl_0.gz.js
                                                                                                                    Preview: 0
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\dnserror[1]
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):2997
                                                                                                                    Entropy (8bit):4.4885437940628465
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                                                                                                                    MD5:2DC61EB461DA1436F5D22BCE51425660
                                                                                                                    SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                                                                                                                    SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                                                                                                                    SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                                                                                                                    Malicious:false
                                                                                                                    Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\dnserror[2]
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):2997
                                                                                                                    Entropy (8bit):4.4885437940628465
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                                                                                                                    MD5:2DC61EB461DA1436F5D22BCE51425660
                                                                                                                    SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                                                                                                                    SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                                                                                                                    SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:res://ieframe.dll/dnserror.htm?ErrorStatus=0x800C0005&DNSError=0
                                                                                                                    Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\down[1]
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):748
                                                                                                                    Entropy (8bit):7.249606135668305
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                                                                                                                    MD5:C4F558C4C8B56858F15C09037CD6625A
                                                                                                                    SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                                                                                                                    SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                                                                                                                    SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                                                                                                                    Malicious:false
                                                                                                                    Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\errorPageStrings[1]
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):4720
                                                                                                                    Entropy (8bit):5.164796203267696
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                                                                                                                    MD5:D65EC06F21C379C87040B83CC1ABAC6B
                                                                                                                    SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                                                                                                                    SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                                                                                                                    SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                                                                                                                    Malicious:false
                                                                                                                    Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\gDsOfTXNZVl18jxNDvhXqAdf2tM.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):1821
                                                                                                                    Entropy (8bit):5.098212659804913
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:48:0N3GKBel/r5+8cDYC1YvHIH6ayskysb6NccyskpY3Imqc+DkR:oGKBelzw8fCuoaay5ySSy5q3Mc+4R
                                                                                                                    MD5:EC15EB7CBFBFAA68BB1DE04A28C80270
                                                                                                                    SHA1:D2570D4CFF3139EA66D15799C9E67211F5A03B20
                                                                                                                    SHA-256:810A85F1E705231989251F3EB52DAFF3F0ACEE09C703339C301A7CBD22CF8FE6
                                                                                                                    SHA-512:077446A676E47447CB771A119CD0EC2EC168E65FED4579E663866D2846F51E93B47367518EB9D79E04EACE139CDFF043E1E28D64559412B4770388B2FEF96A21
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/gDsOfTXNZVl18jxNDvhXqAdf2tM.gz.js
                                                                                                                    Preview: (function(){function b(e){var l=e[1],s=l&&_ge(l.vid);s&&(h=_ge("bnp.nid."+f),i=n.getAttribute("data-overlay")==="true"?!0:!1,c=n.getAttribute("data-setscroll")==="true"?!0:!1,k(),ClassUtil.removeClass(h,y),s.style.display="block",c&&d(),sj_evt.fire("bnp.notif.shown",s),i?nt():sj_evt.fire("McpDismissed"),u=_ge(w),t=_ge(v),t.focus(),r=_ge(p),u&&sj_be(u,o,tt),t&&sj_be(t,o,g))}var v="bnp_btn_accept",o="click",y="b_hide",p="cookie_preference",w="bnp_btn_preference",r,u,t,n=_ge("bnp_cookie_banner"),s=_ge("b_footer"),f=_w.bnp.pb_sttc.id,h,e,i,c,k=function(){var t=n&&n.getAttribute("data-position"),i=_ge("bnp_container");i&&t&&t.toLocaleLowerCase()=="top"&&(i.style.top=t+"px",i.style.bottom="auto")},d=function(){var i=_ge("bnp_container"),r=_ge("bnp_action_container"),n=_ge("bnp_content_desc"),u=_ge("bnp_title_container"),t;i&&r&&n&&u&&(t=i.offsetHeight-(r.offsetHeight+u.offsetHeight+130),n.style.maxHeight=t+"px",t<280&&(n.style.marginRight="-10px"))},g=function(t){ManagedCookiePreferenceActio
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\httpErrorPagesScripts[1]
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):12105
                                                                                                                    Entropy (8bit):5.451485481468043
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                                                                                                                    MD5:9234071287E637F85D721463C488704C
                                                                                                                    SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                                                                                                                    SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                                                                                                                    SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:res://ieframe.dll/httpErrorPagesScripts.js
                                                                                                                    Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\k5oM71-Oyo7w7ptkcB_2S5dIr7I.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with CRLF line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):21824
                                                                                                                    Entropy (8bit):5.243380331742482
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:HXpeDC+2uguwBYFsOZrSzz3wp0OxAmzjEHU:HXpeDz2gFsOZrOXWz4HU
                                                                                                                    MD5:071CABC528DA3CDD5BD5C7F0EC48ED96
                                                                                                                    SHA1:8B665A2DA630D6711E01E838877510F48C40E9CE
                                                                                                                    SHA-256:9871F6289648EEA5CB484C2307C4E7BCDF3857AEB27EB07E0ACFD4C1B77EDBB5
                                                                                                                    SHA-512:771DA4D3B22B53C5B1B1D2DF1B923B78124A7F92576700F7E988A1E40C2806CB2366D52C556F1FD49862B1A584D871ED7207B54174172740B4ED125AAD4C531F
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/k5oM71-Oyo7w7ptkcB_2S5dIr7I.gz.js
                                                                                                                    Preview: (function () {.. if (typeof window !== 'undefined') {.. (function (arr) { arr.forEach(function (item) { if (item.hasOwnProperty('remove')) { return; } Object.defineProperty(item, 'remove', { configurable: true, enumerable: true, writable: true, value: function remove() { if (this.parentNode === null) { return; } this.parentNode.removeChild(this); } }); }); })([Element.prototype, CharacterData.prototype, DocumentType.prototype]);.... !function(e,n){"object"==typeof exports&&"undefined"!=typeof module?n():"function"==typeof define&&define.amd?define(n):n()}(0,function(){"use strict";function e(e){var n=this.constructor;return this.then(function(t){return n.resolve(e()).then(function(){return t})},function(t){return n.resolve(e()).then(function(){return n.reject(t)})})}function n(e){return!(!e||"undefined"==typeof e.length)}function t(){}function o(e){if(!(this instanceof o))throw new TypeError("Promises must be constructed via new");if("function"!=typeof e)throw new Type
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\n1U5gwBiwMo7s-fWOh2kSe3Kils[1].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:[TIFF image data, little-endian, direntries=5, xresolution=74, yresolution=82, resolutionunit=2, software=GIMP 2.10.8, datetime=2019:07:31 17:53:43], progressive, precision 8, 160x160, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):12094
                                                                                                                    Entropy (8bit):7.886865463015066
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:192:SiKi8QXz83TatNZ7rBakT+m47amRNj5y4zYOyuRHExmmjGjWddkuz4nicyktAtmR:SRi8083g7rBamzWNjPzguCxmmjGid60g
                                                                                                                    MD5:05034EB84E5E7915CA36EB6FE59DFBA7
                                                                                                                    SHA1:9F5539830062C0CA3BB3E7D63A1DA449EDCA8A5B
                                                                                                                    SHA-256:9BEC2E05752C0699DB84352BB6E3DD4E5DAA927D32EC8123966F4A8FDF8B181A
