Edit tour

Windows Analysis Report
https://drive.usercontent.google.com/u/0/uc?id=1TmK4HJr3uREvbbX32pEPGn4J2OXNu2OH&export=download

Overview

General Information

Sample URL:https://drive.usercontent.google.com/u/0/uc?id=1TmK4HJr3uREvbbX32pEPGn4J2OXNu2OH&export=download
Analysis ID:1403483
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Downloads suspicious files via Chrome
Drops password protected ZIP file
Allocates memory with a write watch (potentially for evading sandboxes)
Creates a process in suspended mode (likely to inject code)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Tries to load missing DLLs
Uses insecure TLS / SSL version for HTTPS connection

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • chrome.exe (PID: 5952 cmdline: C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
    • chrome.exe (PID: 6092 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 --field-trial-handle=2356,i,9309288945864814519,1849516547289388514,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
    • unarchiver.exe (PID: 4072 cmdline: C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\Summaryform_TgQFBSAqdC.zip MD5: 16FF3CC6CC330A08EED70CBC1D35F5D2)
      • 7za.exe (PID: 4560 cmdline: C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\wfyl0eyp.svy" "C:\Users\user\Downloads\Summaryform_TgQFBSAqdC.zip MD5: 77E556CDFDC5C592F5C46DB4127C6F4C)
        • conhost.exe (PID: 2084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • chrome.exe (PID: 3800 cmdline: C:\Program Files\Google\Chrome\Application\chrome.exe" "https://drive.usercontent.google.com/u/0/uc?id=1TmK4HJr3uREvbbX32pEPGn4J2OXNu2OH&export=download MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49719 version: TLS 1.0
Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
Source: unknownHTTPS traffic detected: 23.51.58.94:443 -> 192.168.2.6:49710 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.51.58.94:443 -> 192.168.2.6:49711 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.6:49712 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.6:49720 version: TLS 1.2
Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49719 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: global trafficHTTP traffic detected: GET /u/0/uc?id=1TmK4HJr3uREvbbX32pEPGn4J2OXNu2OH&export=download HTTP/1.1Host: drive.usercontent.google.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlaHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: NID=511=UBeNCkZ3L8yXcx8qh4JFUXkwkNC9IrdiRdbjSTjqSiFh8WrRcbKr_rOJbgHY6TA4RT-6ps0bhemfwCPBsLMgPT7-gTcWqHvZvZbafOpkqRy0dLyYG9AjP2vbUBomarnc9pcZVlhHkUeUaWMurD0GGXyW05_B_1IyUNYEELmyqRg
Source: global trafficHTTP traffic detected: GET /uc?id=1TmK4HJr3uREvbbX32pEPGn4J2OXNu2OH&export=download HTTP/1.1Host: drive.usercontent.google.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlaHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.5938.134"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-wow64: ?0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: NID=511=UBeNCkZ3L8yXcx8qh4JFUXkwkNC9IrdiRdbjSTjqSiFh8WrRcbKr_rOJbgHY6TA4RT-6ps0bhemfwCPBsLMgPT7-gTcWqHvZvZbafOpkqRy0dLyYG9AjP2vbUBomarnc9pcZVlhHkUeUaWMurD0GGXyW05_B_1IyUNYEELmyqRg
Source: global trafficHTTP traffic detected: GET /download?id=1TmK4HJr3uREvbbX32pEPGn4J2OXNu2OH&export=download HTTP/1.1Host: drive.usercontent.google.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlaHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.5938.134"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-wow64: ?0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: NID=511=UBeNCkZ3L8yXcx8qh4JFUXkwkNC9IrdiRdbjSTjqSiFh8WrRcbKr_rOJbgHY6TA4RT-6ps0bhemfwCPBsLMgPT7-gTcWqHvZvZbafOpkqRy0dLyYG9AjP2vbUBomarnc9pcZVlhHkUeUaWMurD0GGXyW05_B_1IyUNYEELmyqRg
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=Y3c9VdhC9udV3oy&MD=9gpeVbRK HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=Y3c9VdhC9udV3oy&MD=9gpeVbRK HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: unknownDNS traffic detected: queries for: drive.usercontent.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownHTTPS traffic detected: 23.51.58.94:443 -> 192.168.2.6:49710 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.51.58.94:443 -> 192.168.2.6:49711 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.6:49712 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.6:49720 version: TLS 1.2

System Summary

barindex
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile dump: C:\Users\user\Downloads\Summaryform_TgQFBSAqdC.zip (copy)Jump to dropped file
Source: 14ae6381-e6b5-46f9-81ab-ef0eb7e840a5.tmp.0.drZip Entry: encrypted
Source: chromecache_47.2.drZip Entry: encrypted
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\7za.exeSection loaded: 7z.dllJump to behavior
Source: classification engineClassification label: mal48.win@22/6@4/4
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\14ae6381-e6b5-46f9-81ab-ef0eb7e840a5.tmpJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2084:120:WilError_03
Source: C:\Windows\SysWOW64\unarchiver.exeFile created: C:\Users\user\AppData\Local\Temp\unarchiver.logJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 --field-trial-handle=2356,i,9309288945864814519,1849516547289388514,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe" "https://drive.usercontent.google.com/u/0/uc?id=1TmK4HJr3uREvbbX32pEPGn4J2OXNu2OH&export=download
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Windows\SysWOW64\unarchiver.exe C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\Summaryform_TgQFBSAqdC.zip
Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\wfyl0eyp.svy" "C:\Users\user\Downloads\Summaryform_TgQFBSAqdC.zip
Source: C:\Windows\SysWOW64\7za.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 --field-trial-handle=2356,i,9309288945864814519,1849516547289388514,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Windows\SysWOW64\unarchiver.exe C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\Summaryform_TgQFBSAqdC.zipJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\wfyl0eyp.svy" "C:\Users\user\Downloads\Summaryform_TgQFBSAqdC.zipJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: D90000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 2A20000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 4A20000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeWindow / User API: threadDelayed 611Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeWindow / User API: threadDelayed 9360Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exe TID: 5836Thread sleep count: 611 > 30Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exe TID: 5836Thread sleep time: -305500s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exe TID: 5836Thread sleep count: 9360 > 30Jump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exe TID: 5836Thread sleep time: -4680000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeCode function: 5_2_00D3B1D6 GetSystemInfo,5_2_00D3B1D6
Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\wfyl0eyp.svy" "C:\Users\user\Downloads\Summaryform_TgQFBSAqdC.zipJump to behavior
Source: C:\Windows\SysWOW64\unarchiver.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping2
Virtualization/Sandbox Evasion
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
2
Virtualization/Sandbox Evasion
LSASS Memory1
Application Window Discovery
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Disable or Modify Tools
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1403483 URL: https://drive.usercontent.g... Startdate: 05/03/2024 Architecture: WINDOWS Score: 48 33 Drops password protected ZIP file 2->33 35 Downloads suspicious files via Chrome 2->35 8 chrome.exe 16 2->8         started        12 chrome.exe 2->12         started        process3 dnsIp4 29 192.168.2.6, 443, 49698, 49704 unknown unknown 8->29 31 239.255.255.250 unknown Reserved 8->31 23 C:\...\Summaryform_TgQFBSAqdC.zip (copy), Zip 8->23 dropped 14 unarchiver.exe 4 8->14         started        16 chrome.exe 8->16         started        file5 process6 dnsIp7 19 7za.exe 2 14->19         started        25 drive.usercontent.google.com 142.250.80.97, 443, 49704, 49705 GOOGLEUS United States 16->25 27 www.google.com 142.251.40.132, 443, 49709, 49722 GOOGLEUS United States 16->27 process8 process9 21 conhost.exe 19->21         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://drive.usercontent.google.com/u/0/uc?id=1TmK4HJr3uREvbbX32pEPGn4J2OXNu2OH&export=download0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
drive.usercontent.google.com
142.250.80.97
truefalse
    high
    www.google.com
    142.251.40.132
    truefalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      142.251.40.132
      www.google.comUnited States
      15169GOOGLEUSfalse
      239.255.255.250
      unknownReserved
      unknownunknownfalse
      142.250.80.97
      drive.usercontent.google.comUnited States
      15169GOOGLEUSfalse
      IP
      192.168.2.6
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1403483
      Start date and time:2024-03-05 15:33:49 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 3m 18s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:browseurl.jbs
      Sample URL:https://drive.usercontent.google.com/u/0/uc?id=1TmK4HJr3uREvbbX32pEPGn4J2OXNu2OH&export=download
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:12
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal48.win@22/6@4/4
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 45
      • Number of non-executed functions: 0
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 142.251.35.163, 142.250.65.206, 172.253.63.84, 34.104.35.123, 72.21.81.240, 192.229.211.108, 142.251.40.195
      • Excluded domains from analysis (whitelisted): fs.microsoft.com, clients2.google.com, ocsp.digicert.com, accounts.google.com, edgedl.me.gvt1.com, slscr.update.microsoft.com, update.googleapis.com, ctldl.windowsupdate.com, clientservices.googleapis.com, clients.l.google.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtQueryValueKey calls found.
      • Report size getting too big, too many NtSetInformationFile calls found.
      • VT rate limit hit for: https://drive.usercontent.google.com/u/0/uc?id=1TmK4HJr3uREvbbX32pEPGn4J2OXNu2OH&amp;export=download
      TimeTypeDescription
      15:35:14API Interceptor207121x Sleep call for process: unarchiver.exe modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Windows\SysWOW64\unarchiver.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):2236
      Entropy (8bit):5.120967102398691
      Encrypted:false
      SSDEEP:48:bBceGKGbKGKGpoGu+vGKGp2GbUGvGyGwGKGKGmBGKGTGKGmr1L1leE+:bZajMp
      MD5:051C023B2FEA1FA5B6AB8264EA9A1682
      SHA1:BD640F7CE546998942F4CD5E56D427A34B72467D
      SHA-256:2B9D00C0B9F37CD56849A4A01DB39E639A0CA609CC9F32FA6330D50CAC58314A
      SHA-512:973437F68FF87C265F9F9B9DC253A09C85E7329953BF7FF5BC52D1F4490F9A8CDEF490DB39A34970B92A63D9243E7696F14D93346A3B679CF51B11E35E59DD26
      Malicious:false
      Reputation:low
      Preview:03/05/2024 3:34 PM: Unpack: C:\Users\user\Downloads\Summaryform_TgQFBSAqdC.zip..03/05/2024 3:34 PM: Tmp dir: C:\Users\user\AppData\Local\Temp\wfyl0eyp.svy..03/05/2024 3:34 PM: Received from standard error: ERROR: Wrong password : Summaryform_TgQFBSAqdC.wsf..03/05/2024 3:34 PM: Received from standard out: ..03/05/2024 3:34 PM: Received from standard out: 7-Zip 18.05 (x86) : Copyright (c) 1999-2018 Igor Pavlov : 2018-04-30..03/05/2024 3:34 PM: Received from standard out: ..03/05/2024 3:34 PM: Received from standard out: Scanning the drive for archives:..03/05/2024 3:34 PM: Received from standard out: 1 file, 612 bytes (1 KiB)..03/05/2024 3:34 PM: Received from standard out: ..03/05/2024 3:34 PM: Received from standard out: Extracting archive: C:\Users\user\Downloads\Summaryform_TgQFBSAqdC.zip..03/05/2024 3:34 PM: Received from standard out: --..03/05/2024 3:34 PM: Received from standard out: Path = C:\Users\user\Downloads\Summaryform_TgQFBSAqdC.zip..03/05/2024 3:34 PM: Re
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
      Category:dropped
      Size (bytes):612
      Entropy (8bit):7.252186285235145
      Encrypted:false
      SSDEEP:12:5jVvbjghdj9QTRdSq4GDIWbL3bTqiaTKFmkAjdFyia4E:9VvBldF4XWf3r5gNjzE
      MD5:015885D6F41D87FAF2BA3FF84B14EDD7
      SHA1:190998335054871E3C25D4514FFD43025B4F7E8A
      SHA-256:618071D265A7E8ECCE116311736145E343C89AEA5548E424A5A911D1FE249151
      SHA-512:4A7289AC5F1C64B01E9CC790EE6213109BF2E1722DFC5BB45E2B88EC327B9A3814F8DD03CDDC5BC627F6F6BD4E51A2FB9CB7FCBB810801E230E30C6773F34E95
      Malicious:false
      Reputation:low
      Preview:PK........T.dXN.'<.....9......Summaryform_TgQFBSAqdC.wsf..g.....P.....c.pv..0a..Z5.wq...l....5C.].xY..(.<-...."...>...6..*u....q...\!.c.r2..x.=.ite!R....LU...9.A.A=T.{". q5Y.1l..L$...........]fn.=...!.6..&...A.R...."5..o.c..........L..u.c....:@z.9......[T.....?=...<x0|.z..XE.....=.".w.h..y....._...@.%.._.+.X.r.4E^w.].l..".......[K...8...OX..L.......S4..[..2L...u..^...(.HM^.........Sj..s.?..4..X.};.z'.......J..L...B..jR.2.....;.yY..[........PK..N.'<.....9..PK..........T.dXN.'<.....9....$....... .......Summaryform_TgQFBSAqdC.wsf.. ..........&...n...&...n.......n..PK..........l.........
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
      Category:dropped
      Size (bytes):612
      Entropy (8bit):7.252186285235145
      Encrypted:false
      SSDEEP:12:5jVvbjghdj9QTRdSq4GDIWbL3bTqiaTKFmkAjdFyia4E:9VvBldF4XWf3r5gNjzE
      MD5:015885D6F41D87FAF2BA3FF84B14EDD7
      SHA1:190998335054871E3C25D4514FFD43025B4F7E8A
      SHA-256:618071D265A7E8ECCE116311736145E343C89AEA5548E424A5A911D1FE249151
      SHA-512:4A7289AC5F1C64B01E9CC790EE6213109BF2E1722DFC5BB45E2B88EC327B9A3814F8DD03CDDC5BC627F6F6BD4E51A2FB9CB7FCBB810801E230E30C6773F34E95
      Malicious:true
      Reputation:low
      Preview:PK........T.dXN.'<.....9......Summaryform_TgQFBSAqdC.wsf..g.....P.....c.pv..0a..Z5.wq...l....5C.].xY..(.<-...."...>...6..*u....q...\!.c.r2..x.=.ite!R....LU...9.A.A=T.{". q5Y.1l..L$...........]fn.=...!.6..&...A.R...."5..o.c..........L..u.c....:@z.9......[T.....?=...<x0|.z..XE.....=.".w.h..y....._...@.%.._.+.X.r.4E^w.].l..".......[K...8...OX..L.......S4..[..2L...u..^...(.HM^.........Sj..s.?..4..X.};.z'.......J..L...B..jR.2.....;.yY..[........PK..N.'<.....9..PK..........T.dXN.'<.....9....$....... .......Summaryform_TgQFBSAqdC.wsf.. ..........&...n...&...n.......n..PK..........l.........
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
      Category:dropped
      Size (bytes):612
      Entropy (8bit):7.252186285235145
      Encrypted:false
      SSDEEP:12:5jVvbjghdj9QTRdSq4GDIWbL3bTqiaTKFmkAjdFyia4E:9VvBldF4XWf3r5gNjzE
      MD5:015885D6F41D87FAF2BA3FF84B14EDD7
      SHA1:190998335054871E3C25D4514FFD43025B4F7E8A
      SHA-256:618071D265A7E8ECCE116311736145E343C89AEA5548E424A5A911D1FE249151
      SHA-512:4A7289AC5F1C64B01E9CC790EE6213109BF2E1722DFC5BB45E2B88EC327B9A3814F8DD03CDDC5BC627F6F6BD4E51A2FB9CB7FCBB810801E230E30C6773F34E95
      Malicious:false
      Reputation:low
      Preview:PK........T.dXN.'<.....9......Summaryform_TgQFBSAqdC.wsf..g.....P.....c.pv..0a..Z5.wq...l....5C.].xY..(.<-...."...>...6..*u....q...\!.c.r2..x.=.ite!R....LU...9.A.A=T.{". q5Y.1l..L$...........]fn.=...!.6..&...A.R...."5..o.c..........L..u.c....:@z.9......[T.....?=...<x0|.z..XE.....=.".w.h..y....._...@.%.._.+.X.r.4E^w.].l..".......[K...8...OX..L.......S4..[..2L...u..^...(.HM^.........Sj..s.?..4..X.};.z'.......J..L...B..jR.2.....;.yY..[........PK..N.'<.....9..PK..........T.dXN.'<.....9....$....... .......Summaryform_TgQFBSAqdC.wsf.. ..........&...n...&...n.......n..PK..........l.........
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
      Category:downloaded
      Size (bytes):612
      Entropy (8bit):7.252186285235145
      Encrypted:false
      SSDEEP:12:5jVvbjghdj9QTRdSq4GDIWbL3bTqiaTKFmkAjdFyia4E:9VvBldF4XWf3r5gNjzE
      MD5:015885D6F41D87FAF2BA3FF84B14EDD7
      SHA1:190998335054871E3C25D4514FFD43025B4F7E8A
      SHA-256:618071D265A7E8ECCE116311736145E343C89AEA5548E424A5A911D1FE249151
      SHA-512:4A7289AC5F1C64B01E9CC790EE6213109BF2E1722DFC5BB45E2B88EC327B9A3814F8DD03CDDC5BC627F6F6BD4E51A2FB9CB7FCBB810801E230E30C6773F34E95
      Malicious:false
      Reputation:low
      URL:https://drive.usercontent.google.com/download?id=1TmK4HJr3uREvbbX32pEPGn4J2OXNu2OH&export=download
      Preview:PK........T.dXN.'<.....9......Summaryform_TgQFBSAqdC.wsf..g.....P.....c.pv..0a..Z5.wq...l....5C.].xY..(.<-...."...>...6..*u....q...\!.c.r2..x.=.ite!R....LU...9.A.A=T.{". q5Y.1l..L$...........]fn.=...!.6..&...A.R...."5..o.c..........L..u.c....:@z.9......[T.....?=...<x0|.z..XE.....=.".w.h..y....._...@.%.._.+.X.r.4E^w.].l..".......[K...8...OX..L.......S4..[..2L...u..^...(.HM^.........Sj..s.?..4..X.};.z'.......J..L...B..jR.2.....;.yY..[........PK..N.'<.....9..PK..........T.dXN.'<.....9....$....... .......Summaryform_TgQFBSAqdC.wsf.. ..........&...n...&...n.......n..PK..........l.........
      No static file info

