Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
uxeS0sMmqM.exe

Overview

General Information

Sample name:uxeS0sMmqM.exe
renamed because original name is a hash value
Original sample name:a5dd6d6c37a74355e33fe789b28a52a27f9a441169c5f4aab047a09c9d58e467.exe
Analysis ID:1631794
MD5:653ac46acc92bc606b888e35e44f912a
SHA1:c451f9ec5de81877919a7c312c72e10c3e6b1a0b
SHA256:a5dd6d6c37a74355e33fe789b28a52a27f9a441169c5f4aab047a09c9d58e467
Tags:exeuser-adrian__luca
Infos:

Detection

GuLoader
Score:76
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Joe Sandbox ML detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
JA3 SSL client fingerprint seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • uxeS0sMmqM.exe (PID: 6352 cmdline: "C:\Users\user\Desktop\uxeS0sMmqM.exe" MD5: 653AC46ACC92BC606B888E35E44F912A)
    • uxeS0sMmqM.exe (PID: 3476 cmdline: "C:\Users\user\Desktop\uxeS0sMmqM.exe" MD5: 653AC46ACC92BC606B888E35E44F912A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2303982340.0000000005FB7000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    0000000B.00000002.2932345841.0000000002BD7000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-03-07T16:09:08.053892+010028032702Potentially Bad Traffic192.168.2.1149705142.250.181.238443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: uxeS0sMmqM.exeAvira: detected
      Source: uxeS0sMmqM.exeVirustotal: Detection: 68%Perma Link
      Source: uxeS0sMmqM.exeReversingLabs: Detection: 55%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: uxeS0sMmqM.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 142.250.181.238:443 -> 192.168.2.11:49705 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.186.161:443 -> 192.168.2.11:49706 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.186.161:443 -> 192.168.2.11:49712 version: TLS 1.2
      Source: uxeS0sMmqM.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: uxeS0sMmqM.exe, 0000000B.00000001.2302875532.0000000000649000.00000020.00000001.01000000.0000000B.sdmp
      Source: Binary string: mshtml.pdbUGP source: uxeS0sMmqM.exe, 0000000B.00000001.2302875532.0000000000649000.00000020.00000001.01000000.0000000B.sdmp
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeCode function: 0_2_00405A19 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405A19
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeCode function: 0_2_004065CE FindFirstFileA,FindClose,0_2_004065CE
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeCode function: 0_2_004027AA FindFirstFileA,0_2_004027AA
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.11:49705 -> 142.250.181.238:443
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=X8UwxsbAy9zEsokldVOi9imoYw3sMj_IZXngKmmtp9Crab7UR6y3fKHIRIhFKfUGzwaZBKAA75jNFjToO7Rx6Rk82cYyEWOil9GTD-NJMkroWEiiNDTXMvKRGcemfzFKKU6adAH2A_5Npuif24WXczJcKx2sDu5ARJB6MCLaMjVtx3RfNxthSReV8r8dVnP45g
      Source: global trafficHTTP traffic detected: GET /download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=X8UwxsbAy9zEsokldVOi9imoYw3sMj_IZXngKmmtp9Crab7UR6y3fKHIRIhFKfUGzwaZBKAA75jNFjToO7Rx6Rk82cYyEWOil9GTD-NJMkroWEiiNDTXMvKRGcemfzFKKU6adAH2A_5Npuif24WXczJcKx2sDu5ARJB6MCLaMjVtx3RfNxthSReV8r8dVnP45g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=X8UwxsbAy9zEsokldVOi9imoYw3sMj_IZXngKmmtp9Crab7UR6y3fKHIRIhFKfUGzwaZBKAA75jNFjToO7Rx6Rk82cYyEWOil9GTD-NJMkroWEiiNDTXMvKRGcemfzFKKU6adAH2A_5Npuif24WXczJcKx2sDu5ARJB6MCLaMjVtx3RfNxthSReV8r8dVnP45g
      Source: global trafficHTTP traffic detected: GET /download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=X8UwxsbAy9zEsokldVOi9imoYw3sMj_IZXngKmmtp9Crab7UR6y3fKHIRIhFKfUGzwaZBKAA75jNFjToO7Rx6Rk82cYyEWOil9GTD-NJMkroWEiiNDTXMvKRGcemfzFKKU6adAH2A_5Npuif24WXczJcKx2sDu5ARJB6MCLaMjVtx3RfNxthSReV8r8dVnP45g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=X8UwxsbAy9zEsokldVOi9imoYw3sMj_IZXngKmmtp9Crab7UR6y3fKHIRIhFKfUGzwaZBKAA75jNFjToO7Rx6Rk82cYyEWOil9GTD-NJMkroWEiiNDTXMvKRGcemfzFKKU6adAH2A_5Npuif24WXczJcKx2sDu5ARJB6MCLaMjVtx3RfNxthSReV8r8dVnP45g
      Source: global trafficHTTP traffic detected: GET /download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=X8UwxsbAy9zEsokldVOi9imoYw3sMj_IZXngKmmtp9Crab7UR6y3fKHIRIhFKfUGzwaZBKAA75jNFjToO7Rx6Rk82cYyEWOil9GTD-NJMkroWEiiNDTXMvKRGcemfzFKKU6adAH2A_5Npuif24WXczJcKx2sDu5ARJB6MCLaMjVtx3RfNxthSReV8r8dVnP45g
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=X8UwxsbAy9zEsokldVOi9imoYw3sMj_IZXngKmmtp9Crab7UR6y3fKHIRIhFKfUGzwaZBKAA75jNFjToO7Rx6Rk82cYyEWOil9GTD-NJMkroWEiiNDTXMvKRGcemfzFKKU6adAH2A_5Npuif24WXczJcKx2sDu5ARJB6MCLaMjVtx3RfNxthSReV8r8dVnP45g
      Source: global trafficHTTP traffic detected: GET /download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=X8UwxsbAy9zEsokldVOi9imoYw3sMj_IZXngKmmtp9Crab7UR6y3fKHIRIhFKfUGzwaZBKAA75jNFjToO7Rx6Rk82cYyEWOil9GTD-NJMkroWEiiNDTXMvKRGcemfzFKKU6adAH2A_5Npuif24WXczJcKx2sDu5ARJB6MCLaMjVtx3RfNxthSReV8r8dVnP45g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=X8UwxsbAy9zEsokldVOi9imoYw3sMj_IZXngKmmtp9Crab7UR6y3fKHIRIhFKfUGzwaZBKAA75jNFjToO7Rx6Rk82cYyEWOil9GTD-NJMkroWEiiNDTXMvKRGcemfzFKKU6adAH2A_5Npuif24WXczJcKx2sDu5ARJB6MCLaMjVtx3RfNxthSReV8r8dVnP45g