                                                                                                                    SHA-512:EB645D1FBB404B00D19C743C3F6F00597D91DE73EA2F02AE61AB76AFB13A913F68CB2419C205684CAD827D1369D8F76D9B7E709B8EF0AB05A86B305A7A5B7089
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/n1U5gwBiwMo7s-fWOh2kSe3Kils.jpg
                                                                                                                    Preview: ......JFIF.....H.H.....zExif..II*...............J...........R...(...........1.......Z...2.......f...z...H.......H.......GIMP 2.10.8.2019:07:31 17:53:43...................................................................................................................JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..8...R.Vf.|lcR..........sJ.#...1+..VR:b.b....8&*B.Qq.fj.6W50....`L.z..OrK_.+v..+..2....1.Q...K!.b..n.).A.j.s
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\sjm7ZxOOdUKgLq2Lulikx_Lt20I.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:exported SGML document, ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):4623
                                                                                                                    Entropy (8bit):5.164231565021591
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:B3D+ca6IQkQQX6hJmK/Vl3A2zLEzvPTkyfXeJLYryYHIZq76/PH:V+ca6IBQQX6aK9l3ASivPTkyWJLh7R
                                                                                                                    MD5:8FD5ED5E0730854741D73A66E1C8C124
                                                                                                                    SHA1:8A4D348BA92FEBAB3A5FC7FFDED98E0841C3CE9C
                                                                                                                    SHA-256:63C3206CB8509C0A2DD25A0AA3555BD49E7B2E24AE95F6CB7E6521D830C986F7
                                                                                                                    SHA-512:D52D1CCBBEDDC49B850030E3B2ABA9EADE824AE74EF4FF7055D50EDDCABC7933D6D662FEE8DF0F37B20F096E96908DA0CB89FF8DFC4E6AB14F1255BBDE745A40
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/sjm7ZxOOdUKgLq2Lulikx_Lt20I.gz.js
                                                                                                                    Preview: define("rmsajax",["require","exports"],function(n,t){function c(){for(var i,n=[],t=0;t<arguments.length;t++)n[t]=arguments[t];if(n.length!=0){if(i=n[n.length-1],n.length==1)ot(i)&&f.push(i);else if(n.length==3){var o=n[0],s=n[1],u=n[2];st(o)&&st(s)&&ot(u)&&(ht(r,o,u),ht(e,s,u))}return window.rms}}function nt(){var i=arguments,n,t;for(o.push(i),n=0;n<i.length;n++)t=i[n],ct(t,r),t.d&&tt.call(null,t);return window.rms}function kt(){var t=arguments,n;for(s.push(t),n=0;n<t.length;n++)ct(t[n],e);return window.rms}function l(){var t,i,n;for(ri(),t=!1,n=0;n<o.length;n++)t=tt.apply(null,p.call(o[n],0))||t;for(i=0;i<s.length;i++)t=ti.apply(null,p.call(s[i],0))||t;if(!t)for(n=0;n<f.length;n++)f[n]()}function tt(){var n=arguments,t,i,f,e;if(n.length===0)return!1;if(t=r[ut(n[0])],n.length>1)for(i=ui.apply(null,n),f=0;f<i.length;f++)e=i[f],e.run=u,dt(e,function(n){return function(){gt(n,i)}}(e));else t.run=u,ft(t,function(){it(t)});return!0}function dt(n,t){var f,u,r;if(!n.state){if(n.state=pt,at(n)
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\swyt_VnIjJDWZW5KEq7a8l_1AEw.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):2298
                                                                                                                    Entropy (8bit):5.34865319631632
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:48:KWEkTScZVcMBOwXhzwBi88RnX8ec0T39B8onA008xG9FLCx3w0S5xJ:KWEkTDZVXpR0BiXjTtB8mA0zxWsx3PG/
                                                                                                                    MD5:A8D7D1B3681590980B2D7480906078DB
                                                                                                                    SHA1:C9A7A400DB1EBAD4DCA028546EE5F5B2EF4136BD
                                                                                                                    SHA-256:1390485DC88B6230389D9C95232A3710BF38D47271708A279B12D7E68E43F649
                                                                                                                    SHA-512:710D31EFD76614EC4C94888E2FCC49ABAB50EF406FC0F1C5C10D8AA21D4E9F349DE78068B2BAFE495C074AB4E6EC0A5D44EB5506B2D79C78707A23C1D8206664
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/swyt_VnIjJDWZW5KEq7a8l_1AEw.gz.js
                                                                                                                    Preview: var Bnp=Bnp||{};Bnp.Global=Bnp.Global||{};Bnp.Version="1";Bnp.Partner=Bnp.Partner||function(){function u(n){sj_evt.fire("onBnpRender",n)}function i(n){var r=r||{};if(typeof r.stringify=="function")return r.stringify(n);var o=typeof n,u=n&&n.constructor==Array,f=[],e,t;if(o!="object"||n==null)return o=="string"?'"'+n+'"':String(n);for(e in n)t=n[e],t&&t.constructor!=Function&&(u?f.push(i(t)):f.push('"'+e+'":'+i(t)));return(u?"[":"{")+String(f)+(u?"]":"}")}function o(n){for(var r=[],u=n.getElementsByTagName("script"),t,i;u.length;)t=u[0],i=sj_ce("script"),t.src?i.src=t.src:t.text&&(i.text=t.text),i.type=t.type,t.parentNode.removeChild(t),r.push(i);return r}function s(n){for(var t=0;t<n.length;t++)f(n[t])}function f(n){t=t||_d.getElementsByTagName("head")[0];t.appendChild(n)}function h(n){for(var t,i=0;i<n.length;i++)t=sj_ce("style"),t.type="text/css",t.textContent!==undefined?t.textContent=n[i]:t.styleSheet.cssText=n[i],f(t)}function c(){sj_evt.fire("onPopTR")}var n="dhplink",t,e=2500,r=
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\th[1].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 150x150, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):3792
                                                                                                                    Entropy (8bit):7.879458150606813
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:pPEUZavUpaPPjl0qwzhf5Q6u2i7HGLHFgak2bB+u+iiKaCPg8o:pPH0vUWlqhf5Q6uZiDFgak3neaFF
                                                                                                                    MD5:E5D2688116BA8D4ABBC53F2493A181BE
                                                                                                                    SHA1:2330F5A38AB1DE6979790C84B33DC173F853D6FD
                                                                                                                    SHA-256:AA1EF9A296A78952F642406AA0F59930CDD23BC5D1714B7E306787CD4064229E
                                                                                                                    SHA-512:0FEBAA0286AFF016B5F0B2B9984D95E2319CA29E41AF624A50D5BF1EDA33CD61017226312DE65B1E5A169A95DB7A6F9212EFFC06A498B0BA857C744CCCBDE3BA
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/th?u=https%3a%2f%2fimg-s-msn-com.akamaized.net%2ftenant%2famp%2fentityid%2fBB1flaPv.img&ehk=nfyoU%2b8cc2O%2frjxfHaxiAbz0t%2fXYbGhU6jS%2bwZAdcS0%3d&w=150&h=150&c=8&rs=2&pid=WP0
                                                                                                                    Preview: ......JFIF.....`.`.....C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..x.[.G....uz......M8......4..l..2..?..9....$q..r./...LE....'o...w.[H.J..Z..G..NI.....gC..pk.n..hF.+..<..V...d)....,..Bpj.DT...Rl-..@...i..L......e.*&(..`...P...l..J......@.Mqc}z........>..)U,y.^.Aq...X...QG.8W....Q..]^..j.|.n~X...[......\.n.i0..#..9..<Wk......bx.._...............idb3.A..k7+.....,.M./..@...2.?.Y}M....$.......)=....w]....>Y..t+.I....Z.9$.....
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\th[2].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 150x150, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):2542
                                                                                                                    Entropy (8bit):7.7794956985553245
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:48:5yYcuERATBsC87tpyXKeyzbOZkEPVEGYI0Z8RV8WdxGAia:5PECCC87jyXK7ejRWSRV/dxGva
                                                                                                                    MD5:357F88390923FD2D7C54F8EF73A57475
                                                                                                                    SHA1:EE6F5D3CBE310AC210CF47D8F1B748B2B0B5205E
                                                                                                                    SHA-256:80076FB2A8BD57B72985F5F3557F2B4742DE360994CD05CCA6604653E63404E0
                                                                                                                    SHA-512:2AE5C52C81E088CEA10B4240BDF45220AEAC3C4BFDEEC6C098F946BA569AE626E753F7CC116FF133C920C14DBC94083B484A3FA045EC226A32F62D69F85D056C
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/th?u=https%3a%2f%2fimg-s-msn-com.akamaized.net%2ftenant%2famp%2fentityid%2fBB1fl5aC.img&ehk=hx9sEjlDgrlxhlQ0dXS9BWLt7M4%2fn9L%2foLPShsm8wa4%3d&w=150&h=150&c=8&rs=2&pid=WP0
                                                                                                                    Preview: ......JFIF.....H.H.....C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..(...7..(......d..0..ci.0.H.8.4ow;F..b[ws.....q...r..@...3L_7..?n.....?LV..d?...J+".....)(........E8.....W.....F,..JZ..Z)(.......J...fv.....@$...0.cn..q.N{g..:...RCp..2aG.lI.T..S.......w .9..V...h.E..aE.....(...(..4.J..K../J(N.WB1{..E..l-....(4Q@...[M.0........18....[..Z........W.J._.#...;s.q...v........W.l+kr.-%.#.(...(...(...j`<..:.[.a:QH.WJ1{.....c`.....
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\4L4QdyjTv0HYE2Ig2ol9eYoqxg8[1].svg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):1101
                                                                                                                    Entropy (8bit):4.829151166001716
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:24:t0S8eLfl954T0u2y3EO1gRcDrIvQaDxijjfscC:vLfRWtPDuQKIjq
                                                                                                                    MD5:91CD11CFCCA65CFACE96153268D71F63
                                                                                                                    SHA1:E0BE107728D3BF41D8136220DA897D798A2AC60F
                                                                                                                    SHA-256:8EE1E6D7A487C38412D7B375AC4A6BD7E47F70858055EEB7957226ADA05544BE
                                                                                                                    SHA-512:4367CE147C7FA4590838F23C47819B8954858128336979E28BA116924B92660A7CBDC9A8292C45C5F26FF591F423F03DFADCB78A772DBE86AC5FBABF0B4E7711
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/4L4QdyjTv0HYE2Ig2ol9eYoqxg8.svg
                                                                                                                    Preview: <svg focusable="false" width="24px" height="24px" viewBox="0 0 24 24" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink">.. <rect fill-opacity="0.2" fill="#000" x="0" y="0" width="24" height="24" rx="2"></rect>.. <g transform="translate(4, 4)">.. <path d="M13.2916881,1.29304814 L7.99395739,6.59077883 L2.69622669,1.29304814 C2.30349711,0.913737214 1.67923378,0.919161894 1.29315522,1.30524045 C0.907076669,1.691319 0.90165199,2.31558234 1.28096291,2.70831192 L6.57869361,8.00604261 L1.28096291,13.3037733 C0.90165199,13.6965029 0.907076669,14.3207662 1.29315522,14.7068448 C1.67923378,15.0929233 2.30349711,15.098348 2.69622669,14.7190371 L7.99395739,9.42130639 L13.2916881,14.7190371 C13.6844177,15.098348 14.308681,15.0929233 14.6947596,14.7068448 C15.0808381,14.3207662 15.0862628,13.6965029 14.7069519,13.3037733 L9.40922117,8.00604261 L14.7069519,2.70831192 C15.0976827,2.31746305 15.0976827,1.683897 14.7069519,1.29304814 C14.316103,0.902317288 13