      Download Network PCAP: filteredfull

      • Total Packets: 116
      • 443 (HTTPS)
      • 53 (DNS)
      TimestampSource PortDest PortSource IPDest IP
      Mar 5, 2024 15:34:30.721304893 CET49674443192.168.2.6173.222.162.64
      Mar 5, 2024 15:34:30.721410990 CET49673443192.168.2.6173.222.162.64
      Mar 5, 2024 15:34:31.033813000 CET49672443192.168.2.6173.222.162.64
      Mar 5, 2024 15:34:37.552535057 CET49704443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:37.552577972 CET44349704142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:37.552653074 CET49704443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:37.553061962 CET49705443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:37.553111076 CET44349705142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:37.553169012 CET49705443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:37.553503036 CET49704443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:37.553520918 CET44349704142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:37.553682089 CET49705443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:37.553697109 CET44349705142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:37.777261019 CET44349705142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:37.777556896 CET49705443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:37.777571917 CET44349705142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:37.779031038 CET44349705142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:37.779117107 CET49705443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:37.780014038 CET49705443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:37.780102015 CET44349705142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:37.780245066 CET49705443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:37.780253887 CET44349705142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:37.783962965 CET44349704142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:37.784179926 CET49704443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:37.784198999 CET44349704142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:37.785242081 CET44349704142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:37.785304070 CET49704443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:37.786058903 CET49704443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:37.786120892 CET44349704142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:37.827876091 CET49704443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:37.827879906 CET49705443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:37.827888012 CET44349704142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:37.877820969 CET49704443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:37.973752022 CET44349705142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:37.973927021 CET44349705142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:37.974020004 CET49705443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:37.975999117 CET49705443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:37.976021051 CET44349705142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:37.977859974 CET49704443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:38.017944098 CET44349704142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:38.178420067 CET44349704142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:38.178500891 CET49704443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:38.178519011 CET44349704142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:38.178569078 CET49704443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:38.180788994 CET49704443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:38.180807114 CET44349704142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:38.182095051 CET49708443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:38.182115078 CET44349708142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:38.182176113 CET49708443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:38.182981968 CET49708443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:38.182992935 CET44349708142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:38.378262043 CET44349708142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:38.380793095 CET49708443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:38.380816936 CET44349708142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:38.381686926 CET44349708142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:38.382478952 CET49708443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:38.382550001 CET44349708142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:38.382949114 CET49708443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:38.425903082 CET44349708142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:38.979764938 CET44349708142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:38.979856968 CET49708443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:38.979931116 CET44349708142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:38.980137110 CET44349708142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:38.980184078 CET49708443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:39.005170107 CET49708443192.168.2.6142.250.80.97
      Mar 5, 2024 15:34:39.005198956 CET44349708142.250.80.97192.168.2.6
      Mar 5, 2024 15:34:39.465284109 CET49709443192.168.2.6142.251.40.132
      Mar 5, 2024 15:34:39.465379000 CET44349709142.251.40.132192.168.2.6
      Mar 5, 2024 15:34:39.465478897 CET49709443192.168.2.6142.251.40.132
      Mar 5, 2024 15:34:39.465734005 CET49709443192.168.2.6142.251.40.132
      Mar 5, 2024 15:34:39.465764999 CET44349709142.251.40.132192.168.2.6
      Mar 5, 2024 15:34:39.745116949 CET44349709142.251.40.132192.168.2.6
      Mar 5, 2024 15:34:39.745446920 CET49709443192.168.2.6142.251.40.132
      Mar 5, 2024 15:34:39.745491982 CET44349709142.251.40.132192.168.2.6
      Mar 5, 2024 15:34:39.746783018 CET44349709142.251.40.132192.168.2.6
      Mar 5, 2024 15:34:39.746882915 CET49709443192.168.2.6142.251.40.132
      Mar 5, 2024 15:34:39.928219080 CET49709443192.168.2.6142.251.40.132
      Mar 5, 2024 15:34:39.928622961 CET44349709142.251.40.132192.168.2.6
      Mar 5, 2024 15:34:39.972196102 CET49709443192.168.2.6142.251.40.132
      Mar 5, 2024 15:34:39.972253084 CET44349709142.251.40.132192.168.2.6
      Mar 5, 2024 15:34:40.020288944 CET49709443192.168.2.6142.251.40.132
      Mar 5, 2024 15:34:40.330410957 CET49673443192.168.2.6173.222.162.64
      Mar 5, 2024 15:34:40.330410957 CET49674443192.168.2.6173.222.162.64
      Mar 5, 2024 15:34:40.335055113 CET49710443192.168.2.623.51.58.94
      Mar 5, 2024 15:34:40.335140944 CET4434971023.51.58.94192.168.2.6
      Mar 5, 2024 15:34:40.335232019 CET49710443192.168.2.623.51.58.94
      Mar 5, 2024 15:34:40.337965965 CET49710443192.168.2.623.51.58.94
      Mar 5, 2024 15:34:40.338001013 CET4434971023.51.58.94192.168.2.6
      Mar 5, 2024 15:34:40.532202005 CET4434971023.51.58.94192.168.2.6
      Mar 5, 2024 15:34:40.532303095 CET49710443192.168.2.623.51.58.94
      Mar 5, 2024 15:34:40.541541100 CET49710443192.168.2.623.51.58.94
      Mar 5, 2024 15:34:40.541564941 CET4434971023.51.58.94192.168.2.6
      Mar 5, 2024 15:34:40.542020082 CET4434971023.51.58.94192.168.2.6
      Mar 5, 2024 15:34:40.585342884 CET49710443192.168.2.623.51.58.94
      Mar 5, 2024 15:34:40.643230915 CET49672443192.168.2.6173.222.162.64
      Mar 5, 2024 15:34:40.668014050 CET49710443192.168.2.623.51.58.94
      Mar 5, 2024 15:34:40.709933043 CET4434971023.51.58.94192.168.2.6
      Mar 5, 2024 15:34:40.756803036 CET4434971023.51.58.94192.168.2.6
      Mar 5, 2024 15:34:40.756890059 CET4434971023.51.58.94192.168.2.6
      Mar 5, 2024 15:34:40.757071018 CET49710443192.168.2.623.51.58.94
      Mar 5, 2024 15:34:40.757071018 CET49710443192.168.2.623.51.58.94
      Mar 5, 2024 15:34:40.757162094 CET49710443192.168.2.623.51.58.94
      Mar 5, 2024 15:34:40.757201910 CET4434971023.51.58.94192.168.2.6
      Mar 5, 2024 15:34:40.810055971 CET49711443192.168.2.623.51.58.94
      Mar 5, 2024 15:34:40.810146093 CET4434971123.51.58.94192.168.2.6
      Mar 5, 2024 15:34:40.810229063 CET49711443192.168.2.623.51.58.94
      Mar 5, 2024 15:34:40.810847998 CET49711443192.168.2.623.51.58.94
      Mar 5, 2024 15:34:40.810867071 CET4434971123.51.58.94192.168.2.6
      Mar 5, 2024 15:34:40.994476080 CET4434971123.51.58.94192.168.2.6
      Mar 5, 2024 15:34:40.994569063 CET49711443192.168.2.623.51.58.94
      Mar 5, 2024 15:34:40.996180058 CET49711443192.168.2.623.51.58.94
      Mar 5, 2024 15:34:40.996200085 CET4434971123.51.58.94192.168.2.6
      Mar 5, 2024 15:34:40.996579885 CET4434971123.51.58.94192.168.2.6
      Mar 5, 2024 15:34:40.998629093 CET49711443192.168.2.623.51.58.94
      Mar 5, 2024 15:34:41.045911074 CET4434971123.51.58.94192.168.2.6
      Mar 5, 2024 15:34:41.169104099 CET4434971123.51.58.94192.168.2.6
      Mar 5, 2024 15:34:41.198647022 CET4434971123.51.58.94192.168.2.6
      Mar 5, 2024 15:34:41.198712111 CET49711443192.168.2.623.51.58.94
      Mar 5, 2024 15:34:41.198829889 CET49711443192.168.2.623.51.58.94
      Mar 5, 2024 15:34:41.198848963 CET4434971123.51.58.94192.168.2.6
      Mar 5, 2024 15:34:41.198859930 CET49711443192.168.2.623.51.58.94
      Mar 5, 2024 15:34:41.198864937 CET4434971123.51.58.94192.168.2.6
      Mar 5, 2024 15:34:42.022905111 CET44349698173.222.162.64192.168.2.6
      Mar 5, 2024 15:34:42.024107933 CET49698443192.168.2.6173.222.162.64
      Mar 5, 2024 15:34:49.727570057 CET44349709142.251.40.132192.168.2.6
      Mar 5, 2024 15:34:49.727715015 CET44349709142.251.40.132192.168.2.6
      Mar 5, 2024 15:34:49.727806091 CET49709443192.168.2.6142.251.40.132
      Mar 5, 2024 15:34:50.992536068 CET49712443192.168.2.613.85.23.86
      Mar 5, 2024 15:34:50.992556095 CET4434971213.85.23.86192.168.2.6
      Mar 5, 2024 15:34:50.992639065 CET49712443192.168.2.613.85.23.86
      Mar 5, 2024 15:34:50.995877981 CET49712443192.168.2.613.85.23.86
      Mar 5, 2024 15:34:50.995893002 CET4434971213.85.23.86192.168.2.6
      Mar 5, 2024 15:34:51.418741941 CET4434971213.85.23.86192.168.2.6
      Mar 5, 2024 15:34:51.418823957 CET49712443192.168.2.613.85.23.86
      Mar 5, 2024 15:34:51.427895069 CET49712443192.168.2.613.85.23.86
      Mar 5, 2024 15:34:51.427906036 CET4434971213.85.23.86192.168.2.6
      Mar 5, 2024 15:34:51.428318024 CET4434971213.85.23.86192.168.2.6
      Mar 5, 2024 15:34:51.469372034 CET49712443192.168.2.613.85.23.86