      Source: global trafficHTTP traffic detected: GET /download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=X8UwxsbAy9zEsokldVOi9imoYw3sMj_IZXngKmmtp9Crab7UR6y3fKHIRIhFKfUGzwaZBKAA75jNFjToO7Rx6Rk82cYyEWOil9GTD-NJMkroWEiiNDTXMvKRGcemfzFKKU6adAH2A_5Npuif24WXczJcKx2sDu5ARJB6MCLaMjVtx3RfNxthSReV8r8dVnP45g
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=X8UwxsbAy9zEsokldVOi9imoYw3sMj_IZXngKmmtp9Crab7UR6y3fKHIRIhFKfUGzwaZBKAA75jNFjToO7Rx6Rk82cYyEWOil9GTD-NJMkroWEiiNDTXMvKRGcemfzFKKU6adAH2A_5Npuif24WXczJcKx2sDu5ARJB6MCLaMjVtx3RfNxthSReV8r8dVnP45g
      Source: global trafficHTTP traffic detected: GET /download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=X8UwxsbAy9zEsokldVOi9imoYw3sMj_IZXngKmmtp9Crab7UR6y3fKHIRIhFKfUGzwaZBKAA75jNFjToO7Rx6Rk82cYyEWOil9GTD-NJMkroWEiiNDTXMvKRGcemfzFKKU6adAH2A_5Npuif24WXczJcKx2sDu5ARJB6MCLaMjVtx3RfNxthSReV8r8dVnP45g
      Source: global trafficDNS traffic detected: DNS query: drive.google.com
      Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AKDAyIsTCyMZk_Q36Sg0dbDkgNELl4_81iClXXwC22s1AkqFlmYigAvChmI0BnKzdN0qIzgIContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Fri, 07 Mar 2025 15:09:10 GMTP3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."Content-Security-Policy: script-src 'nonce-MuDhwstRcuCRDhVuN1KXLw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Length: 1652Server: UploadServerSet-Cookie: NID=522=X8UwxsbAy9zEsokldVOi9imoYw3sMj_IZXngKmmtp9Crab7UR6y3fKHIRIhFKfUGzwaZBKAA75jNFjToO7Rx6Rk82cYyEWOil9GTD-NJMkroWEiiNDTXMvKRGcemfzFKKU6adAH2A_5Npuif24WXczJcKx2sDu5ARJB6MCLaMjVtx3RfNxthSReV8r8dVnP45g; expires=Sat, 06-Sep-2025 15:09:10 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=noneAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AKDAyIsd9Jm58wvhdtPVEW_apNy4_h08g7hT0KYMOFQ22cWYrM6UqT3H4bDJDsCxD7tIMy5YY6kPB_AContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Fri, 07 Mar 2025 15:09:26 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-HZO24381jsRhR3N6AJ1bsQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistCross-Origin-Opener-Policy: same-originAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AKDAyIs7FZgb53VlP172fmgtmhs6N76Z4t138aZPhLX8X9rkwerEJKWBCqBLz9B3xXSfyLLtContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Fri, 07 Mar 2025 15:09:41 GMTAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionCross-Origin-Opener-Policy: same-originContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-Jni51OK49ve0YMx7ruDebg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AKDAyIv6wbm2ilT7iP2UVti7y85uosf_mMgXfKTAfWafNn7etmuUTMQkmYMoXfK7cvagTGkIphRyp8IContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Fri, 07 Mar 2025 15:09:57 GMTCross-Origin-Opener-Policy: same-originContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-uh5WJ3ZB2KxbOpx6zoOqsQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: uxeS0sMmqM.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
      Source: uxeS0sMmqM.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: uxeS0sMmqM.exe, 0000000B.00000001.2302875532.0000000000649000.00000020.00000001.01000000.0000000B.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
      Source: uxeS0sMmqM.exe, 0000000B.00000001.2302875532.00000000005F2000.00000020.00000001.01000000.0000000B.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
      Source: uxeS0sMmqM.exe, 0000000B.00000001.2302875532.00000000005F2000.00000020.00000001.01000000.0000000B.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2859634332.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2732204178.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704657007.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2576783376.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
      Source: uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2935963583.0000000004878000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704693862.0000000004876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2887165641.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2859634332.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2732204178.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704657007.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/.c
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2859728610.0000000004877000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2935963583.0000000004878000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=download
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2548968269.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2859634332.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2732204178.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704657007.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2576783376.000000000488C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/B