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\5rqGloMo94v3vwNVR5OsxDNd8d0[1].svg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):461
                                                                                                                    Entropy (8bit):4.834490109266682
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:6:tI9mc4sl3WGPXN4x7ZguUz/KVqNFvneuFNH2N9wF+tC77LkeWVLKetCsYuwdOvX0:t41WeXNC1f3q/7H2DIZWYeIsrGYyKYx7
                                                                                                                    MD5:4E67D347D439EEB1438AA8C0BF671B6B
                                                                                                                    SHA1:E6BA86968328F78BF7BF03554793ACC4335DF1DD
                                                                                                                    SHA-256:74DEB89D481050FD76A788660674BEA6C2A06B9272D19BC15F4732571502D94A
                                                                                                                    SHA-512:BE40E5C7BB0E9F4C1687FFDDBD1FC16F1D2B19B40AB4865BE81DD5CF5F2D8F469E090219A5814B8DAED3E2CD711D4532E648664BFA601D1FF7BBAA83392D320E
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/5rqGloMo94v3vwNVR5OsxDNd8d0.svg
                                                                                                                    Preview: <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32"><title>UserSignedOutIcon</title><circle cx="16" cy="16" r="16" fill="#eee"/><path d="M12.73 13.1a3.271 3.271 0 1 1 3.27 3.2 3.237 3.237 0 0 1-3.27-3.2zm-2.73 9.069h1.088a4.91 4.91 0 0 1 9.818 0h1.094a5.884 5.884 0 0 0-3.738-5.434 4.238 4.238 0 0 0 2.1-3.635 4.366 4.366 0 0 0-8.73 0 4.238 4.238 0 0 0 2.1 3.635 5.878 5.878 0 0 0-3.732 5.434z" fill="#666"/><path fill="none" d="M0 0h32v32h-32z"/></svg>
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\Lq2ZTcK-ZOpjsEJIXReQZG4mDLg.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):67125
                                                                                                                    Entropy (8bit):5.23613773666319
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:768:PfY2/W3m6CHbtHgtBkrel21k4Q8BLBSaJBe7BHyJxBCGnVW4nMO51sEBvkH7BSVq:Y2rA3cnq5QPW4nMETv8jYXmNw6V+oF
                                                                                                                    MD5:7A6E7F57E8AA30D249A26C481B6CE82C
                                                                                                                    SHA1:9902B866538741587475CE0037E4C656F1153D2C
                                                                                                                    SHA-256:BAAFA901C91AFC368F4C5443428A247ABE016AD95843AD74148D4321CC0D34DC
                                                                                                                    SHA-512:553F287EAEA2583475A96D4F66685C0505FA3961348413F42996631E0F80FC3FF57389EFA6FD5E862F06CAE7110B818BFEED071DF96495CA9EBFB7BCA6FD6162
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/Lq2ZTcK-ZOpjsEJIXReQZG4mDLg.gz.js
                                                                                                                    Preview: var AutoSuggest,__extends,Bing,sa_inst;(function(n){var t;(function(n){var t,i,r,u,f,e;(function(n){n.User="SRCHHPGUSR"})(t=n.CookieNames||(n.CookieNames={})),function(n){n.AutoSuggest="AS"}(i=n.CrumbNames||(n.CrumbNames={})),function(n){n.CursorPosition="cp";n.ConversationId="cvid";n.SuggestionCount="sc";n.PartialQuery="pq";n.SuggestionPosition="sp";n.SuggestionType="qs";n.PreviewPaneSuggestionType="qsc";n.SkipValue="sk";n.PreviewPaneSkipValue="skc";n.Ghosting="ghc";n.Css="css";n.Count="count";n.DataSet="ds";n.SessionId="sid";n.TimeStamp="qt";n.Query="q";n.ImpressionGuid="ig";n.QFQuery="qry";n.BaseQuery="bq";n.FormCode="form";n.HashedMuid="nclid";n.RequestElToken="elvr";n.ElTokenValue="elv";n.AppId="appid";n.History="history";n.NoHistory="nohs";n.ApiTextDecoration="textdecorations";n.ClientId="clientid";n.Market="mkt";n.Scope="scope";n.CountryCode="cc";n.HomeGeographicRegion="hgr";n.SetLang="setlang";n.ZeroInputSerp="zis"}(r=n.QueryParams||(n.QueryParams={})),function(n){n.ImpressionG
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\N55Tc-oLNOuzZam9OghLsR0GD5U[1].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:[TIFF image data, little-endian, direntries=6, xresolution=86, yresolution=94, resolutionunit=2, software=GIMP 2.10.18, datetime=2020:04:16 19:04:38], progressive, precision 8, 160x160, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):8245
                                                                                                                    Entropy (8bit):7.528284902127932
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:192:BKWN2AtZTviNV8+xq4UZg11u5FR5CUtlkZPRKY:Yi2aZTvNSU+ODR5CCkRr
                                                                                                                    MD5:8BC40A6F56CB4477BFB120A472920EC1
                                                                                                                    SHA1:379E5373EA0B34EBB365A9BD3A084BB11D060F95
                                                                                                                    SHA-256:9050D49D0786F054BC4B7DA42690B034C208A4736B7DE430383A3333A51C9835
                                                                                                                    SHA-512:50CD42440CF3C68FC807338C4F5E3AF681FEE41C0767EE7392F9C21A75D2B6483587E89E048128470DBA92EB054E82459BC16A3B0EE61DD89BAEA11E934EAAE9
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/N55Tc-oLNOuzZam9OghLsR0GD5U.jpg
                                                                                                                    Preview: ......JFIF.....H.H......Exif..II*...............V...........^...(...........1.......f...2.......t...i...............H.......H.......GIMP 2.10.18..2020:04:16 19:04:38.....................................................................................................................................JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...(....(...(.....(...(..`.QE..QE..QE..QIH..(...(.....P.E.P.E...QE...QE.-.Q@..R..E.P.
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\NnFHhz2jL6yzChtIhaB5IIVKY5k[1].svg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:SVG Scalable Vector Graphics image
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):1111
                                                                                                                    Entropy (8bit):4.61511796141903
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:24:twgonGLheJUVYxCdBTMqTS05sLGkkhQgbQgwHW4QhJ:6gAShpyxCdBTrS05sLKhvUfSJ
                                                                                                                    MD5:C04C8834AC91802186E6CE677AE4A89D
                                                                                                                    SHA1:367147873DA32FACB30A1B4885A07920854A6399
                                                                                                                    SHA-256:46CC84BA382B065045DB005E895414686F2E76B64AF854F5AD1AC0DF020C3BDB
                                                                                                                    SHA-512:82388309085BD143E32981FE4C79604DCEFC4222FB2B53A8625852C3572BDE3D3A578DD558478E6A18F7863CC4EC19DFBA3EE78AD8A4CC71917BFFE027DC22C0
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/NnFHhz2jL6yzChtIhaB5IIVKY5k.svg
                                                                                                                    Preview: <svg width="20px" height="16px" viewBox="0 0 20 16" focusable="false" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink">.. <g transform="translate(-10, -12)" fill="#007DAA" >.. <path d="M28.125,14.4615385 L25,14.4615385 L24.26875,13.0203077 C23.95125,12.3950769 23.30125,12 22.59125,12 L17.40875,12 C16.69875,12 16.04875,12.3950769 15.73125,13.0203077 L15,14.4615385 L11.875,14.4615385 C10.84,14.4615385 10,15.2886154 10,16.3076923 L10,26.1538462 C10,27.1729231 10.84,28 11.875,28 L28.125,28 C29.16,28 30,27.1729231 30,26.1538462 L30,16.3076923 C30,15.2886154 29.16,14.4615385 28.125,14.4615385 Z M20,25.5384615 C17.23875,25.5384615 15,23.3341538 15,20.6153846 C15,17.8966154 17.23875,15.6923077 20,15.6923077 C22.76125,15.6923077 25,17.8966154 25,20.6153846 C25,23.3341538 22.76125,25.5384615 20,25.5384615 Z M20,18.1538462 C18.62125,18.1538462 17.5,19.2578462 17.5,20.6153846 C17.5,21.9729231 18.62125,23.0769231 20,23.0769231 C21.37875,23.0769231
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\ULJCe4CXM2DCjZgELMGm2K4PcPo[1].png
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:PNG image data, 1642 x 116, 8-bit colormap, non-interlaced
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):15917
                                                                                                                    Entropy (8bit):7.9392385460477835
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:U5vQpWIHNNEojv3nGIsk9MdacywQLntcdejm+sJ/4blz/DXw:Vhl3jj+wcFQLtcMm+K4bR/Dg
                                                                                                                    MD5:2D786704B21ADFC7A5037DE337502280
                                                                                                                    SHA1:50B2427B80973360C28D98042CC1A6D8AE0F70FA
                                                                                                                    SHA-256:54CC8693087FBAF873F72FE9CB4539499A0BC7016225F563DB92B9BFE7EEA564
                                                                                                                    SHA-512:625AE0A637BF8B85B86D7719170AAF65ECE69A89CC1E5C76084921A7CABAC226815856D6967403F9264F2C19B4760128C8D10B0FB671D4B9F7A11DBD41B0B6D3
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/ULJCe4CXM2DCjZgELMGm2K4PcPo.png
                                                                                                                    Preview: .PNG........IHDR...j...t.............PLTE...uuv.............x.............x.r....................................vxzvwywwx.......w.................". .n....uvy.E9...ww{............x..m..............m.wwy..........l....tyyuxy......vxz.m..n....q...m.........{......vxy///...vv{.m...............twzvvy.........---......wxz!!!...........3.....................................vyy...,,,......................m.......vvxuu|....L"~............m................lll."..#................vwy....Xx,,,....4........n....vwy....=.......#.....3........*x.0..3..3..1...................................l..$..%..............l........z..;a.........................000.......$.wxz!W.....n....xxx...............413....4.....d!..>............~...Q"qqq......"..www...[[[...Y...................G..)..`...........y..4f.........4....tRNS...0`....`...@_s....A. ...0?....p,.....P?..@...0...~._.aU...o.3.....0.3Q`./y>@^B.^.jP..........C.`.....7..nfc.G.... ..88.%...@.............k...).O...M.@....$.d.i....M
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\authorize[1].htm
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):1169
                                                                                                                    Entropy (8bit):5.23598233235551
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:24:k+NmKUauE2bovcLABeU572HQ3EA+s6jE4C+s0+NaSriVLoCcWZI1RbXI:n0GmLABeS71F+s6jK+s0+gSriVkCcWGM
                                                                                                                    MD5:ABB3E0F9A832C831367934453EFB22F3
                                                                                                                    SHA1:E37445D2611FD396F54547E2B000CCDF0D048486
                                                                                                                    SHA-256:5F716B7DA236D7D74773E92F25181E9A2CF2D3F3163F4CF11D4CD598ECC4BCA5