      Mar 5, 2024 15:34:51.677431107 CET49709443192.168.2.6142.251.40.132
      Mar 5, 2024 15:34:51.677493095 CET44349709142.251.40.132192.168.2.6
      Mar 5, 2024 15:34:51.839164972 CET49712443192.168.2.613.85.23.86
      Mar 5, 2024 15:34:51.881907940 CET4434971213.85.23.86192.168.2.6
      Mar 5, 2024 15:34:52.100230932 CET4434971213.85.23.86192.168.2.6
      Mar 5, 2024 15:34:52.100260019 CET4434971213.85.23.86192.168.2.6
      Mar 5, 2024 15:34:52.100267887 CET4434971213.85.23.86192.168.2.6
      Mar 5, 2024 15:34:52.100280046 CET4434971213.85.23.86192.168.2.6
      Mar 5, 2024 15:34:52.100315094 CET4434971213.85.23.86192.168.2.6
      Mar 5, 2024 15:34:52.100332975 CET49712443192.168.2.613.85.23.86
      Mar 5, 2024 15:34:52.100346088 CET4434971213.85.23.86192.168.2.6
      Mar 5, 2024 15:34:52.100383997 CET49712443192.168.2.613.85.23.86
      Mar 5, 2024 15:34:52.100507975 CET4434971213.85.23.86192.168.2.6
      Mar 5, 2024 15:34:52.100550890 CET49712443192.168.2.613.85.23.86
      Mar 5, 2024 15:34:52.100555897 CET4434971213.85.23.86192.168.2.6
      Mar 5, 2024 15:34:52.100583076 CET4434971213.85.23.86192.168.2.6
      Mar 5, 2024 15:34:52.100603104 CET49712443192.168.2.613.85.23.86
      Mar 5, 2024 15:34:52.100603104 CET49712443192.168.2.613.85.23.86
      Mar 5, 2024 15:34:52.100642920 CET49712443192.168.2.613.85.23.86
      Mar 5, 2024 15:34:52.263123035 CET49698443192.168.2.6173.222.162.64
      Mar 5, 2024 15:34:52.263290882 CET49698443192.168.2.6173.222.162.64
      Mar 5, 2024 15:34:52.263664007 CET49719443192.168.2.6173.222.162.64
      Mar 5, 2024 15:34:52.263715982 CET44349719173.222.162.64192.168.2.6
      Mar 5, 2024 15:34:52.263796091 CET49719443192.168.2.6173.222.162.64
      Mar 5, 2024 15:34:52.264508963 CET49719443192.168.2.6173.222.162.64
      Mar 5, 2024 15:34:52.264538050 CET44349719173.222.162.64192.168.2.6
      Mar 5, 2024 15:34:52.342618942 CET49712443192.168.2.613.85.23.86
      Mar 5, 2024 15:34:52.342618942 CET49712443192.168.2.613.85.23.86
      Mar 5, 2024 15:34:52.342636108 CET4434971213.85.23.86192.168.2.6
      Mar 5, 2024 15:34:52.342643976 CET4434971213.85.23.86192.168.2.6
      Mar 5, 2024 15:34:52.422818899 CET44349698173.222.162.64192.168.2.6
      Mar 5, 2024 15:34:52.422841072 CET44349698173.222.162.64192.168.2.6
      Mar 5, 2024 15:34:52.592863083 CET44349719173.222.162.64192.168.2.6
      Mar 5, 2024 15:34:52.592926025 CET49719443192.168.2.6173.222.162.64
      Mar 5, 2024 15:35:11.756544113 CET44349719173.222.162.64192.168.2.6
      Mar 5, 2024 15:35:11.756643057 CET49719443192.168.2.6173.222.162.64
      Mar 5, 2024 15:35:28.837025881 CET49720443192.168.2.613.85.23.86
      Mar 5, 2024 15:35:28.837057114 CET4434972013.85.23.86192.168.2.6
      Mar 5, 2024 15:35:28.837125063 CET49720443192.168.2.613.85.23.86
      Mar 5, 2024 15:35:28.838840008 CET49720443192.168.2.613.85.23.86
      Mar 5, 2024 15:35:28.838852882 CET4434972013.85.23.86192.168.2.6
      Mar 5, 2024 15:35:29.262713909 CET4434972013.85.23.86192.168.2.6
      Mar 5, 2024 15:35:29.262794018 CET49720443192.168.2.613.85.23.86
      Mar 5, 2024 15:35:29.270404100 CET49720443192.168.2.613.85.23.86
      Mar 5, 2024 15:35:29.270432949 CET4434972013.85.23.86192.168.2.6
      Mar 5, 2024 15:35:29.270950079 CET4434972013.85.23.86192.168.2.6
      Mar 5, 2024 15:35:29.304716110 CET49720443192.168.2.613.85.23.86
      Mar 5, 2024 15:35:29.345911026 CET4434972013.85.23.86192.168.2.6
      Mar 5, 2024 15:35:29.664498091 CET4434972013.85.23.86192.168.2.6
      Mar 5, 2024 15:35:29.664562941 CET4434972013.85.23.86192.168.2.6
      Mar 5, 2024 15:35:29.664607048 CET4434972013.85.23.86192.168.2.6
      Mar 5, 2024 15:35:29.664632082 CET4434972013.85.23.86192.168.2.6
      Mar 5, 2024 15:35:29.664640903 CET49720443192.168.2.613.85.23.86
      Mar 5, 2024 15:35:29.664669991 CET4434972013.85.23.86192.168.2.6
      Mar 5, 2024 15:35:29.664680004 CET49720443192.168.2.613.85.23.86
      Mar 5, 2024 15:35:29.664699078 CET49720443192.168.2.613.85.23.86
      Mar 5, 2024 15:35:29.664735079 CET49720443192.168.2.613.85.23.86
      Mar 5, 2024 15:35:29.664829969 CET4434972013.85.23.86192.168.2.6
      Mar 5, 2024 15:35:29.664875031 CET4434972013.85.23.86192.168.2.6
      Mar 5, 2024 15:35:29.664906979 CET49720443192.168.2.613.85.23.86
      Mar 5, 2024 15:35:29.664918900 CET4434972013.85.23.86192.168.2.6
      Mar 5, 2024 15:35:29.664988041 CET49720443192.168.2.613.85.23.86
      Mar 5, 2024 15:35:29.664994001 CET4434972013.85.23.86192.168.2.6
      Mar 5, 2024 15:35:29.665047884 CET4434972013.85.23.86192.168.2.6
      Mar 5, 2024 15:35:29.665105104 CET49720443192.168.2.613.85.23.86
      Mar 5, 2024 15:35:29.681715012 CET49720443192.168.2.613.85.23.86
      Mar 5, 2024 15:35:29.681730032 CET4434972013.85.23.86192.168.2.6
      Mar 5, 2024 15:35:29.681746006 CET49720443192.168.2.613.85.23.86
      Mar 5, 2024 15:35:29.681751966 CET4434972013.85.23.86192.168.2.6
      Mar 5, 2024 15:35:39.415081978 CET49722443192.168.2.6142.251.40.132
      Mar 5, 2024 15:35:39.415119886 CET44349722142.251.40.132192.168.2.6
      Mar 5, 2024 15:35:39.415184021 CET49722443192.168.2.6142.251.40.132
      Mar 5, 2024 15:35:39.415563107 CET49722443192.168.2.6142.251.40.132
      Mar 5, 2024 15:35:39.415580988 CET44349722142.251.40.132192.168.2.6
      Mar 5, 2024 15:35:39.684592009 CET44349722142.251.40.132192.168.2.6
      Mar 5, 2024 15:35:39.684853077 CET49722443192.168.2.6142.251.40.132
      Mar 5, 2024 15:35:39.684868097 CET44349722142.251.40.132192.168.2.6
      Mar 5, 2024 15:35:39.685340881 CET44349722142.251.40.132192.168.2.6
      Mar 5, 2024 15:35:39.685668945 CET49722443192.168.2.6142.251.40.132
      Mar 5, 2024 15:35:39.685749054 CET44349722142.251.40.132192.168.2.6
      Mar 5, 2024 15:35:39.735598087 CET49722443192.168.2.6142.251.40.132
      Mar 5, 2024 15:35:49.678061962 CET44349722142.251.40.132192.168.2.6
      Mar 5, 2024 15:35:49.678236008 CET44349722142.251.40.132192.168.2.6
      Mar 5, 2024 15:35:49.678289890 CET49722443192.168.2.6142.251.40.132
      Mar 5, 2024 15:35:51.679250956 CET49722443192.168.2.6142.251.40.132
      Mar 5, 2024 15:35:51.679275036 CET44349722142.251.40.132192.168.2.6
      TimestampSource PortDest PortSource IPDest IP
      Mar 5, 2024 15:34:35.409954071 CET53581611.1.1.1192.168.2.6
      Mar 5, 2024 15:34:35.415860891 CET53574721.1.1.1192.168.2.6
      Mar 5, 2024 15:34:36.049969912 CET53501081.1.1.1192.168.2.6
      Mar 5, 2024 15:34:37.460025072 CET5626253192.168.2.61.1.1.1
      Mar 5, 2024 15:34:37.460191965 CET5282053192.168.2.61.1.1.1
      Mar 5, 2024 15:34:37.548026085 CET53562621.1.1.1192.168.2.6
      Mar 5, 2024 15:34:37.548989058 CET53528201.1.1.1192.168.2.6
      Mar 5, 2024 15:34:39.373867989 CET6431453192.168.2.61.1.1.1
      Mar 5, 2024 15:34:39.374468088 CET5063553192.168.2.61.1.1.1
      Mar 5, 2024 15:34:39.461946011 CET53643141.1.1.1192.168.2.6
      Mar 5, 2024 15:34:39.462768078 CET53506351.1.1.1192.168.2.6
      Mar 5, 2024 15:34:53.136404991 CET53650001.1.1.1192.168.2.6
      Mar 5, 2024 15:35:11.856775045 CET53632511.1.1.1192.168.2.6
      Mar 5, 2024 15:35:34.480350971 CET53627471.1.1.1192.168.2.6
      Mar 5, 2024 15:35:35.055671930 CET53497661.1.1.1192.168.2.6
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Mar 5, 2024 15:34:37.460025072 CET192.168.2.61.1.1.10xdf1aStandard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
      Mar 5, 2024 15:34:37.460191965 CET192.168.2.61.1.1.10x7592Standard query (0)drive.usercontent.google.com65IN (0x0001)false
      Mar 5, 2024 15:34:39.373867989 CET192.168.2.61.1.1.10x3d7aStandard query (0)www.google.comA (IP address)IN (0x0001)false
      Mar 5, 2024 15:34:39.374468088 CET192.168.2.61.1.1.10x4b67Standard query (0)www.google.com65IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Mar 5, 2024 15:34:37.548026085 CET1.1.1.1192.168.2.60xdf1aNo error (0)drive.usercontent.google.com142.250.80.97A (IP address)IN (0x0001)false
      Mar 5, 2024 15:34:39.461946011 CET1.1.1.1192.168.2.60x3d7aNo error (0)www.google.com142.251.40.132A (IP address)IN (0x0001)false
      Mar 5, 2024 15:34:39.462768078 CET1.1.1.1192.168.2.60x4b67No error (0)www.google.com65IN (0x0001)false
      • drive.usercontent.google.com
      • fs.microsoft.com
      • slscr.update.microsoft.com
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.649705142.250.80.974436092C:\Program Files\Google\Chrome\Application\chrome.exe
      TimestampBytes transferredDirectionData
      2024-03-05 14:34:37 UTC1044OUTGET /u/0/uc?id=1TmK4HJr3uREvbbX32pEPGn4J2OXNu2OH&export=download HTTP/1.1
      Host: drive.usercontent.google.com
      Connection: keep-alive
      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
      sec-ch-ua-mobile: ?0
      sec-ch-ua-platform: "Windows"
      Upgrade-Insecure-Requests: 1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
      X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlaHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
      Sec-Fetch-Site: none
      Sec-Fetch-Mode: navigate
      Sec-Fetch-User: ?1
      Sec-Fetch-Dest: document
      Accept-Encoding: gzip, deflate, br
      Accept-Language: en-US,en;q=0.9
      Cookie: NID=511=UBeNCkZ3L8yXcx8qh4JFUXkwkNC9IrdiRdbjSTjqSiFh8WrRcbKr_rOJbgHY6TA4RT-6ps0bhemfwCPBsLMgPT7-gTcWqHvZvZbafOpkqRy0dLyYG9AjP2vbUBomarnc9pcZVlhHkUeUaWMurD0GGXyW05_B_1IyUNYEELmyqRg
      2024-03-05 14:34:37 UTC1591INHTTP/1.1 302 Found
      Content-Type: application/binary
      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
      Pragma: no-cache
      Expires: Mon, 01 Jan 1990 00:00:00 GMT
      Date: Tue, 05 Mar 2024 14:34:37 GMT
      Location: https://drive.usercontent.google.com/uc?id=1TmK4HJr3uREvbbX32pEPGn4J2OXNu2OH&export=download
      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
      Content-Security-Policy: script-src 'report-sample' 'nonce-jBINj65w1WC6XpoUpc_nzQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
      Content-Security-Policy: script-src 'unsafe-inline' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factor=*, ch-ua-platform=*, ch-ua-platform-version=*
      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factor, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
      Cross-Origin-Opener-Policy: same-origin
      Server: ESF
      Content-Length: 0
      X-XSS-Protection: 0
      X-Frame-Options: SAMEORIGIN
      X-Content-Type-Options: nosniff
      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
      Content-Security-Policy: sandbox allow-scripts
      Connection: close