      Source: uxeS0sMmqM.exe, 0000000B.00000002.2935963583.0000000004828000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/J
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2704693862.0000000004876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/crosoft
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2859728610.0000000004877000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2732330924.0000000004877000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2935963583.0000000004878000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704693862.0000000004876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/ertificates
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2887165641.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2859634332.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/rcontent.google.com/download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=do
      Source: uxeS0sMmqM.exe, 0000000B.00000002.2935963583.0000000004866000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2859634332.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2732204178.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2935963583.0000000004828000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704657007.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2576783376.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2887165641.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2548968269.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2859634332.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2732204178.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704657007.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2576783376.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz(
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2887165641.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2859634332.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2732204178.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704657007.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6LzubA8qPS6c1eA6Lz
      Source: uxeS0sMmqM.exe, 0000000B.00000002.2935963583.0000000004828000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lzy
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2421361576.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2887165641.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2548968269.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2859634332.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2732204178.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704657007.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2576783376.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
      Source: uxeS0sMmqM.exe, 0000000B.00000002.2935963583.0000000004878000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704693862.0000000004876000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2887165641.0000000004889000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=download
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2887165641.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=download%C
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2887165641.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2859634332.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2732204178.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704657007.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2576783376.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=download;C
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2887165641.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=download?B
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2576783376.000000000488C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=downloadAB
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2732204178.000000000488F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=downloadCb
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2887165641.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=downloadMC
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2732330924.000000000487F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704693862.000000000487F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2935963583.000000000487F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2859728610.000000000487F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=downloadS
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2732330924.000000000487F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704693862.000000000487F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2935963583.000000000487F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2859728610.000000000487F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=downloadX
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2887165641.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=downloadbc