                                                                                                                    SHA-512:5AE0BCFEF36475650C9DDDD57F60D094052A373E4BB037F0A35589F311643A1AC00C44DB7A0E262B43C347A973A748B4062CA7346641AB93142872F8066A632B
                                                                                                                    Malicious:false
                                                                                                                    Preview: <html><head><title>Working...</title></head><body><form method="POST" name="hiddenform" action="https://www.bing.com/orgid/idtoken/conditional"><input type="hidden" name="error" value="login_required" /><input type="hidden" name="error_description" value="AADSTS50058: A silent sign-in request was sent but no user is signed in. The cookies used to represent the user&#39;s session were not sent in the request to Azure AD. This can happen if the user is using Internet Explorer or Edge, and the web app sending the silent sign-in request is in different IE security zone than the Azure AD endpoint (login.microsoftonline.com)...Trace ID: 5df76f3f-185b-4558-aece-4fe70faa7200..Correlation ID: d58daafc-5a80-4237-8c43-fcbf6f6aaaa1..Timestamp: 2021-04-06 07:43:12Z" /><input type="hidden" name="error_uri" value="https://login.microsoftonline.com/error?code=50058" /><input type="hidden" name="state" value="{&quot;ig&quot;:&quot;E7B3AF7955464F659FE96ADB4631F87B&quot;}" /><noscript><p>Script is disabl
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\dnserror[1]
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):2997
                                                                                                                    Entropy (8bit):4.4885437940628465
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                                                                                                                    MD5:2DC61EB461DA1436F5D22BCE51425660
                                                                                                                    SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                                                                                                                    SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                                                                                                                    SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:res://ieframe.dll/dnserror.htm?ErrorStatus=0x800C0005&DNSError=9002
                                                                                                                    Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\down[1]
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):748
                                                                                                                    Entropy (8bit):7.249606135668305
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                                                                                                                    MD5:C4F558C4C8B56858F15C09037CD6625A
                                                                                                                    SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                                                                                                                    SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                                                                                                                    SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:res://ieframe.dll/down.png
                                                                                                                    Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\eRYlUYIMYsB_Pt8B7FTik-pl5cs.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):229
                                                                                                                    Entropy (8bit):4.773871204083538
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:3:2LGffIc6CaA5FSAGG4Aj6NhyII6RwZtSAnM+LAX6jUYkjdnwO6yJxWbMPJ/WrE6J:2LGXX6wFSADj6iIunnyh6TbMFsise2
                                                                                                                    MD5:EEE26AAC05916E789B25E56157B2C712
                                                                                                                    SHA1:5B35C3F44331CC91FC4BAB7D2D710C90E538BC8B
                                                                                                                    SHA-256:249BCDCAA655BDEE9D61EDFF9D93544FA343E0C2B4DCA4EC4264AF2CB00216C2
                                                                                                                    SHA-512:A664F5A91230C0715758416ADACEEAEFDC9E1A567A20A2331A476A82E08DF7268914DA2F085846A744B073011FD36B1FB47B8E4EED3A0C9F908790439C930538
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/eRYlUYIMYsB_Pt8B7FTik-pl5cs.gz.js
                                                                                                                    Preview: (function(){var t=_ge("id_h"),n=_ge("langChange"),i=_ge("me_header"),r=_ge("langDId"),u=_ge("mapContainer");t!=null&&n!=null&&i==null&&(r===null||u===null)&&(t.insertBefore(n,t.firstChild),n.className=n.className+" langdisp")})()
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\eaMqCdNxIXjLc0ATep7tsFkfmSA.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):2678
                                                                                                                    Entropy (8bit):5.2826483006453255
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:48:5sksiMwg1S0h195DlYt/5ZS/wAtKciZIgDa4V8ahSuf/Z/92zBDZDNJC0x0M:yklg1zbed3SBkdZYcZGVFNJCRM
                                                                                                                    MD5:270D1E6437F036799637F0E1DFBDCAB5
                                                                                                                    SHA1:5EDC39E2B6B1EF946F200282023DEDA21AC22DDE
                                                                                                                    SHA-256:783AC9FA4590EB0F713A5BCB1E402A1CB0EE32BB06B3C7558043D9459F47956E
                                                                                                                    SHA-512:10A5CE856D909C5C6618DE662DF1C21FA515D8B508938898E4EE64A70B61BE5F219F50917E4605BB57DB6825C925D37F01695A08A01A3C58E5194268B2F4DB3D
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/eaMqCdNxIXjLc0ATep7tsFkfmSA.gz.js
                                                                                                                    Preview: var IPv6Tests;(function(n){function c(t){var r,c,o,l,f,s,i,a,v;try{if(y(),t==null||t.length==0)return;if(r=sj_cook.get(n.ipv6testcookie,n.ipv6testcrumb),r!=null&&r=="1"&&!u)return;if(c=sj_cook.get(n.ipv6testcookie,n.iptypecrumb),r!=null&&c&&u&&(o=Number(r),l=(new Date).getTime(),o!=NaN&&o>l))return;if(f=_d.getElementsByTagName("head")[0],!f)return;if(s="ipV6TestScript"+t,i=sj_ce("script",s),i.type="text/javascript",i.async=!0,i.onerror=function(){Log.Log("ipv6test","IPv6Test Dom_ "+t,"IPv6TestError",!1,"Error","JSONP call resulted in error.")},a=_ge(s),a&&f)return;f.insertBefore(i,f.firstChild);i.setAttribute("src",_w.location.protocol+"//"+t+".bing.com/ipv6test/test");e&&p();v=u?(new Date).getTime()+h:"1";sj_cook.set(n.ipv6testcookie,n.ipv6testcrumb,v.toString(),!1)}catch(w){Log.Log("ipv6test","Dom_ "+t,"IPv6TestError",!1,"Error","Failed to make JSONP call. Exception - "+w.message)}}function l(t){if(!t){Log.Log("ipv6test","IPv6TestResponseError","IPv6TestError",!1,"Error","Got null re
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\errorPageStrings[1]
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):4720
                                                                                                                    Entropy (8bit):5.164796203267696
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                                                                                                                    MD5:D65EC06F21C379C87040B83CC1ABAC6B
                                                                                                                    SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                                                                                                                    SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                                                                                                                    SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                                                                                                                    Malicious:false
                                                                                                                    Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\favicon-2x[1].ico
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):4286
                                                                                                                    Entropy (8bit):3.8046022951415335
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:24:suZOWcCXPRS4QAUs/KBy3TYI42Apvl6wheXpktCH2Yn4KgISQggggFpz1k9PAYHu:HBRh+sCBykteatiBn4KWi1+Ne
                                                                                                                    MD5:DA597791BE3B6E732F0BC8B20E38EE62
                                                                                                                    SHA1:1125C45D285C360542027D7554A5C442288974DE
                                                                                                                    SHA-256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
                                                                                                                    SHA-512:D8DC8358727590A1ED74DC70356AEDC0499552C2DC0CD4F7A01853DD85CEB3AEAD5FBDC7C75D7DA36DB6AF2448CE5ABDFF64CEBDCA3533ECAD953C061A9B338E
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/sa/simg/favicon-2x.ico
                                                                                                                    Preview: ...... .... .........(... ...@..... ...................................................................................................................................................................................................N...Sz..R...R...P...N..L..H..DG..........................................................................................R6..U...U...S...R...P...N..L..I..F..B...7...............................................................................S6..V...V...U...S...R...P...N..L..I..F..C...?..:z......................................................................O...W...V...V...U...S...R...P...N..L..I..E..C...?...;..{7..q2$..............................................................T..D..]...S)..p6..J...R...P...N..L..I..E..B..>..;..z7..p2..f,X.........................................................A..O#..N!..N!..N!..P$..q:...P...N..K..I..E..A..=..9..x5..n0..e,...5...................................................Ea.Z,..T$..T$..T
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\httpErrorPagesScripts[1]
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):12105
                                                                                                                    Entropy (8bit):5.451485481468043
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                                                                                                                    MD5:9234071287E637F85D721463C488704C