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      1192.168.2.649704142.250.80.974436092C:\Program Files\Google\Chrome\Application\chrome.exe
      TimestampBytes transferredDirectionData
      2024-03-05 14:34:37 UTC1333OUTGET /uc?id=1TmK4HJr3uREvbbX32pEPGn4J2OXNu2OH&export=download HTTP/1.1
      Host: drive.usercontent.google.com
      Connection: keep-alive
      Upgrade-Insecure-Requests: 1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
      X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlaHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
      Sec-Fetch-Site: none
      Sec-Fetch-Mode: navigate
      Sec-Fetch-User: ?1
      Sec-Fetch-Dest: document
      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
      sec-ch-ua-mobile: ?0
      sec-ch-ua-full-version: "117.0.5938.134"
      sec-ch-ua-arch: "x86"
      sec-ch-ua-platform: "Windows"
      sec-ch-ua-platform-version: "10.0.0"
      sec-ch-ua-model: ""
      sec-ch-ua-bitness: "64"
      sec-ch-ua-wow64: ?0
      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
      Accept-Encoding: gzip, deflate, br
      Accept-Language: en-US,en;q=0.9
      Cookie: NID=511=UBeNCkZ3L8yXcx8qh4JFUXkwkNC9IrdiRdbjSTjqSiFh8WrRcbKr_rOJbgHY6TA4RT-6ps0bhemfwCPBsLMgPT7-gTcWqHvZvZbafOpkqRy0dLyYG9AjP2vbUBomarnc9pcZVlhHkUeUaWMurD0GGXyW05_B_1IyUNYEELmyqRg
      2024-03-05 14:34:38 UTC1601INHTTP/1.1 303 See Other
      Content-Type: application/binary
      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
      Pragma: no-cache
      Expires: Mon, 01 Jan 1990 00:00:00 GMT
      Date: Tue, 05 Mar 2024 14:34:38 GMT
      Location: https://drive.usercontent.google.com/download?id=1TmK4HJr3uREvbbX32pEPGn4J2OXNu2OH&export=download
      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factor, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
      Content-Security-Policy: script-src 'report-sample' 'nonce-3BPE5s8WzB0zM2cBxtNE6w' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
      Content-Security-Policy: script-src 'unsafe-inline' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
      Cross-Origin-Opener-Policy: same-origin
      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factor=*, ch-ua-platform=*, ch-ua-platform-version=*
      Server: ESF
      Content-Length: 0
      X-XSS-Protection: 0
      X-Frame-Options: SAMEORIGIN
      X-Content-Type-Options: nosniff
      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
      Content-Security-Policy: sandbox allow-scripts
      Connection: close


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      2192.168.2.649708142.250.80.974436092C:\Program Files\Google\Chrome\Application\chrome.exe
      TimestampBytes transferredDirectionData
      2024-03-05 14:34:38 UTC1339OUTGET /download?id=1TmK4HJr3uREvbbX32pEPGn4J2OXNu2OH&export=download HTTP/1.1
      Host: drive.usercontent.google.com
      Connection: keep-alive
      Upgrade-Insecure-Requests: 1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
      X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIlaHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
      Sec-Fetch-Site: none
      Sec-Fetch-Mode: navigate
      Sec-Fetch-User: ?1
      Sec-Fetch-Dest: document
      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
      sec-ch-ua-mobile: ?0
      sec-ch-ua-full-version: "117.0.5938.134"
      sec-ch-ua-arch: "x86"
      sec-ch-ua-platform: "Windows"
      sec-ch-ua-platform-version: "10.0.0"
      sec-ch-ua-model: ""
      sec-ch-ua-bitness: "64"
      sec-ch-ua-wow64: ?0
      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
      Accept-Encoding: gzip, deflate, br
      Accept-Language: en-US,en;q=0.9
      Cookie: NID=511=UBeNCkZ3L8yXcx8qh4JFUXkwkNC9IrdiRdbjSTjqSiFh8WrRcbKr_rOJbgHY6TA4RT-6ps0bhemfwCPBsLMgPT7-gTcWqHvZvZbafOpkqRy0dLyYG9AjP2vbUBomarnc9pcZVlhHkUeUaWMurD0GGXyW05_B_1IyUNYEELmyqRg
      2024-03-05 14:34:38 UTC4690INHTTP/1.1 200 OK
      X-GUploader-UploadID: ABPtcPo9jMQmhjjVu6xlEp8y0VIa2Xmz2SVrx2TUDeKqQe29mxZNkXXScVhlhcrv5P4gB2GldVQ
      Content-Type: application/octet-stream
      Content-Security-Policy: sandbox
      Content-Security-Policy: default-src 'none'
      Content-Security-Policy: frame-ancestors 'none'
      X-Content-Security-Policy: sandbox
      Cross-Origin-Opener-Policy: same-origin
      Cross-Origin-Embedder-Policy: require-corp
      Cross-Origin-Resource-Policy: same-site
      X-Content-Type-Options: nosniff
      Content-Disposition: attachment; filename="Summaryform_TgQFBSAqdC.zip"
      Access-Control-Allow-Origin: *
      Access-Control-Allow-Credentials: false
      Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogApps-Allowed-Domains, X-Goog-AdX-Buyer-Impersonation, X-Goog-Api-Client, X-Goog-Visibilities, X-Goog-AuthUser, X-Google-EOM, x-goog-ext-124712974-jspb, x-goog-ext-467253834-jspb, x-goog-ext-353267353-bin, x-goog-ext-353267353-jspb, x-goog-ext-251363160-jspb, x-goog-ext-259736195-jspb, x-goog-ext-477772811-jspb, x-goog-ext-359275022-bin, x-goog-ext-328800237-jspb, x-goog-ext-202735639-bin, x-goog-ext-223435598-bin, X-Goog-PageId, X-Goog-Encode-Response-If-Executable, X-Goog-Correlation-Id, X-Goog-Request-Info, X-Goog-Request-Reason, X-Goog-Request-Time, X-Goog-Experiments, x-goog-iam-authority-selector, x-goog-iam-authorization-token, X-Goog-Spatula, X-Goog-Travel-Bgr, X-Goog-Travel-Settings, X-Goog-Upload-Command, X-Goog-Upload-Content-Disposition, X-Goog-Upload-Content-Length, X-Goog-Upload-Content-Type, X-Goog-Upload-File-Name, X-Goog-Upload-Header-Content-Encoding, X-Goog-Upload-Header-Content-Length, X-Goog-Upload-Header-Content-Type, X-Goog-Upload-Header-Transfer-Encoding, X-Goog-Upload-Offset, X-Goog-Upload-Protocol, x-goog-user-project, X-Goog-Visitor-Id, X-Goog-FieldMask, X-Google-Project-Override, x-goog-maps-api-salt, x-goog-maps-api-signature, x-goog-maps-client-id, X-Goog-Api-Key, x-goog-spanner-database-role, X-HTTP-Method-Override, X-JavaScript-User-Agent, X-Pan-Versionid, X-Proxied-User-IP, X-Origin, X-Referer, X-Requested-With, X-Stadia-Client-Context, X-Upload-Content-Length, X-Upload-Content-Type, X-Use-Alt-Service, X-Use-HTTP-Status-Code-Override, X-Ios-Bundle-Identifier, X-Android-Package, X-Android-Cert, X-Ariane-Xsrf-Token, X-YouTube-Bootstrap-Logged-In, X-YouTube-VVT, X-YouTube-Page-CL, X-YouTube-Page-Timestamp, X-Compass-Routing-Destination, x-framework-xsrf-token, X-Goog-Meeting-ABR, X-Goog-Meeting-Botguardid, X-Goog-Meeting-ClientInfo, X-Goog-Meeting-ClientVersion, X-Goog-Meeting-Debugid, X-Goog-Meeting-Identifier, X-Goog-Meeting-Interop-Cohorts, X-Goog-Meeting-Interop-Type, X-Goog-Meeting-OidcIdToken, X-Goog-Meeting-RtcClient, X-Goog-Meeting-StartSource, X-Goog-Meeting-Token, X-Goog-Meeting-Viewer-Token, X-Client-Data, x-sdm-id-token, X-Sfdc-Authorization, MIME-Version, Content-Transfer-Encoding, X-Earth-user-App-ID-Token, X-Earth-user-Computation-Profile, X-Earth-user-Computation-Profiling, X-Play-Console-Experiments-Override, X-Play-Console-Session-Id, x-alkali-account-key, x-alkali-application-key, x-alkali-auth-apps-namespace, x-alkali-auth-entities-namespace, x-alkali-auth-entity, x-alkali-client-locale, EES-S7E-MODE, cast-device-capabilities, X-Server-Timeout, x-foyer-client-environment, x-goog-greenenergyuserappservice-metadata, x-goog-sherlog-context, X-Server-Token, x-rfui-request-context
      Access-Control-Allow-Methods: GET,HEAD,OPTIONS
      Accept-Ranges: bytes
      Content-Length: 612
      Last-Modified: Tue, 05 Mar 2024 03:35:30 GMT
      Date: Tue, 05 Mar 2024 14:34:38 GMT
      Expires: Tue, 05 Mar 2024 14:34:38 GMT
      Cache-Control: private, max-age=0
      X-Goog-Hash: crc32c=fj+Fvw==
      Server: UploadServer
      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
      Connection: close
      2024-03-05 14:34:38 UTC612INData Raw: 50 4b 03 04 14 00 09 00 08 00 54 9c 64 58 4e fa 27 3c 9a 01 00 00 e2 39 00 00 1a 00 00 00 53 75 6d 6d 61 72 79 66 6f 72 6d 5f 54 67 51 46 42 53 41 71 64 43 2e 77 73 66 15 fb 67 f9 0f 82 08 f7 50 b7 e6 aa 92 fe 06 e1 63 c2 70 76 fc 1a 30 61 dc 8d da 5a 35 dd 77 71 14 e1 07 6c 92 e6 b7 f6 cd 35 43 de 5d cd 78 59 ec c1 28 f7 3c 2d 93 c7 cd c6 22 b0 86 17 3e 94 13 b4 36 8f d5 2a 75 ba ea f0 e4 71 b5 85 dc 5c 21 d1 63 8f 72 32 f6 ec 78 eb 3d f7 69 74 65 21 52 fc 85 ee 1c 4c 55 da b9 e6 a8 9a d2 39 94 41 eb 41 3d 54 16 7b 22 16 20 71 35 59 e7 31 6c 80 d0 4c 24 a4 da d3 02 e5 f5 f1 1c 01 a0 cb 5d 66 6e 07 3d 82 bb ad 21 1f 36 e7 f0 26 e3 b5 b2 bd da 41 f1 96 52 b2 13 df e4 22 35 d1 ad b4 6f 9d 63 98 17 ac fa 90 a5 19 c9 85 b6 be 4c ae fa 75 fa 63 96 ec 10 1b 3a
      Data Ascii: PKTdXN'<9Summaryform_TgQFBSAqdC.wsfgPcpv0aZ5wql5C]xY(<-">6*uq\!cr2x=ite!RLU9AA=T{" q5Y1lL$]fn=!6&AR"5ocLuc:


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      3192.168.2.64971023.51.58.94443
      TimestampBytes transferredDirectionData
      2024-03-05 14:34:40 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
      Connection: Keep-Alive
      Accept: */*
      Accept-Encoding: identity
      User-Agent: Microsoft BITS/7.8
      Host: fs.microsoft.com
      2024-03-05 14:34:40 UTC466INHTTP/1.1 200 OK
      Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
      Content-Type: application/octet-stream
      ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
      Last-Modified: Tue, 16 May 2017 22:58:00 GMT
      Server: ECAcc (chd/07A7)
      X-CID: 11
      X-Ms-ApiVersion: Distribute 1.2
      X-Ms-Region: prod-eus-z1
      Cache-Control: public, max-age=17416
      Date: Tue, 05 Mar 2024 14:34:40 GMT
      Connection: close
      X-CID: 2


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      4192.168.2.64971123.51.58.94443
      TimestampBytes transferredDirectionData
      2024-03-05 14:34:40 UTC239OUTGET /fs/windows/config.json HTTP/1.1
      Connection: Keep-Alive
      Accept: */*
      Accept-Encoding: identity
      If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
      Range: bytes=0-2147483646
      User-Agent: Microsoft BITS/7.8
      Host: fs.microsoft.com
      2024-03-05 14:34:41 UTC455INHTTP/1.1 200 OK
      ApiVersion: Distribute 1.1
      Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
      Content-Type: application/octet-stream
      ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
      Last-Modified: Tue, 16 May 2017 22:58:00 GMT
      Server: ECAcc (chd/0778)
      X-CID: 11
      Cache-Control: public, max-age=17461
      Date: Tue, 05 Mar 2024 14:34:41 GMT
      Content-Length: 55
      Connection: close
      X-CID: 2
      2024-03-05 14:34:41 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
      Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      5192.168.2.64971213.85.23.86443
      TimestampBytes transferredDirectionData
      2024-03-05 14:34:51 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=Y3c9VdhC9udV3oy&MD=9gpeVbRK HTTP/1.1
      Connection: Keep-Alive
      Accept: */*
      User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
      Host: slscr.update.microsoft.com
      2024-03-05 14:34:52 UTC560INHTTP/1.1 200 OK
      Cache-Control: no-cache
      Pragma: no-cache
      Content-Type: application/octet-stream
      Expires: -1
      Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
      ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
      MS-CorrelationId: 612b6c63-5875-46ec-a117-64b5a21a70ce
      MS-RequestId: b69c3c0a-0405-497d-8db6-d2ccf8ab953a
      MS-CV: 3AYaXeS180+eiGPo.0
      X-Microsoft-SLSClientCache: 2880
      Content-Disposition: attachment; filename=environment.cab
      X-Content-Type-Options: nosniff
      Date: Tue, 05 Mar 2024 14:34:51 GMT
      Connection: close
      Content-Length: 24490
      2024-03-05 14:34:52 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
      Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
      2024-03-05 14:34:52 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
      Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      6192.168.2.64972013.85.23.86443
      TimestampBytes transferredDirectionData
      2024-03-05 14:35:29 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=Y3c9VdhC9udV3oy&MD=9gpeVbRK HTTP/1.1
      Connection: Keep-Alive
      Accept: */*
      User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
      Host: slscr.update.microsoft.com
      2024-03-05 14:35:29 UTC560INHTTP/1.1 200 OK
      Cache-Control: no-cache
      Pragma: no-cache
      Content-Type: application/octet-stream
      Expires: -1
      Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
      ETag: "Mx1RoJH/qEwpWfKllx7sbsl28AuERz5IYdcsvtTJcgM=_2160"
      MS-CorrelationId: 962a6f5b-30fe-4490-bda3-e5dc03ab8263
      MS-RequestId: 1d322720-8849-4153-9663-0743a411b71a
      MS-CV: mrKralyu3kuqtAz/.0
      X-Microsoft-SLSClientCache: 2160
      Content-Disposition: attachment; filename=environment.cab
      X-Content-Type-Options: nosniff
      Date: Tue, 05 Mar 2024 14:35:28 GMT
      Connection: close
      Content-Length: 25457
      2024-03-05 14:35:29 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 51 22 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 db 8e 00 00 14 00 00 00 00 00 10 00 51 22 00 00 20 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 f3 43 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 0d 92 6f db e5 21 f3 43 43 4b ed 5a 09 38 55 5b df 3f 93 99 90 29 99 e7 29 ec 73 cc 4a 66 32 cf 84 32 64 c8 31 c7 11 52 38 87 90 42 66 09 99 87 32 0f 19 0a 09 51 a6 a8 08 29 53 86 4a 52 84 50 df 46 83 ba dd 7b df fb 7e ef 7d ee 7d bf ef 9e e7 d9 67 ef 35 ee b5 fe eb 3f ff b6 96 81 a2 0a 04 fc 31 40 21 5b 3f a5 ed 1b 04 0e 85 42 a0 10 04 64 12 6c a5 de aa a1 d8 ea f3 58 01 f2 f5 67 0b 5e 9b bd e8 a0 90 1d bf 40 88 9d eb 49 b4 87 9b ab 8b 9d 2b 46 c8 c7 c5 19 92
      Data Ascii: MSCFQ"DQ" AdCenvironment.cabo!CCKZ8U[?))sJf22d1R8Bf2Q)SJRPF{~}}g5?1@![?BdlXg^@I+F
      2024-03-05 14:35:29 UTC9633INData Raw: 21 6f b3 eb a6 cc f5 31 be cf 05 e2 a9 fe fa 57 6d 19 30 b3 c2 c5 66 c9 6a df f5 e7 f0 78 bd c7 a8 9e 25 e3 f9 bc ed 6b 54 57 08 2b 51 82 44 12 fb b9 53 8c cc f4 60 12 8a 76 cc 40 40 41 9b dc 5c 17 ff 5c f9 5e 17 35 98 24 56 4b 74 ef 42 10 c8 af bf 7f c6 7f f2 37 7d 5a 3f 1c f2 99 79 4a 91 52 00 af 38 0f 17 f5 2f 79 81 65 d9 a9 b5 6b e4 c7 ce f6 ca 7a 00 6f 4b 30 44 24 22 3c cf ed 03 a5 96 8f 59 29 bc b6 fd 04 e1 70 9f 32 4a 27 fd 55 af 2f fe b6 e5 8e 33 bb 62 5f 9a db 57 40 e9 f1 ce 99 66 90 8c ff 6a 62 7f dd c5 4a 0b 91 26 e2 39 ec 19 4a 71 63 9d 7b 21 6d c3 9c a3 a2 3c fa 7f 7d 96 6a 90 78 a6 6d d2 e1 9c f9 1d fc 38 d8 94 f4 c6 a5 0a 96 86 a4 bd 9e 1a ae 04 42 83 b8 b5 80 9b 22 38 20 b5 25 e5 64 ec f7 f4 bf 7e 63 59 25 0f 7a 2e 39 57 76 a2 71 aa 06 8a
      Data Ascii: !o1Wm0fjx%kTW+QDS`v@@A\\^5$VKtB7}Z?yJR8/yekzoK0D$"<Y)p2J'U/3b_W@fjbJ&9Jqc{!m<}jxm8B"8 %d~cY%z.9Wvq


      Click to jump to process

      Click to jump to process

      • File
      • Registry

      Click to dive into process behavior distribution

      Target ID:0
      Start time:15:34:30
      Start date:05/03/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
      Imagebase:0x7ff684c40000
      File size:3'242'272 bytes
      MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:2
      Start time:15:34:33
      Start date:05/03/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 --field-trial-handle=2356,i,9309288945864814519,1849516547289388514,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Imagebase:0x7ff684c40000
      File size:3'242'272 bytes
      MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:3
      Start time:15:34:36
      Start date:05/03/2024
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:C:\Program Files\Google\Chrome\Application\chrome.exe" "https://drive.usercontent.google.com/u/0/uc?id=1TmK4HJr3uREvbbX32pEPGn4J2OXNu2OH&export=download
      Imagebase:0x7ff684c40000
      File size:3'242'272 bytes
      MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:5
      Start time:15:34:40
      Start date:05/03/2024
      Path:C:\Windows\SysWOW64\unarchiver.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\Summaryform_TgQFBSAqdC.zip
      Imagebase:0x420000
      File size:12'800 bytes
      MD5 hash:16FF3CC6CC330A08EED70CBC1D35F5D2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:6
      Start time:15:34:40
      Start date:05/03/2024
      Path:C:\Windows\SysWOW64\7za.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\wfyl0eyp.svy" "C:\Users\user\Downloads\Summaryform_TgQFBSAqdC.zip
      Imagebase:0xca0000
      File size:289'792 bytes
      MD5 hash:77E556CDFDC5C592F5C46DB4127C6F4C
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:7
      Start time:15:34:40
      Start date:05/03/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff66e660000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Execution Graph

      Execution Coverage

      Dynamic/Packed Code Coverage

      Signature Coverage

      Execution Coverage:19.8%
      Dynamic/Decrypted Code Coverage:100%
      Signature Coverage:5.5%
      Total number of Nodes:73
      Total number of Limit Nodes:4
      Show Legend
      Hide Nodes/Edges
      execution_graph 1163 d3a850 1164 d3a882 SetFilePointer 1163->1164 1166 d3a8e6 1164->1166 1120 d3b1d6 1121 d3b202 GetSystemInfo 1120->1121 1122 d3b238 1120->1122 1123 d3b210 1121->1123 1122->1121 1128 d3a716 1129 d3a742 FindCloseChangeNotification 1128->1129 1130 d3a781 1128->1130 1131 d3a750 1129->1131 1130->1129 1167 d3a6d4 1168 d3a716 FindCloseChangeNotification 1167->1168 1170 d3a750 1168->1170 1132 d3a2da 1133 d3a306 SetErrorMode 1132->1133 1134 d3a32f 1132->1134 1135 d3a31b 1133->1135 1134->1133 1171 d3a5dc 1174 d3a5fe CreateFileW 1171->1174 1173 d3a685 1174->1173 1144 d3a882 1146 d3a8b7 SetFilePointer 1144->1146 1147 d3a8e6 1146->1147 1155 d3aa46 1156 d3aa6c CreateDirectoryW 1155->1156 1158 d3aa93 1156->1158 1187 d3ad04 1188 d3ad2a DuplicateHandle 1187->1188 1190 d3adaf 1188->1190 1191 d3af8b 1192 d3afb2 FindClose 1191->1192 1194 d3aff3 1192->1194 1195 d3aa0b 1197 d3aa46 CreateDirectoryW 1195->1197 1198 d3aa93 1197->1198 1199 d3a78f 1200 d3a7c2 GetFileType 1199->1200 1202 d3a824 1200->1202 1203 d3a933 1205 d3a962 WriteFile 1203->1205 1206 d3a9c9 1205->1206 1113 d3afb2 1114 d3b010 1113->1114 1115 d3afde FindClose 1113->1115 1114->1115 1116 d3aff3 1115->1116 1117 d3a172 1118 d3a1c2 FindNextFileW 1117->1118 1119 d3a1ca 1118->1119 1179 d3a370 1181 d3a392 RegQueryValueExW 1179->1181 1182 d3a41b 1181->1182 1183 d3ab76 1184 d3abe6 CreatePipe 1183->1184 1186 d3ac3e 1184->1186 1207 d3b1b4 1208 d3b1d6 GetSystemInfo 1207->1208 1210 d3b210 1208->1210 1136 d3a5fe 1139 d3a636 CreateFileW 1136->1139 1138 d3a685 1139->1138 1148 d3a962 1149 d3a997 WriteFile 1148->1149 1151 d3a9c9 1149->1151 1211 d3a120 1212 d3a172 FindNextFileW 1211->1212 1214 d3a1ca 1212->1214 1152 d3abe6 1153 d3ac36 CreatePipe 1152->1153 1154 d3ac3e 1153->1154 1215 d3a2ae 1216 d3a2b2 SetErrorMode 1215->1216 1218 d3a31b 1216->1218