                                                                                                                    SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                                                                                                                    SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                                                                                                                    SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                                                                                                                    Malicious:false
                                                                                                                    Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\lK_FmcR4naKX9hpIwfe9ify1hf4.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:UTF-8 Unicode text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):125734
                                                                                                                    Entropy (8bit):5.670169400028476
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:1536:ppkCMu1Rv0SuDHT4kfr5IRnO8E9FqJCnq1EoAXycCroA0wT8aHs3:3Mu1Rv0SvNmeGq1ENXdTAVM
                                                                                                                    MD5:C24FE194A488B12CCE5B3858D12C2C3D
                                                                                                                    SHA1:E55B3E549CA42D614BEE0C4538F9EDA6C89DE00D
                                                                                                                    SHA-256:45A1BD96D9A1BB1F03191C2F062FDC5369542864C4777A67623811BE6463D4D6
                                                                                                                    SHA-512:4F1C02C2FE716DBEAF061DC9476AD35E33F5C808FD3D79D0ADBECED81B65A02225F7356DBCB10A7232BDD7D02BC0C908F17BB61B058FF5FB99747202522B5473
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/lK_FmcR4naKX9hpIwfe9ify1hf4.gz.js
                                                                                                                    Preview: var __assign=this&&this.__assign||function(){return __assign=Object.assign||function(n){for(var t,r,i=1,u=arguments.length;i<u;i++){t=arguments[i];for(r in t)Object.prototype.hasOwnProperty.call(t,r)&&(n[r]=t[r])}return n},__assign.apply(this,arguments)},__rest=this&&this.__rest||function(n,t){var u={},r;for(var i in n)Object.prototype.hasOwnProperty.call(n,i)&&t.indexOf(i)<0&&(u[i]=n[i]);if(n!=null&&typeof Object.getOwnPropertySymbols=="function")for(r=0,i=Object.getOwnPropertySymbols(n);r<i.length;r++)t.indexOf(i[r])<0&&Object.prototype.propertyIsEnumerable.call(n,i[r])&&(u[i[r]]=n[i[r]]);return u},__spreadArrays=this&&this.__spreadArrays||function(){for(var i=0,n=0,r=arguments.length;n<r;n++)i+=arguments[n].length;for(var u=Array(i),f=0,n=0;n<r;n++)for(var e=arguments[n],t=0,o=e.length;t<o;t++,f++)u[f]=e[t];return u},__awaiter=this&&this.__awaiter||function(n,t,i,r){function u(n){return n instanceof i?n:new i(function(t){t(n)})}return new(i||(i=Promise))(function(i,f){function o(n){
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\sTWC0LplwPyIP_jw8VjHps800ZQ.gz[1].js
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:ASCII text, with very long lines, with no line terminators
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):16386
                                                                                                                    Entropy (8bit):5.2866519663601315
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:384:+WLj/9N/zdUjP+c4QQKaK9JASETkyWJLhjO4YuiqRqNlRxW+:+u/P/zdUraOJhaShK1uiqR0T3
                                                                                                                    MD5:44AD44162E25A1DB1F46F78B8ECFAD42
                                                                                                                    SHA1:C63A0E7B132221D572A541F700601356627A98A4
                                                                                                                    SHA-256:5AE500A4737BE7B187EEA99AAB81CF3D4796D23550F7C5349DE2430E6624918D
                                                                                                                    SHA-512:4F0078431E86CCD8C0B3DE7E4F7CC10B184DC5376AD10C224EC081DAE1B9D16509E01A95CE3F3B4F7C394EC2C52782E4CB9AC2DE8C12CA0FFC9CC66C01C54AFD
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/rp/sTWC0LplwPyIP_jw8VjHps800ZQ.gz.js
                                                                                                                    Preview: var customEvents,__spreadArrays,fallbackReplay,EventLoggingModule;_w.EventsToDuplicate=[];_w.useSharedLocalStorage=!1;define("shared",["require","exports"],function(n,t){function s(n,t){for(var r=n.length,i=0;i<r;i++)t(n[i])}function r(n){for(var i=[],t=1;t<arguments.length;t++)i[t-1]=arguments[t];return function(){n.apply(null,i)}}function u(n){i&&event&&(event.returnValue=!1);n&&typeof n.preventDefault=="function"&&n.preventDefault()}function f(n){i&&event&&(event.cancelBubble=!0);n&&typeof n.stopPropagation=="function"&&n.stopPropagation()}function e(n,t,i){for(var r=0;n&&n.offsetParent&&n!=(i||document.body);)r+=n["offset"+t],n=n.offsetParent;return r}function o(){return(new Date).getTime()}function h(n){return i?event:n}function c(n){return i?event?event.srcElement:null:n.target}function l(n){return i?event?event.fromElement:null:n.relatedTarget}function a(n){return i?event?event.toElement:null:n.relatedTarget}function v(n,t,i){while(n&&n!=(i||document.body)){if(n==t)return!0;n=n.
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\th[1].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 150x150, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):4858
                                                                                                                    Entropy (8bit):7.912860451432217
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:pPE/rJtrOaBegYjEZcV2CWr45p5VrbFU4/PbFI+tMpg:pPYKaBeXE6d59bLui
                                                                                                                    MD5:C27EAAD7FDCAD067348EB8426A6643DD
                                                                                                                    SHA1:D5362D86359F58F1F08EBC9E9F7627F61CB70909
                                                                                                                    SHA-256:20EA77BAF0828E450BB7EB0895759B7C760D1F4C00B1EF5366F91B2F23B30429
                                                                                                                    SHA-512:AF46A7A9FAEF467FBBA40194C4B8E6A57EDF476ACC10CBEE4CADF87E8CFFA5DBCCB6EC6601944724148F59E8EBCB317442F88BE272657EC4A9EDC841B984FBD2
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/th?u=https%3a%2f%2fimg-s-msn-com.akamaized.net%2ftenant%2famp%2fentityid%2fBB1fkGpp.img&ehk=EoXsvHvTz25OeDlk8%2f1AsQ0JRbPiNyy0iD13c2N9OGI%3d&w=150&h=150&c=8&rs=2&pid=WP0
                                                                                                                    Preview: ......JFIF.....`.`.....C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..%8&jP....p..u..p"..z....e.....`.1....:.....J.O3.........k......6I.J0..1..&K..(P...GS[..b.(.".....`zT.........I...3..}g<ig.M.r....~5.....[.....sz.f^.............(^Cg..{...1.....n1.`..A.*.I....m+;Gx......3..q[..!.p.......G..>VrU.+..).*..iZ.9lU)L)V.SJS$.R.V...2S..J.E...]...sEJR..:5L... ....)..@..s]|i..W..d7.<k.v.=z.....p.=l..,L.].....4...L..c.Q....j..}.%.....
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\th[2].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 150x150, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):3726
                                                                                                                    Entropy (8bit):7.864083694829938
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:48:pyYcuERAB4Zyb8BrwdM18WIaMAVwIIjMC+FrFza8JmQOQYBhvSp/BSq/DVimjw:pPEZc8ROMWWLMcj7rFza8/VY4MsVij
                                                                                                                    MD5:A6E6FD3AB66E5A2F49A45CCB2B61B19D
                                                                                                                    SHA1:9A7EC1C26991AFC76B694BECB95639DDE2AB9DA2
                                                                                                                    SHA-256:8FB3DE41169B7B8547E4F07836C9C9503655B613678E58DE449A0CB65DFACCE4
                                                                                                                    SHA-512:278DD1A867D863F595FB3B8398399F5EAFC332FB29981EF4BF9B14DBCBFBC55A9AC2CE3A86EB4A95F6CFC8C8BE9B60FF690BF9AB436D2AD270A3981ED23B457B
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/th?u=https%3a%2f%2fimg-s-msn-com.akamaized.net%2ftenant%2famp%2fentityid%2fBB1fkXNm.img&ehk=kxyU8xKPJMs4tMRWRT6cTgj6Bfiij4nG3t8YLJw8HCQ%3d&w=150&h=150&c=8&rs=2&pid=WP0
                                                                                                                    Preview: ......JFIF.....`.`.....C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....i....Q..@...P.c....8..;..*..\.@.>.......+.:iV.c.0.D.ub.j._..7.G....f.$(..p2....MsN..b..3+tBy>.Z.O.h. .e.O..e....n +._g....p.{....x.f..o,<^...g.\>....7P.*R..#..b0kB..%%tq..........Q@..Q@...u!...(...R.v(..KE......{....H'.....U,!X.2....K.sa2...p.W8..s...GL...Q./0v.2..$q...q..Gv........!.r...IU..._U....AYZFn.H^=I=.e..B.+\I4..I.y..p@...j.........A...M.+.v:lG.
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\th[3].jpg
                                                                                                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 150x150, frames 3
                                                                                                                    Category:downloaded
                                                                                                                    Size (bytes):4987
                                                                                                                    Entropy (8bit):7.9205495681055185
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:96:pPE32PK2X6035EzsdUWfNwjh4D8+MhUb80LvFwJp:pPi2PK2Xf35IjWfA4D24LFwH
                                                                                                                    MD5:E8349E3EA51D3A6E24284176981359EA
                                                                                                                    SHA1:0E009269A3DC197C7C46B765D24AC1F531AA4810
                                                                                                                    SHA-256:D88B8253842FB58AADAAEA2166863ADBFF91B77F0CAD8501100A47B7B9A999F6
                                                                                                                    SHA-512:85B79D9B4B2C47415EBD2E710EC71B66496F09BDB8822CF8AF7453C3C9D9423869FE3B4DD4D31A89ECFD7E7BC72A55205A306296369F490C12FB05800B6A2A0D
                                                                                                                    Malicious:false
                                                                                                                    IE Cache URL:https://www.bing.com/th?u=https%3a%2f%2fimg-s-msn-com.akamaized.net%2ftenant%2famp%2fentityid%2fBB1fkU9t.img&ehk=mxhBThhQVDlo%2bCYW2VhueyqJguPlSKZ1mWMM3nr17PY%3d&w=150&h=150&c=8&rs=2&pid=WP0
                                                                                                                    Preview: ......JFIF.....`.`.....C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...i.....h..f....E.:.m-..h.74......I.n.FE...f..I...;4..f.u.<.Bi.......LQLE.Z..U..A.$zS..|8..W(....e.e.F....;F..4.....H..9..;..-q...G.0...]...i....k........RI.\F.{...G s...K1..2I8.U;.f.L......X"iLK'....H..s.......%.H....O..q..G].7.n.$X.pcE...A....k..YS.Kfz8L,+...E+...#....%.D1.....G.+..&.(...\..\.w=C.@......er.D"h...Fs.J..%.i.s........:.8. ..i..1.....=k.