      Callgraph

      Hide Legend
      • Executed
      • Not Executed
      • Opacity -> Relevance
      • Disassembly available
      callgraph 0 Function_00D320D0 1 Function_00D3B1D6 2 Function_00D3A6D4 3 Function_00D3AADA 4 Function_00D3A2DA 5 Function_00C105CF 6 Function_00D3A5DC 7 Function_00D3A7C2 8 Function_00F60DE0 31 Function_00F60BA0 8->31 9 Function_00C105DF 10 Function_00D325F3 11 Function_00D321F0 12 Function_00F60DD1 12->31 13 Function_00D323F4 14 Function_00D3A1F4 15 Function_00D3A5FE 16 Function_00D3AAE0 17 Function_00D3ABE6 18 Function_00F602C0 18->9 18->31 40 Function_00F60798 18->40 84 Function_00C10606 18->84 19 Function_00D3A392 20 Function_00C10784 21 Function_00F602B0 21->9 21->31 21->40 21->84 22 Function_00F605B1 23 Function_00D32194 24 Function_00D3A09A 25 Function_00D32098 26 Function_00D3B49E 27 Function_00D3B39E 28 Function_00D3A882 29 Function_00F60DA2 29->31 30 Function_00D3A486 32 Function_00D3AF8B 33 Function_00D3A78F 34 Function_00D3AC8E 35 Function_00F60CA8 36 Function_00D3AFB2 37 Function_00D3AEB2 38 Function_00D322B4 39 Function_00D3B1B4 40->9 40->31 40->35 41 Function_00F60C99 40->41 59 Function_00F60C60 40->59 67 Function_00F60C50 40->67 40->84 42 Function_00D323BC 43 Function_00C107B2 44 Function_00C107B6 45 Function_00F60B8F 46 Function_00D326AE 47 Function_00D3A2AE 48 Function_00C105BF 49 Function_00D32B53 50 Function_00D3B052 51 Function_00D3B351 52 Function_00D3A850 53 Function_00C10648 68 Function_00C1066A 53->68 54 Function_00D32458 55 Function_00D3B15D 56 Function_00D3A45C 57 Function_00D3B246 58 Function_00D3AA46 60 Function_00D32B44 61 Function_00D32044 62 Function_00D3A172 63 Function_00D3A370 64 Function_00D3B470 65 Function_00D3B276 66 Function_00D3AB76 69 Function_00D3A078 70 Function_00C1026D 71 Function_00D3267C 72 Function_00D3A962 73 Function_00D3A462 74 Function_00D3A566 75 Function_00D32264 76 Function_00D32364 77 Function_00C1067F 78 Function_00F60748 79 Function_00D3AC6C 80 Function_00C10000 81 Function_00D32310 82 Function_00D3A716 83 Function_00C10807 85 Function_00F60C3D 86 Function_00C1000C 87 Function_00D3B01E 88 Function_00F60739 89 Function_00D3AF00 90 Function_00D3AB06 91 Function_00D32005 92 Function_00D3A005 93 Function_00D3AE05 94 Function_00D3AD04 95 Function_00D3AA0B 96 Function_00C10718 97 Function_00D3A50F 98 Function_00D3A933 99 Function_00D32531 100 Function_00F60015 101 Function_00D32430 102 Function_00D3A23A 103 Function_00F60E18 103->31 104 Function_00D3253D 105 Function_00D3A33D 106 Function_00C1082E 107 Function_00D3213C 108 Function_00D3AF22 109 Function_00D3B121 110 Function_00D3A120 111 Function_00D3AD2A 112 Function_00D3A02E 113 Function_00F60E08 113->31

      Executed Functions

      APIs
      • GetSystemInfo.KERNELBASE(?), ref: 00D3B208
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: InfoSystem
      • String ID:
      • API String ID: 31276548-0
      • Opcode ID: 034d02f4a26d15e15c91d0754fbfbea385fd2b70b584adc69aeb8723905a249b
      • Instruction ID: 0f258447cbdfecd2353f118626ff8008ae4ef65d84f2dc002dd9d5ab1a274f6f
      • Opcode Fuzzy Hash: 034d02f4a26d15e15c91d0754fbfbea385fd2b70b584adc69aeb8723905a249b
      • Instruction Fuzzy Hash: FC018F749002409FDB10CF15E88576AFBE4EF44320F08C5ABDE889F252E379AA08CB61
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 d3b246-d3b2eb 5 d3b343-d3b348 0->5 6 d3b2ed-d3b2f5 DuplicateHandle 0->6 5->6 8 d3b2fb-d3b30d 6->8 9 d3b34a-d3b34f 8->9 10 d3b30f-d3b340 8->10 9->10
      APIs
      • DuplicateHandle.KERNELBASE(?,00000E24), ref: 00D3B2F3
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: DuplicateHandle
      • String ID:
      • API String ID: 3793708945-0
      • Opcode ID: f4a46fc0e7acfe2f1d48c45c0ed22cd859710acc0af098c1f37d39e5823bcbe3
      • Instruction ID: 0a7de399987f7bbebb36dc40e130e6748e01572eae12f684c7bc888be64748f3
      • Opcode Fuzzy Hash: f4a46fc0e7acfe2f1d48c45c0ed22cd859710acc0af098c1f37d39e5823bcbe3
      • Instruction Fuzzy Hash: 46319471504344AFE7228B61DC45FAABFBCEF45324F0484AAEA85DB162D374A909CB71
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 14 d3ad04-d3ad9f 19 d3ada1-d3ada9 DuplicateHandle 14->19 20 d3adf7-d3adfc 14->20 21 d3adaf-d3adc1 19->21 20->19 23 d3adc3-d3adf4 21->23 24 d3adfe-d3ae03 21->24 24->23
      APIs
      • DuplicateHandle.KERNELBASE(?,00000E24), ref: 00D3ADA7
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: DuplicateHandle
      • String ID:
      • API String ID: 3793708945-0
      • Opcode ID: 1c89443ef0ba1e04fb75ba0bddba41faab9f03511f0bc08d482363c7fe7c6ee4
      • Instruction ID: b5e4e4a8f40ac3875818a3ce21536b78c5782cb72444feeed94c4f64d006ee9c
      • Opcode Fuzzy Hash: 1c89443ef0ba1e04fb75ba0bddba41faab9f03511f0bc08d482363c7fe7c6ee4
      • Instruction Fuzzy Hash: A131C7715043846FE7228B65DC45F67BFACEF05224F04449EF985DB552D334A909CB71
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 28 d3ab76-d3ac67 CreatePipe
      APIs
      • CreatePipe.KERNELBASE(?,00000E24,?,?), ref: 00D3AC36
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: CreatePipe
      • String ID:
      • API String ID: 2719314638-0
      • Opcode ID: 8e51690b3451e64a469c4ce65504db4e23eea4dc02d836953eea768aa2843228
      • Instruction ID: a2685500335777ca5edd0d39d7961eee94b998e57f98ac844d507c6ba4d0fa73
      • Opcode Fuzzy Hash: 8e51690b3451e64a469c4ce65504db4e23eea4dc02d836953eea768aa2843228
      • Instruction Fuzzy Hash: 1A316D7250E3C06FD3038B718C65A56BFB4AF47610F1A85DBD8C8DF1A3D2296919C762
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 33 d3a5dc-d3a656 37 d3a65b-d3a667 33->37 38 d3a658 33->38 39 d3a669 37->39 40 d3a66c-d3a675 37->40 38->37 39->40 41 d3a677-d3a69b CreateFileW 40->41 42 d3a6c6-d3a6cb 40->42 45 d3a6cd-d3a6d2 41->45 46 d3a69d-d3a6c3 41->46 42->41 45->46
      APIs
      • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00D3A67D
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: CreateFile
      • String ID:
      • API String ID: 823142352-0
      • Opcode ID: bd685d7b28cb964cd2c814b07a975994cfe81355200e85886ae1bfc67e19f7d5
      • Instruction ID: 4bf5bf35e5e3352a1b5f2a55078cb799eefcf7b17b9a155c74d193f523570605
      • Opcode Fuzzy Hash: bd685d7b28cb964cd2c814b07a975994cfe81355200e85886ae1bfc67e19f7d5
      • Instruction Fuzzy Hash: AD319F71604740AFE721CF25DC45F66BBE8EF05220F0884AEE9858B252D375E909CB71
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 49 d3a120-d3a1f3 FindNextFileW
      APIs
      • FindNextFileW.KERNELBASE(?,00000E24,?,?), ref: 00D3A1C2
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: FileFindNext
      • String ID:
      • API String ID: 2029273394-0
      • Opcode ID: ecf56d151e291a8358c4193b7950d0a6ba0cb27da90118a10783a9a28a0d6c20
      • Instruction ID: 3242c2c94344eddf191a01874c7aeacf4a24f6b0a1dc397e671c60d1de1bb1bf
      • Opcode Fuzzy Hash: ecf56d151e291a8358c4193b7950d0a6ba0cb27da90118a10783a9a28a0d6c20
      • Instruction Fuzzy Hash: BA21D17140D3C06FD3128B258C51BA6BFB4EF47610F0981DBDC849F593D239AA1ACBA2
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 54 d3a370-d3a3cf 57 d3a3d1 54->57 58 d3a3d4-d3a3dd 54->58 57->58 59 d3a3e2-d3a3e8 58->59 60 d3a3df 58->60 61 d3a3ea 59->61 62 d3a3ed-d3a404 59->62 60->59 61->62 64 d3a406-d3a419 RegQueryValueExW 62->64 65 d3a43b-d3a440 62->65 66 d3a442-d3a447 64->66 67 d3a41b-d3a438 64->67 65->64 66->67
      APIs
      • RegQueryValueExW.KERNELBASE(?,00000E24,70757E43,00000000,00000000,00000000,00000000), ref: 00D3A40C
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: QueryValue
      • String ID:
      • API String ID: 3660427363-0
      • Opcode ID: 06d062f63cd0da38f3f197e63f7abe0d21bb0cb52eb4691c376e67469e6128d0
      • Instruction ID: eeac8d3403f2e0e248d7d5fb0c4a5ca04e7b3c9908156740217470d67dca8734
      • Opcode Fuzzy Hash: 06d062f63cd0da38f3f197e63f7abe0d21bb0cb52eb4691c376e67469e6128d0
      • Instruction Fuzzy Hash: CA217C72604744AFD721CB15DC85FA6BBF8AF45710F08849AE9858B292D364E908CB72
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 84 d3b276-d3b2eb 88 d3b343-d3b348 84->88 89 d3b2ed-d3b2f5 DuplicateHandle 84->89 88->89 91 d3b2fb-d3b30d 89->91 92 d3b34a-d3b34f 91->92 93 d3b30f-d3b340 91->93 92->93
      APIs
      • DuplicateHandle.KERNELBASE(?,00000E24), ref: 00D3B2F3
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: DuplicateHandle
      • String ID:
      • API String ID: 3793708945-0
      • Opcode ID: e75583cd2977ecbd9d9d1460e3d02dcffc178a66bfb96ebc12cd0fd918fa7362
      • Instruction ID: 6af56dcf89f51feb1f21cd76a8b5bb22ebcef526e81ba520d521cd02b7078d56
      • Opcode Fuzzy Hash: e75583cd2977ecbd9d9d1460e3d02dcffc178a66bfb96ebc12cd0fd918fa7362
      • Instruction Fuzzy Hash: F6219271500304AFEB21DF65DC45F6BBBECEF04324F04856AEA859B151E774A6088B71
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 71 d3ad2a-d3ad9f 75 d3ada1-d3ada9 DuplicateHandle 71->75 76 d3adf7-d3adfc 71->76 77 d3adaf-d3adc1 75->77 76->75 79 d3adc3-d3adf4 77->79 80 d3adfe-d3ae03 77->80 80->79
      APIs
      • DuplicateHandle.KERNELBASE(?,00000E24), ref: 00D3ADA7
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: DuplicateHandle
      • String ID:
      • API String ID: 3793708945-0
      • Opcode ID: d9294b7cd9c54b6162d79cab77f795ac4a64cd104d54f8fec57ce6d7bbc33292
      • Instruction ID: a7726278210f83b7e6ab8a25eec9ad291aab0cf7d1d9d5910dad81731d45bdf0
      • Opcode Fuzzy Hash: d9294b7cd9c54b6162d79cab77f795ac4a64cd104d54f8fec57ce6d7bbc33292
      • Instruction Fuzzy Hash: F7219272600304AFEB21CF65DC45F6BBBECEF04324F04846AEA859B551E774A6488B71
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 97 d3a850-d3a8d6 101 d3a91a-d3a91f 97->101 102 d3a8d8-d3a8f8 SetFilePointer 97->102 101->102 105 d3a921-d3a926 102->105 106 d3a8fa-d3a917 102->106 105->106
      APIs
      • SetFilePointer.KERNELBASE(?,00000E24,70757E43,00000000,00000000,00000000,00000000), ref: 00D3A8DE
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: FilePointer
      • String ID:
      • API String ID: 973152223-0
      • Opcode ID: 94caacffd0c2260807e29aa45a1d3f4afa47c45f4d6949ee7269dd3a10d1fed5
      • Instruction ID: 2456ecf2483d541c5d665c37d03055072a44cf0fb414888bfd0108e28205042c
      • Opcode Fuzzy Hash: 94caacffd0c2260807e29aa45a1d3f4afa47c45f4d6949ee7269dd3a10d1fed5
      • Instruction Fuzzy Hash: 8A21A1715083806FE7228B24DC45F66BFB8EF46724F0984DAE9849F152D274AA09CB72
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 109 d3a933-d3a9b9 113 d3a9bb-d3a9db WriteFile 109->113 114 d3a9fd-d3aa02 109->114 117 d3aa04-d3aa09 113->117 118 d3a9dd-d3a9fa 113->118 114->113 117->118
      APIs
      • WriteFile.KERNELBASE(?,00000E24,70757E43,00000000,00000000,00000000,00000000), ref: 00D3A9C1
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: FileWrite
      • String ID:
      • API String ID: 3934441357-0
      • Opcode ID: 1b907ceba5b4fb7d5f30595ddcf61004064786075fc874015e53f32f24018842
      • Instruction ID: 11edb819901e6d4194da8f9013567f0ffd7678ec4d7f92965e0b0d2e6e00bf93
      • Opcode Fuzzy Hash: 1b907ceba5b4fb7d5f30595ddcf61004064786075fc874015e53f32f24018842
      • Instruction Fuzzy Hash: C2219F71509380AFDB22CF25DC45F96BFB8EF46214F08849AE9849F152D275A509CB72
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 121 d3a5fe-d3a656 124 d3a65b-d3a667 121->124 125 d3a658 121->125 126 d3a669 124->126 127 d3a66c-d3a675 124->127 125->124 126->127 128 d3a677-d3a67f CreateFileW 127->128 129 d3a6c6-d3a6cb 127->129 130 d3a685-d3a69b 128->130 129->128 132 d3a6cd-d3a6d2 130->132 133 d3a69d-d3a6c3 130->133 132->133
      APIs
      • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00D3A67D
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: CreateFile
      • String ID:
      • API String ID: 823142352-0
      • Opcode ID: 0e58183625a43c93005b34a4c18c6cfedabd42f5cef6fb8f4751ba51d56af974
      • Instruction ID: fdc290fea030e594e8d4851f160d8f387f9c4a71f1e4e2062b33fdc9ddeb8b25
      • Opcode Fuzzy Hash: 0e58183625a43c93005b34a4c18c6cfedabd42f5cef6fb8f4751ba51d56af974
      • Instruction Fuzzy Hash: CC218171600600AFE721DF29DD46F66FBE8EF04310F08856DE9858B251E375E908CB72
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 136 d3a78f-d3a80d 140 d3a842-d3a847 136->140 141 d3a80f-d3a822 GetFileType 136->141 140->141 142 d3a824-d3a841 141->142 143 d3a849-d3a84e 141->143 143->142
      APIs
      • GetFileType.KERNELBASE(?,00000E24,70757E43,00000000,00000000,00000000,00000000), ref: 00D3A815
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: FileType
      • String ID:
      • API String ID: 3081899298-0
      • Opcode ID: afb7eaeada0c74028db23e4cff43f09e79685fcdd5ad28dda9ad280f4e8dead3
      • Instruction ID: ed14d5c598372dea46005b67cd60ba53363dd682dc4531f26afc929f8fff8921
      • Opcode Fuzzy Hash: afb7eaeada0c74028db23e4cff43f09e79685fcdd5ad28dda9ad280f4e8dead3
      • Instruction Fuzzy Hash: 4621D8B55083806FE7128B21DC45BA6BFB8DF46314F0880DBE9848F193D268AA09C775
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 147 d3a6d4-d3a740 149 d3a742-d3a74a FindCloseChangeNotification 147->149 150 d3a781-d3a786 147->150 152 d3a750-d3a762 149->152 150->149 153 d3a764-d3a780 152->153 154 d3a788-d3a78d 152->154 154->153
      APIs
      • FindCloseChangeNotification.KERNELBASE(?), ref: 00D3A748
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: ChangeCloseFindNotification
      • String ID:
      • API String ID: 2591292051-0
      • Opcode ID: 261c9e13d0cdffd45a0510900864c88207fc96998bf6a87721a8513d7643c585
      • Instruction ID: cf27b44984498f1530463208368eeaac22457ec78762ac65ec22d0d7b3506cb9
      • Opcode Fuzzy Hash: 261c9e13d0cdffd45a0510900864c88207fc96998bf6a87721a8513d7643c585
      • Instruction Fuzzy Hash: 3A2192B59093C05FDB128B25DC95752BFB8EF07320F0984DADD858F2A3D2649909CB72
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 156 d3aa0b-d3aa6a 158 d3aa6f-d3aa75 156->158 159 d3aa6c 156->159 160 d3aa77 158->160 161 d3aa7a-d3aa83 158->161 159->158 160->161 162 d3aa85-d3aaa5 CreateDirectoryW 161->162 163 d3aac4-d3aac9 161->163 166 d3aaa7-d3aac3 162->166 167 d3aacb-d3aad0 162->167 163->162 167->166
      APIs
      • CreateDirectoryW.KERNELBASE(?,?), ref: 00D3AA8B
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: CreateDirectory
      • String ID:
      • API String ID: 4241100979-0
      • Opcode ID: b05ff82ef432ef5147e7f0bdd5577ee23f4f6ec365ebd1b430897b3a378f310c
      • Instruction ID: b4de3a3c3d2249129a8cbb0bd974081fbb852c339a02614dcb19e11250d77b45
      • Opcode Fuzzy Hash: b05ff82ef432ef5147e7f0bdd5577ee23f4f6ec365ebd1b430897b3a378f310c
      • Instruction Fuzzy Hash: 64217F726083C05FDB12CB29DC55B92BFE8AF06324F0D84EAE984CF153D2659909CB71
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 169 d3a392-d3a3cf 171 d3a3d1 169->171 172 d3a3d4-d3a3dd 169->172 171->172 173 d3a3e2-d3a3e8 172->173 174 d3a3df 172->174 175 d3a3ea 173->175 176 d3a3ed-d3a404 173->176 174->173 175->176 178 d3a406-d3a419 RegQueryValueExW 176->178 179 d3a43b-d3a440 176->179 180 d3a442-d3a447 178->180 181 d3a41b-d3a438 178->181 179->178 180->181
      APIs
      • RegQueryValueExW.KERNELBASE(?,00000E24,70757E43,00000000,00000000,00000000,00000000), ref: 00D3A40C
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: QueryValue
      • String ID:
      • API String ID: 3660427363-0
      • Opcode ID: 75e083d5cacb2ed3dfb7dce49e726e025a088a30b9bec2fb74e945943bb5fd13
      • Instruction ID: 05afd247cf7d5d57a0dcd89c68a2668466fbd4752084ef66da46975381161c40
      • Opcode Fuzzy Hash: 75e083d5cacb2ed3dfb7dce49e726e025a088a30b9bec2fb74e945943bb5fd13
      • Instruction Fuzzy Hash: D8215E756006049FE721CF69DC85F66F7ECEF04710F08855AE9858B291E774EA09CA72
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • WriteFile.KERNELBASE(?,00000E24,70757E43,00000000,00000000,00000000,00000000), ref: 00D3A9C1
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: FileWrite
      • String ID:
      • API String ID: 3934441357-0
      • Opcode ID: 66ec0987ca744cf0deef90749e8c0b4a556be384c5bc6dfd9d6d08acba5a6d2b
      • Instruction ID: 116a5fc89d3a95271027d048b8bd0df859303986722838ebe5927ce09ae9410d
      • Opcode Fuzzy Hash: 66ec0987ca744cf0deef90749e8c0b4a556be384c5bc6dfd9d6d08acba5a6d2b
      • Instruction Fuzzy Hash: C111C471600200AFEB21CF65DC45F6AFBE8EF04724F04855AEE859B251D374A648CBB2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • SetFilePointer.KERNELBASE(?,00000E24,70757E43,00000000,00000000,00000000,00000000), ref: 00D3A8DE
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: FilePointer
      • String ID:
      • API String ID: 973152223-0
      • Opcode ID: 19403203e3e5651d13b901e3176b0067058d73d7a8160d653d3e04ed4f60e047
      • Instruction ID: 79b6d8901306800b00a931e2f8b03f8d816ad858fc1d9b95511a0e01f964de5d
      • Opcode Fuzzy Hash: 19403203e3e5651d13b901e3176b0067058d73d7a8160d653d3e04ed4f60e047
      • Instruction Fuzzy Hash: FF119471600204AFEB21CF65DC45F6AFBE8EF44724F14845AED859B251D374AA09CBB2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • SetErrorMode.KERNELBASE(?), ref: 00D3A30C
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: ErrorMode
      • String ID:
      • API String ID: 2340568224-0
      • Opcode ID: d79655ca4fc0921fe5490825efd28ed4d28402a46effe5f3b7f3f35f55bc179e
      • Instruction ID: 5ecb2dd218f5e80f4213385e7b434950fafa643f519ad03dbbe6a829dc1659ab
      • Opcode Fuzzy Hash: d79655ca4fc0921fe5490825efd28ed4d28402a46effe5f3b7f3f35f55bc179e
      • Instruction Fuzzy Hash: EE1191755093C09FD7228B25DC55A52BFB4DF47320F0980DBDD848F163D265A908CB72
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetFileType.KERNELBASE(?,00000E24,70757E43,00000000,00000000,00000000,00000000), ref: 00D3A815
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: FileType