                                                                                                                    Static File Info

                                                                                                                    General

                                                                                                                    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                    Entropy (8bit):5.969526679450034
                                                                                                                    TrID:
                                                                                                                    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                                                                                                    • Generic Win/DOS Executable (2004/3) 0.20%
                                                                                                                    • DOS Executable Generic (2002/1) 0.20%
                                                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                    File name:gg_2.gif.dll
                                                                                                                    File size:103048
                                                                                                                    MD5:93b67d2be7ea4060f946c196af2b9f38
                                                                                                                    SHA1:ef7c7c2fbf1cd70b83811ce794509f4eb14bf370
                                                                                                                    SHA256:2817053b604f2d5f62400afd737d9124c87cc388f76aa10e5cc2db867a31c5dd
                                                                                                                    SHA512:3f92d5a0828d3d60bda93af14ad946b604a9b46c885453a89a241b85fec2cef75d8adcb000e54d3fdcb89861784fa1c6acf4964de45580674fd5a39e5a814684
                                                                                                                    SSDEEP:1536:DWKaY5Se9WnVI78XvnoxJasJvRHKmyGDvDk0Rt9Y56l5ZMpvV05o9OX5xPw8:DWa0eQnVI7qCqZGDvDk4wol5w0EU
                                                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......._W...6e..6e..6e..)v..6e...w..6e.Rich.6e.................PE..L.....f`...........!.....Z...........`.......p.....................

                                                                                                                    File Icon

                                                                                                                    Icon Hash:74f0e4ecccdce0e4

                                                                                                                    Static PE Info

                                                                                                                    General

                                                                                                                    Entrypoint:0x10006099
                                                                                                                    Entrypoint Section:.code
                                                                                                                    Digitally signed:false
                                                                                                                    Imagebase:0x10000000
                                                                                                                    Subsystem:windows gui
                                                                                                                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                                                                                                                    DLL Characteristics:
                                                                                                                    Time Stamp:0x6066E9D0 [Fri Apr 2 09:54:24 2021 UTC]
                                                                                                                    TLS Callbacks:
                                                                                                                    CLR (.Net) Version:
                                                                                                                    OS Version Major:4
                                                                                                                    OS Version Minor:0
                                                                                                                    File Version Major:4
                                                                                                                    File Version Minor:0
                                                                                                                    Subsystem Version Major:4
                                                                                                                    Subsystem Version Minor:0
                                                                                                                    Import Hash:811de8e945c2087a6e052096546cd842

                                                                                                                    Entrypoint Preview

                                                                                                                    Instruction
                                                                                                                    push ebx
                                                                                                                    push ebx
                                                                                                                    and dword ptr [esp], 00000000h
                                                                                                                    add dword ptr [esp], ebp
                                                                                                                    mov ebp, esp
                                                                                                                    add esp, FFFFFFF8h
                                                                                                                    push esi
                                                                                                                    mov dword ptr [esp], FFFF0000h
                                                                                                                    call 00007F3CCCBCB360h
                                                                                                                    push ecx
                                                                                                                    add dword ptr [esp], 00000247h
                                                                                                                    sub dword ptr [esp], ecx
                                                                                                                    push ecx
                                                                                                                    mov dword ptr [esp], 00005267h
                                                                                                                    call 00007F3CCCBC7D09h
                                                                                                                    push esi
                                                                                                                    mov esi, eax
                                                                                                                    or esi, eax
                                                                                                                    mov eax, esi
                                                                                                                    pop esi
                                                                                                                    jne 00007F3CCCBCCE02h
                                                                                                                    pushad
                                                                                                                    push 00000000h
                                                                                                                    mov dword ptr [esp], edi
                                                                                                                    xor edi, edi
                                                                                                                    or edi, dword ptr [ebx+0041856Bh]
                                                                                                                    mov eax, edi
                                                                                                                    pop edi
                                                                                                                    push edx
                                                                                                                    add dword ptr [esp], 40h
                                                                                                                    sub dword ptr [esp], edx
                                                                                                                    push ebx
                                                                                                                    mov dword ptr [esp], 00001000h
                                                                                                                    push edi
                                                                                                                    sub dword ptr [esp], edi
                                                                                                                    xor dword ptr [esp], eax
                                                                                                                    push 00000000h
                                                                                                                    call dword ptr [ebx+0045D014h]
                                                                                                                    mov dword ptr [ebp-04h], ecx
                                                                                                                    and ecx, 00000000h
                                                                                                                    xor ecx, eax
                                                                                                                    and edi, 00000000h
                                                                                                                    or edi, ecx
                                                                                                                    mov ecx, dword ptr [ebp-04h]
                                                                                                                    push eax
                                                                                                                    sub eax, dword ptr [esp]
                                                                                                                    or eax, edi
                                                                                                                    and dword ptr [ebx+0041809Bh], 00000000h
                                                                                                                    xor dword ptr [ebx+0041809Bh], eax
                                                                                                                    pop eax
                                                                                                                    cmp ebx, 00000000h
                                                                                                                    jbe 00007F3CCCBCCDDEh
                                                                                                                    add dword ptr [ebx+004180F7h], ebx
                                                                                                                    add dword ptr [ebx+00418633h], ebx
                                                                                                                    mov dword ptr [ebp-04h], edx
                                                                                                                    sub edx, edx
                                                                                                                    xor edx, dword ptr [ebx+004180F7h]
                                                                                                                    mov esi, edx
                                                                                                                    mov edx, dword ptr [ebp-04h]
                                                                                                                    push edi
                                                                                                                    xor edi, dword ptr [esp]
                                                                                                                    xor edi, dword ptr [ebx+0041856Bh]
                                                                                                                    and ecx, 00000000h
                                                                                                                    or ecx, edi
                                                                                                                    pop edi
                                                                                                                    cld
                                                                                                                    rep movsb
                                                                                                                    push ebx
                                                                                                                    mov dword ptr [eax+eax], 00000000h

                                                                                                                    Data Directories

                                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x170000x51.data
                                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x5d0500x64.data
                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x5d0000x50.data
                                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                                                    Sections

                                                                                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                    .code0x10000x159660x15a00False0.70799087789data6.48337924377IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                                    .data0x170000x510x200False0.140625data0.863325225156IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                    .rdata0x180000x44c5f0x1800False0.13330078125data0.926783139034IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                                    .data0x5d0000x2500x400False0.2900390625data2.96075631554IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ

                                                                                                                    Imports

                                                                                                                    DLLImport
                                                                                                                    user32.dllGetActiveWindow, CheckDlgButton, CheckMenuItem, CheckRadioButton, CheckMenuRadioItem
                                                                                                                    kernel32.dllGetProcAddress, LoadLibraryA, VirtualProtect, VirtualAlloc, lstrlenA, GetCurrentThreadId, GetCurrentProcess, GetCurrentThread, Module32FirstW
                                                                                                                    ole32.dllOleInitialize
                                                                                                                    comctl32.dllDPA_Sort

                                                                                                                    Exports

                                                                                                                    NameOrdinalAddress
                                                                                                                    StartService10x1000b959

                                                                                                                    Network Behavior

                                                                                                                    Network Port Distribution

                                                                                                                    TCP Packets

                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                    Apr 6, 2021 09:43:56.106827021 CEST4973080192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:43:56.106875896 CEST4972980192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:43:57.102603912 CEST4972980192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:43:57.118244886 CEST4973080192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:43:59.102857113 CEST4972980192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:43:59.134018898 CEST4973080192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:44:03.148806095 CEST4974080192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:44:04.134445906 CEST4974080192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:44:06.134604931 CEST4974080192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:44:09.352497101 CEST4974180192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:44:09.352719069 CEST4974280192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:44:10.353667974 CEST4974280192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:44:10.353682041 CEST4974180192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:44:12.353812933 CEST4974280192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:44:12.353883982 CEST4974180192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:44:16.375379086 CEST4974480192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:44:16.375444889 CEST4974380192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:44:17.385516882 CEST4974480192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:44:17.385540009 CEST4974380192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:44:19.385694027 CEST4974480192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:44:19.385713100 CEST4974380192.168.2.7185.243.114.196
                                                                                                                    Apr 6, 2021 09:44:33.554399967 CEST4975680192.168.2.7185.186.244.95
                                                                                                                    Apr 6, 2021 09:44:33.554403067 CEST4975780192.168.2.7185.186.244.95
                                                                                                                    Apr 6, 2021 09:44:34.543144941 CEST4975680192.168.2.7185.186.244.95
                                                                                                                    Apr 6, 2021 09:44:34.558823109 CEST4975780192.168.2.7185.186.244.95
                                                                                                                    Apr 6, 2021 09:44:36.543320894 CEST4975680192.168.2.7185.186.244.95
                                                                                                                    Apr 6, 2021 09:44:36.558970928 CEST4975780192.168.2.7185.186.244.95
                                                                                                                    Apr 6, 2021 09:44:44.858660936 CEST4975880192.168.2.7185.186.244.95
                                                                                                                    Apr 6, 2021 09:44:44.858670950 CEST4975980192.168.2.7185.186.244.95
                                                                                                                    Apr 6, 2021 09:44:45.856803894 CEST4975980192.168.2.7185.186.244.95
                                                                                                                    Apr 6, 2021 09:44:45.872411013 CEST4975880192.168.2.7185.186.244.95
                                                                                                                    Apr 6, 2021 09:44:47.872531891 CEST4975980192.168.2.7185.186.244.95
                                                                                                                    Apr 6, 2021 09:44:47.872539043 CEST4975880192.168.2.7185.186.244.95
                                                                                                                    Apr 6, 2021 09:44:51.889273882 CEST4976080192.168.2.7185.186.244.95
                                                                                                                    Apr 6, 2021 09:44:52.888562918 CEST4976080192.168.2.7185.186.244.95
                                                                                                                    Apr 6, 2021 09:44:54.888684988 CEST4976080192.168.2.7185.186.244.95

                                                                                                                    UDP Packets

                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                    Apr 6, 2021 09:42:34.881648064 CEST5782053192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:42:34.934434891 CEST53578208.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:42:35.824050903 CEST5084853192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:42:35.869875908 CEST53508488.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:42:37.069717884 CEST6124253192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:42:37.137613058 CEST53612428.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:42:55.651360035 CEST5856253192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:42:55.697336912 CEST53585628.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:42:57.046114922 CEST5659053192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:42:57.092035055 CEST53565908.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:01.879981041 CEST6050153192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:01.939616919 CEST53605018.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:02.080539942 CEST5377553192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:02.137077093 CEST53537758.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:03.400265932 CEST5183753192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:03.446458101 CEST53518378.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:05.578721046 CEST5541153192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:05.627563953 CEST53554118.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:06.702929020 CEST6366853192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:06.751795053 CEST53636688.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:07.979118109 CEST5464053192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:08.035418987 CEST53546408.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:08.220191956 CEST5873953192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:08.266136885 CEST53587398.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:09.922044039 CEST6033853192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:09.970926046 CEST53603388.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:10.055794954 CEST5871753192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:10.101711035 CEST53587178.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:10.245877981 CEST5976253192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:10.300235987 CEST53597628.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:11.346352100 CEST5432953192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:11.408977985 CEST53543298.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:11.469180107 CEST5805253192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:11.526518106 CEST53580528.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:12.003123045 CEST5400853192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:12.049132109 CEST53540088.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:12.859206915 CEST5945153192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:12.906091928 CEST53594518.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:13.803098917 CEST5291453192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:13.848953962 CEST53529148.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:14.844141960 CEST6456953192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:14.893002033 CEST53645698.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:19.034461975 CEST5281653192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:19.080424070 CEST53528168.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:22.988645077 CEST5078153192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:23.034521103 CEST53507818.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:23.857604027 CEST5423053192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:23.903712034 CEST53542308.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:25.236660004 CEST5491153192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:25.284245014 CEST53549118.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:26.250391960 CEST4995853192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:26.315198898 CEST53499588.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:29.603315115 CEST5086053192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:29.660588026 CEST53508608.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:29.716456890 CEST5045253192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:29.749583006 CEST5973053192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:29.762495041 CEST53504528.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:29.805938959 CEST53597308.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:31.474827051 CEST5931053192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:31.523916960 CEST53593108.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:37.984642982 CEST5191953192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:38.030749083 CEST53519198.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:38.976551056 CEST5191953192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:39.023224115 CEST53519198.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:39.977999926 CEST5191953192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:40.025016069 CEST53519198.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:41.977371931 CEST5191953192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:42.023483992 CEST53519198.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:45.992753983 CEST5191953192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:46.040611029 CEST53519198.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:54.693759918 CEST6429653192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:54.717427969 CEST5668053192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:54.752273083 CEST53642968.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:54.771936893 CEST53566808.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:56.011467934 CEST5882053192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:56.040554047 CEST6098353192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:56.079545975 CEST53588208.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:56.086494923 CEST53609838.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:57.102036953 CEST4924753192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:57.148258924 CEST53492478.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:43:57.183739901 CEST5228653192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:43:57.237943888 CEST53522868.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:02.642719030 CEST5606453192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:02.698501110 CEST53560648.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:09.269527912 CEST6374453192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:09.331233978 CEST53637448.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:10.161437035 CEST6145753192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:10.218655109 CEST53614578.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:22.291290998 CEST5836753192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:22.345509052 CEST53583678.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:22.925894022 CEST6059953192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:22.980329990 CEST53605998.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:23.403147936 CEST5957153192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:23.408040047 CEST5268953192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:23.457480907 CEST53595718.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:23.462517977 CEST53526898.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:23.575002909 CEST5029053192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:23.620867014 CEST53502908.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:23.930504084 CEST6042753192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:23.985405922 CEST53604278.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:24.513418913 CEST5620953192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:24.596847057 CEST53562098.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:24.670717955 CEST5958253192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:24.719486952 CEST53595828.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:25.213490009 CEST6094953192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:25.278352022 CEST53609498.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:25.683332920 CEST5958253192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:25.732191086 CEST53595828.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:25.788832903 CEST5854253192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:25.849915981 CEST53585428.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:26.699472904 CEST5958253192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:26.749284983 CEST53595828.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:26.899451017 CEST5917953192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:26.958055973 CEST53591798.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:27.841487885 CEST6092753192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:27.896445036 CEST53609278.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:28.413069010 CEST5785453192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:28.496660948 CEST53578548.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:28.715058088 CEST5958253192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:28.764534950 CEST53595828.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:32.103481054 CEST6202653192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:32.159796953 CEST53620268.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:32.730901957 CEST5958253192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:32.782155991 CEST53595828.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:33.456516027 CEST5945353192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:33.525907040 CEST53594538.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:40.575429916 CEST6246853192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:40.629792929 CEST53624688.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:44.532078028 CEST5256353192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:44.594131947 CEST53525638.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:44.799652100 CEST5472153192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:44.854104996 CEST53547218.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:44:58.892924070 CEST6282653192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:44:58.950344086 CEST53628268.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:45:01.977078915 CEST6204653192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:45:02.033859968 CEST53620468.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:45:02.228313923 CEST5122353192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:45:02.274180889 CEST53512238.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:45:02.471421957 CEST6390853192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:45:02.539561033 CEST53639088.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:45:03.023102045 CEST4922653192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:45:03.026839018 CEST6021253192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:45:03.027239084 CEST5886753192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:45:03.068928957 CEST53492268.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:45:03.072657108 CEST53602128.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:45:03.094922066 CEST53588678.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:45:19.965068102 CEST5086453192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:45:20.021604061 CEST53508648.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:45:20.235553026 CEST6150453192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:45:20.281605959 CEST53615048.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:45:20.459345102 CEST6023153192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:45:20.505398035 CEST53602318.8.8.8192.168.2.7
                                                                                                                    Apr 6, 2021 09:45:20.941323996 CEST5009553192.168.2.78.8.8.8
                                                                                                                    Apr 6, 2021 09:45:20.987087965 CEST53500958.8.8.8192.168.2.7