      • String ID:
      • API String ID: 3081899298-0
      • Opcode ID: afcb8edf4589f66afc865bd1c7da7adcb6847363642af63a44e9f08d8bb74d29
      • Instruction ID: a6c4981a49f10691f1761e48a513795751d1c25288c924dab0862b60a97e4e45
      • Opcode Fuzzy Hash: afcb8edf4589f66afc865bd1c7da7adcb6847363642af63a44e9f08d8bb74d29
      • Instruction Fuzzy Hash: 0C01FE71614300AEE710CB15DC45F6AFBD8DF44724F14C09AED854F241E378EA09CAB6
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CreateDirectoryW.KERNELBASE(?,?), ref: 00D3AA8B
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: CreateDirectory
      • String ID:
      • API String ID: 4241100979-0
      • Opcode ID: 810b12b1747de8e2b29fdd17944afc45bd28cb4ff4ffec741de1116d7be0cbaa
      • Instruction ID: 8f589ff027938117afab5143d9e8a25a258c14cedc5809124090a9c542c928c9
      • Opcode Fuzzy Hash: 810b12b1747de8e2b29fdd17944afc45bd28cb4ff4ffec741de1116d7be0cbaa
      • Instruction Fuzzy Hash: B7113C727042409FEB50CF29D985B56BBD8AF04720F0884AADD89CB251E675E908CA62
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: CloseFind
      • String ID:
      • API String ID: 1863332320-0
      • Opcode ID: f07553de2105129ba1254f6fc93a185f7930ead1fc00bf489034301dcf12d876
      • Instruction ID: 0ebbe91aae81ab06fd6f3ff1ce33349116c3aa139696966405737f63340b87a1
      • Opcode Fuzzy Hash: f07553de2105129ba1254f6fc93a185f7930ead1fc00bf489034301dcf12d876
      • Instruction Fuzzy Hash: 39119E755093C09FD7128B25DC45A52BFF4EF46220F0984DBED858B262D364A908CB61
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetSystemInfo.KERNELBASE(?), ref: 00D3B208
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: InfoSystem
      • String ID:
      • API String ID: 31276548-0
      • Opcode ID: aea3b6f85b11670c80eea590e7e3f1edfe6aa3e1e4bfb6d03617bd48bad2dd4f
      • Instruction ID: 79a2b624559b9085d91b2e9cc4fdf8e4c9d9c60f7b57f08c06ab2113956da87e
      • Opcode Fuzzy Hash: aea3b6f85b11670c80eea590e7e3f1edfe6aa3e1e4bfb6d03617bd48bad2dd4f
      • Instruction Fuzzy Hash: 48115E755093809FDB12CF15DC45B56BFA4DF46220F0884EBED889F252D275A908CB72
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • FindNextFileW.KERNELBASE(?,00000E24,?,?), ref: 00D3A1C2
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: FileFindNext
      • String ID:
      • API String ID: 2029273394-0
      • Opcode ID: 7ceaf084a5a3263e7d60d4d88091efe492b416989b64ff3fc30ad461458b6846
      • Instruction ID: 75896b58cf5c461cc70651f8e551a15e1e5f3be5af10604c6edc5a4069c39d1a
      • Opcode Fuzzy Hash: 7ceaf084a5a3263e7d60d4d88091efe492b416989b64ff3fc30ad461458b6846
      • Instruction Fuzzy Hash: 8D018471900600AFD310DF26DC46B66FBE8FB88A20F14856AED489B741E735FA15CBE5
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CreatePipe.KERNELBASE(?,00000E24,?,?), ref: 00D3AC36
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: CreatePipe
      • String ID:
      • API String ID: 2719314638-0
      • Opcode ID: ae286664be36507504b8de23a6258b0772f5fa00d658e7740d2a1dd6fa38d23f
      • Instruction ID: a9e0805e0595d2e2afe5a3d98509aed5652ad980c4d7642e4a812f80045adb2f
      • Opcode Fuzzy Hash: ae286664be36507504b8de23a6258b0772f5fa00d658e7740d2a1dd6fa38d23f
      • Instruction Fuzzy Hash: 7F01B171900200AFD310DF26DC46B26FBE8FB88A20F14816AEC489B641E735BA15CBE1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • FindCloseChangeNotification.KERNELBASE(?), ref: 00D3A748
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: ChangeCloseFindNotification
      • String ID:
      • API String ID: 2591292051-0
      • Opcode ID: 589776035693c26c7a66c44843e395d07f75df2f0fb475edd7afdf7769ab83a0
      • Instruction ID: 172c13a95cc8888340fdefb31fc97f07bfe87ecf9be6007b98d9b150203ef24a
      • Opcode Fuzzy Hash: 589776035693c26c7a66c44843e395d07f75df2f0fb475edd7afdf7769ab83a0
      • Instruction Fuzzy Hash: 4E01A7B5A003409FDB10CF29D986756FBE4DF04321F18C4AADD858F251D379EA58DAB2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: CloseFind
      • String ID:
      • API String ID: 1863332320-0
      • Opcode ID: bc0e7aa53ca8e95997bd7b63da9257dd2b7c1664c2bb1fe9d669009134dcbddc
      • Instruction ID: 1c3957b7ccdc766d9b7cb0618b5a39bfddcc304ebc3c26d6ef324f5b9a5dd9c5
      • Opcode Fuzzy Hash: bc0e7aa53ca8e95997bd7b63da9257dd2b7c1664c2bb1fe9d669009134dcbddc
      • Instruction Fuzzy Hash: 4301D1756002408FDB108F29D885766FBE4EF05320F08C0AADD858B256E379EA48DAB2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • SetErrorMode.KERNELBASE(?), ref: 00D3A30C
      Memory Dump Source
      • Source File: 00000005.00000002.2902111398.0000000000D3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d3a000_unarchiver.jbxd
      Similarity
      • API ID: ErrorMode
      • String ID:
      • API String ID: 2340568224-0
      • Opcode ID: 81a258022d779b80af075dacfafcc40439f0e2c593db26231f067a8c9b2f80ef
      • Instruction ID: 61fdafea1869bb9942f6a223ce280f2594e86f99250fd13ab17353798f4c7f90
      • Opcode Fuzzy Hash: 81a258022d779b80af075dacfafcc40439f0e2c593db26231f067a8c9b2f80ef
      • Instruction Fuzzy Hash: DEF0A4346042408FDB10CF19D885766FBE0EF04720F08C09ADD854F252E379AA18CA72
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.2902475712.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_f60000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID: \O;k
      • API String ID: 0-1032581651
      • Opcode ID: 0c5663aa52cea8399302ec1b9326c03ea97563d2b1da38b5b2fa60083acc7abb
      • Instruction ID: 7c0063552d62855002ae55d9440cd325b9c43f46f9d79d01e4cdd00f29d098eb
      • Opcode Fuzzy Hash: 0c5663aa52cea8399302ec1b9326c03ea97563d2b1da38b5b2fa60083acc7abb
      • Instruction Fuzzy Hash: 14A16D34B002148FDB28AF78D856B7E77A3EB94308F248529D906D7399DF788D42DB61
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.2902475712.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_f60000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID: KM!
      • API String ID: 0-1580089921
      • Opcode ID: fbdb265be7cd20086dc18dd6643d6f2d12652fcfb2ccf3c9b5fb51410dc097d1
      • Instruction ID: aca637630ff555c079c83182ecd1107e7b06ba888deff5637c6586cd6f966567
      • Opcode Fuzzy Hash: fbdb265be7cd20086dc18dd6643d6f2d12652fcfb2ccf3c9b5fb51410dc097d1
      • Instruction Fuzzy Hash: 9A213531B002108FD756DB7984517AEBAE79B89304F55452CD085CB381DF76E94287A6
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.2902475712.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_f60000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID: KM!
      • API String ID: 0-1580089921
      • Opcode ID: b7a976070004cebfd14b24b077bb132237ff71c40b99af34ba8fba491eee293e
      • Instruction ID: 1d15112e796a0a1a6aafc23186fc521bf224ea1c1f41d1abe57e786267f22361
      • Opcode Fuzzy Hash: b7a976070004cebfd14b24b077bb132237ff71c40b99af34ba8fba491eee293e
      • Instruction Fuzzy Hash: 7121F330B003148BC755EB3984517AEB6E79BC5304B55882DD046CB381DF79EA4287A2
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.2902010138.0000000000C10000.00000040.00000020.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_c10000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID: C~up
      • API String ID: 0-4106719514
      • Opcode ID: 1d68ad69f833fb1b88b1443165a3552a0e325f29f4a7f0e1dca45bd2d8dca560
      • Instruction ID: 2f76e99abca639abc8250bf25dbeecd74a323e0857cd37ca1038f1fed99bfc3f
      • Opcode Fuzzy Hash: 1d68ad69f833fb1b88b1443165a3552a0e325f29f4a7f0e1dca45bd2d8dca560
      • Instruction Fuzzy Hash: 1801D8B240D3806FD701CB25AD41C56FFF8DF83520B0885AEEC848B102D265AE19CBB2
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.2902010138.0000000000C10000.00000040.00000020.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_c10000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID: C~up
      • API String ID: 0-4106719514
      • Opcode ID: 27d7af24f4debaa2f5562b37e3ff6851b373eab909d07f1e12f9f882008e77d0
      • Instruction ID: dbfd56e4ae21f698e5e608c6f6a3a90b716f248f82393837b7f11b23d6080099
      • Opcode Fuzzy Hash: 27d7af24f4debaa2f5562b37e3ff6851b373eab909d07f1e12f9f882008e77d0
      • Instruction Fuzzy Hash: 86F082B29052046B9200DF15ED4685AF7ECEF84531F04C56AEC488B300E276AE158AF2
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000005.00000002.2902475712.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_f60000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: fda8ee2ebfc3d4fe104ad20f3ec159203edd6345bcb9c4f5b9cb9f8509128981
      • Instruction ID: 7631de5c7898cde79bd815d3f0ea2d5969c3ce778a046943bb3a2f8eae8a3459
      • Opcode Fuzzy Hash: fda8ee2ebfc3d4fe104ad20f3ec159203edd6345bcb9c4f5b9cb9f8509128981
      • Instruction Fuzzy Hash: BBB15E38B05210CFC768EF68E955B6A77B2EF99350B248524DA0697358DF349D02CBA0
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000005.00000002.2902475712.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_f60000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 2fcea05573e93b740ae52c611608750b6362c2416242139c9e261df3fcf3925a
      • Instruction ID: 96abd6017c1f72f0018a8e03e8bda4b149cee09e2f0666711ca8d6ea875ccd89
      • Opcode Fuzzy Hash: 2fcea05573e93b740ae52c611608750b6362c2416242139c9e261df3fcf3925a
      • Instruction Fuzzy Hash: BE119132B10118AFCB54EBB8D845DAF7BF6FF88214B054575E606E7264DF35A8168780
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000005.00000002.2902010138.0000000000C10000.00000040.00000020.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_c10000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6d12c6ba24a02b6735f8e09d8c5bdc29fd3b5a06977cb7423a6b167e9235ec3b
      • Instruction ID: 09f619ba7930506f4f3384aeece1cef38fe6c6c5c3b3d92ec21a8276cd04256f
      • Opcode Fuzzy Hash: 6d12c6ba24a02b6735f8e09d8c5bdc29fd3b5a06977cb7423a6b167e9235ec3b
      • Instruction Fuzzy Hash: A2018BB65093805FD712CF15AC41863FFE8DE8652070981EFEC898B652D165A909C771
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000005.00000002.2902475712.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_f60000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: efac792d79756ab099cbbf0fee014ad613cb8842e7c6a9aa0362cfcae13c657a
      • Instruction ID: 973837f14d7ab5240dbf4784a5b365864eba89a0fca87a4898483768784ef697
      • Opcode Fuzzy Hash: efac792d79756ab099cbbf0fee014ad613cb8842e7c6a9aa0362cfcae13c657a
      • Instruction Fuzzy Hash: 19E0DF22F102681FDB44DEF944812AF7FE5CF81124F81467A9008DB341EA398A038390
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000005.00000002.2902010138.0000000000C10000.00000040.00000020.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_c10000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b43f336ac622a21c1d6aea22af72f3c2abf73fe00077c24c22627f15c114b11f
      • Instruction ID: 0ce173f573bc92f08a9122ddd14cdc7ac1a2a5f210a3f43b06d02907abe09b94
      • Opcode Fuzzy Hash: b43f336ac622a21c1d6aea22af72f3c2abf73fe00077c24c22627f15c114b11f
      • Instruction Fuzzy Hash: DCE092B6A006004B9650CF0AFC42452F7D8EB84630708C07FDC0D8B701E239BA18CAA5
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000005.00000002.2902475712.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_f60000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 7fe74354193a24e308f31ed3e65b50fe09693b8448586f095d14912afa206198
      • Instruction ID: abddddc57894028f3d24e868dd68b0b32cbff897b630fee1513a03a0cda533ad
      • Opcode Fuzzy Hash: 7fe74354193a24e308f31ed3e65b50fe09693b8448586f095d14912afa206198
      • Instruction Fuzzy Hash: 0DD01231F002282B8B44DAB9588255F7BEA9BC5154B9544799009D7340EF3999428790
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000005.00000002.2902475712.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_f60000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 878796ddee7839f525ab79d8c1f23cf9e5b9ae4a1ff2b4f38f3ed530115a2527
      • Instruction ID: f4ed837d97009f3531373f4c558f32bbe11f9a81a4a05cdd0bf2dbdce3f871dd
      • Opcode Fuzzy Hash: 878796ddee7839f525ab79d8c1f23cf9e5b9ae4a1ff2b4f38f3ed530115a2527
      • Instruction Fuzzy Hash: 23E0C23228A3504FDB07D7349C55AAE7FA05BA2304F9AC2AA8049CB2A3C665C806C700
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000005.00000002.2902475712.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_f60000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e4a0a45c24a120e87f3ae693a91d269f2b1922e770a482706d0d221f15c71a9a
      • Instruction ID: 5eabfff7bb9f8bd9f828999e2cc348511f12d8ef79fb92b4af43a2f6b979868b
      • Opcode Fuzzy Hash: e4a0a45c24a120e87f3ae693a91d269f2b1922e770a482706d0d221f15c71a9a
      • Instruction Fuzzy Hash: 3DD02B262453404FC7035B7494145763F6167D1304F8A82A1C4444F363DA24CD41D390
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000005.00000002.2902075158.0000000000D32000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D32000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d32000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 788ea4d20c1fe4fd0db48c2c67ed5edf7a663aad36ab218ccecf1b244d4ca46c
      • Instruction ID: 516de2a009bb742a2703eab6bbed98a42aa4a1773b7c7dc25880ab224ce10bd2
      • Opcode Fuzzy Hash: 788ea4d20c1fe4fd0db48c2c67ed5edf7a663aad36ab218ccecf1b244d4ca46c
      • Instruction Fuzzy Hash: 17D05E796056814FD3269A1CC1A6BA537D4AB61714F4A44F9A8008B763C768E981D620
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000005.00000002.2902075158.0000000000D32000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D32000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_d32000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c480dcf11cc6dd97db5f65062a7c7f4b05565a93fa07343bb4566dd4c89f599c
      • Instruction ID: 0f4b3a5651a5358bc67fbc7bf2cfd6862d731afd0dcf2c5cd7d2c73816f26918
      • Opcode Fuzzy Hash: c480dcf11cc6dd97db5f65062a7c7f4b05565a93fa07343bb4566dd4c89f599c
      • Instruction Fuzzy Hash: 48D05E356412814BC725EA1CC2D4F6973D4AB40B14F0A44ECAC108B662C7A9D9C0CA10
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000005.00000002.2902475712.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_f60000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 5c394adab62f77cec5af2e5b9e35fc6ba758dce6e506ebccfc39dfa079f50562
      • Instruction ID: 8cae4459da5e62a5603457d65fdd40366c4c7cf29bd2a43318daad4c3771994c
      • Opcode Fuzzy Hash: 5c394adab62f77cec5af2e5b9e35fc6ba758dce6e506ebccfc39dfa079f50562
      • Instruction Fuzzy Hash: 9FC012312402188BC708A778D959E2AB7D997D4304F95C56454094B355CF74EC41D640
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000005.00000002.2902475712.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_f60000_unarchiver.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: bfb69a6c4e318172afab476770294d65f11a3061c228389faaea64f66d388b7d
      • Instruction ID: 56119ce76f8973ddcee70870213a5f007912ae35d21c2085b64496bfdc410c81
      • Opcode Fuzzy Hash: bfb69a6c4e318172afab476770294d65f11a3061c228389faaea64f66d388b7d
      • Instruction Fuzzy Hash: 0EC012302402188BC704A778D859E3B73DA97D0314F95C56494094B355CF74EC41D684
      Uniqueness

      Uniqueness Score: -1.00%