                                                                                                                    DNS Queries

                                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                                    Apr 6, 2021 09:43:11.346352100 CEST192.168.2.78.8.8.80xd614Standard query (0)login.microsoftonline.comA (IP address)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:43:56.011467934 CEST192.168.2.78.8.8.80x4756Standard query (0)under17.comA (IP address)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:44:09.269527912 CEST192.168.2.78.8.8.80x52ddStandard query (0)under17.comA (IP address)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:44:10.161437035 CEST192.168.2.78.8.8.80x1fb7Standard query (0)under17.comA (IP address)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:44:23.403147936 CEST192.168.2.78.8.8.80xeaadStandard query (0)under17.comA (IP address)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:44:33.456516027 CEST192.168.2.78.8.8.80xe931Standard query (0)urs-world.comA (IP address)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:44:40.575429916 CEST192.168.2.78.8.8.80xbec5Standard query (0)urs-world.comA (IP address)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:44:44.799652100 CEST192.168.2.78.8.8.80x17c2Standard query (0)urs-world.comA (IP address)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:44:58.892924070 CEST192.168.2.78.8.8.80x4dbbStandard query (0)urs-world.comA (IP address)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:45:03.027239084 CEST192.168.2.78.8.8.80xaee0Standard query (0)login.microsoftonline.comA (IP address)IN (0x0001)

                                                                                                                    DNS Answers

                                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                                    Apr 6, 2021 09:43:11.408977985 CEST8.8.8.8192.168.2.70xd614No error (0)login.microsoftonline.coma.privatelink.msidentity.comCNAME (Canonical name)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:43:11.408977985 CEST8.8.8.8192.168.2.70xd614No error (0)a.privatelink.msidentity.comprda.aadg.msidentity.comCNAME (Canonical name)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:43:11.408977985 CEST8.8.8.8192.168.2.70xd614No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.trafficmanager.netCNAME (Canonical name)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:43:11.526518106 CEST8.8.8.8192.168.2.70xd60aNo error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.trafficmanager.netCNAME (Canonical name)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:43:56.079545975 CEST8.8.8.8192.168.2.70x4756No error (0)under17.com185.243.114.196A (IP address)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:44:09.331233978 CEST8.8.8.8192.168.2.70x52ddNo error (0)under17.com185.243.114.196A (IP address)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:44:10.218655109 CEST8.8.8.8192.168.2.70x1fb7Server failure (2)under17.comnonenoneA (IP address)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:44:23.457480907 CEST8.8.8.8192.168.2.70xeaadNo error (0)under17.com185.243.114.196A (IP address)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:44:33.525907040 CEST8.8.8.8192.168.2.70xe931No error (0)urs-world.com185.186.244.95A (IP address)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:44:40.629792929 CEST8.8.8.8192.168.2.70xbec5Server failure (2)urs-world.comnonenoneA (IP address)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:44:44.854104996 CEST8.8.8.8192.168.2.70x17c2No error (0)urs-world.com185.186.244.95A (IP address)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:44:58.950344086 CEST8.8.8.8192.168.2.70x4dbbNo error (0)urs-world.com185.186.244.95A (IP address)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:45:03.068928957 CEST8.8.8.8192.168.2.70x45afNo error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.trafficmanager.netCNAME (Canonical name)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:45:03.094922066 CEST8.8.8.8192.168.2.70xaee0No error (0)login.microsoftonline.coma.privatelink.msidentity.comCNAME (Canonical name)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:45:03.094922066 CEST8.8.8.8192.168.2.70xaee0No error (0)a.privatelink.msidentity.comprda.aadg.msidentity.comCNAME (Canonical name)IN (0x0001)
                                                                                                                    Apr 6, 2021 09:45:03.094922066 CEST8.8.8.8192.168.2.70xaee0No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)

                                                                                                                    Code Manipulations

                                                                                                                    Statistics

                                                                                                                    Behavior

                                                                                                                    Click to jump to process

                                                                                                                    System Behavior

                                                                                                                    General

                                                                                                                    Start time:09:42:41
                                                                                                                    Start date:06/04/2021
                                                                                                                    Path:C:\Windows\System32\loaddll32.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:loaddll32.exe 'C:\Users\user\Desktop\gg_2.gif.dll'
                                                                                                                    Imagebase:0x210000
                                                                                                                    File size:116736 bytes
                                                                                                                    MD5 hash:542795ADF7CC08EFCF675D65310596E8
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.334082249.000000000317B000.00000004.00000040.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.334133428.000000000317B000.00000004.00000040.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000000.00000002.492240511.0000000000BD0000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.334122359.000000000317B000.00000004.00000040.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.480594234.0000000002F7F000.00000004.00000040.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.334100411.000000000317B000.00000004.00000040.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.334161617.000000000317B000.00000004.00000040.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.334180863.000000000317B000.00000004.00000040.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.415230609.000000000307D000.00000004.00000040.sdmp, Author: Joe Security
                                                                                                                    Reputation:moderate

                                                                                                                    General

                                                                                                                    Start time:09:42:42
                                                                                                                    Start date:06/04/2021
                                                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\gg_2.gif.dll',#1
                                                                                                                    Imagebase:0x870000
                                                                                                                    File size:232960 bytes
                                                                                                                    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high

                                                                                                                    General

                                                                                                                    Start time:09:42:42
                                                                                                                    Start date:06/04/2021
                                                                                                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:rundll32.exe C:\Users\user\Desktop\gg_2.gif.dll,StartService
                                                                                                                    Imagebase:0x1370000
                                                                                                                    File size:61952 bytes
                                                                                                                    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000002.00000002.260825998.0000000001060000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                    Reputation:high

                                                                                                                    General

                                                                                                                    Start time:09:42:42
                                                                                                                    Start date:06/04/2021
                                                                                                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:rundll32.exe 'C:\Users\user\Desktop\gg_2.gif.dll',#1
                                                                                                                    Imagebase:0x1370000
                                                                                                                    File size:61952 bytes
                                                                                                                    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.321638626.0000000005A78000.00000004.00000040.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.321709185.0000000005A78000.00000004.00000040.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.321582588.0000000005A78000.00000004.00000040.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.321610032.0000000005A78000.00000004.00000040.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.321662691.0000000005A78000.00000004.00000040.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000002.494742479.0000000005A78000.00000004.00000040.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.321684389.0000000005A78000.00000004.00000040.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.321545910.0000000005A78000.00000004.00000040.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000003.00000002.492614087.0000000001330000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.321698074.0000000005A78000.00000004.00000040.sdmp, Author: Joe Security
                                                                                                                    Reputation:high

                                                                                                                    General

                                                                                                                    Start time:09:43:06
                                                                                                                    Start date:06/04/2021
                                                                                                                    Path:C:\Program Files\internet explorer\iexplore.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                                                                                                                    Imagebase:0x7ff6df460000
                                                                                                                    File size:823560 bytes
                                                                                                                    MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high

                                                                                                                    General

                                                                                                                    Start time:09:43:07
                                                                                                                    Start date:06/04/2021
                                                                                                                    Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6788 CREDAT:17410 /prefetch:2
                                                                                                                    Imagebase:0xf60000
                                                                                                                    File size:822536 bytes
                                                                                                                    MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high

                                                                                                                    General

                                                                                                                    Start time:09:43:53
                                                                                                                    Start date:06/04/2021
                                                                                                                    Path:C:\Program Files\internet explorer\iexplore.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                                                                                                                    Imagebase:0x7ff6df460000
                                                                                                                    File size:823560 bytes
                                                                                                                    MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high

                                                                                                                    General

                                                                                                                    Start time:09:43:54
                                                                                                                    Start date:06/04/2021
                                                                                                                    Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:7144 CREDAT:17410 /prefetch:2
                                                                                                                    Imagebase:0x7ff772bb0000
                                                                                                                    File size:822536 bytes
                                                                                                                    MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high

                                                                                                                    General

                                                                                                                    Start time:09:44:07
                                                                                                                    Start date:06/04/2021
                                                                                                                    Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:7144 CREDAT:82952 /prefetch:2
                                                                                                                    Imagebase:0xde0000
                                                                                                                    File size:822536 bytes
                                                                                                                    MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high

                                                                                                                    General

                                                                                                                    Start time:09:44:30
                                                                                                                    Start date:06/04/2021
                                                                                                                    Path:C:\Program Files\internet explorer\iexplore.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                                                                                                                    Imagebase:0x7ff6df460000
                                                                                                                    File size:823560 bytes
                                                                                                                    MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high

                                                                                                                    General

                                                                                                                    Start time:09:44:31
                                                                                                                    Start date:06/04/2021
                                                                                                                    Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:900 CREDAT:17410 /prefetch:2
                                                                                                                    Imagebase:0xde0000
                                                                                                                    File size:822536 bytes
                                                                                                                    MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high

                                                                                                                    Disassembly

                                                                                                                    Code Analysis

                                                                                                                    Reset < >