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2859728610.0000000004877000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2732330924.0000000004877000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2935963583.0000000004878000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704693862.0000000004876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=downloadeJ
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2859728610.0000000004877000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2732330924.0000000004877000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2935963583.0000000004878000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704693862.0000000004876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=downloader
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2859728610.0000000004877000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2732330924.0000000004877000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2935963583.0000000004878000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=downloadid
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2859728610.0000000004877000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2732330924.0000000004877000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2935963583.0000000004878000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704693862.0000000004876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1dw0CTI415CKRkkbfOubA8qPS6c1eA6Lz&export=downloadt
      Source: uxeS0sMmqM.exe, 0000000B.00000001.2302875532.0000000000649000.00000020.00000001.01000000.0000000B.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2859634332.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2732204178.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704657007.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2576783376.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2704657007.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2576783376.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2859634332.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2732204178.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704657007.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2576783376.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2859634332.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2732204178.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704657007.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2576783376.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2704657007.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2576783376.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
      Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
      Source: unknownHTTPS traffic detected: 142.250.181.238:443 -> 192.168.2.11:49705 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.186.161:443 -> 192.168.2.11:49706 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.186.161:443 -> 192.168.2.11:49712 version: TLS 1.2
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeCode function: 0_2_004054B6 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageA,CreatePopupMenu,LdrInitializeThunk,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,LdrInitializeThunk,SetClipboardData,CloseClipboard,0_2_004054B6
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeCode function: 0_2_004033B3 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004033B3
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeCode function: 0_2_0040727F0_2_0040727F
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeCode function: 0_2_00406AA80_2_00406AA8
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeCode function: 0_2_73971B280_2_73971B28
      Source: uxeS0sMmqM.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal76.troj.evad.winEXE@3/20@2/2
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeCode function: 0_2_004033B3 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004033B3
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeCode function: 0_2_00404766 GetDlgItem,SetWindowTextA,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,LdrInitializeThunk,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_00404766
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeCode function: 0_2_00402173 LdrInitializeThunk,CoCreateInstance,MultiByteToWideChar,LdrInitializeThunk,0_2_00402173
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeFile created: C:\Users\user\AppData\Roaming\bekendtgrelsersJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeFile created: C:\Users\user\AppData\Local\Temp\nsh9895.tmpJump to behavior
      Source: uxeS0sMmqM.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: uxeS0sMmqM.exeVirustotal: Detection: 68%
      Source: uxeS0sMmqM.exeReversingLabs: Detection: 55%
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeFile read: C:\Users\user\Desktop\uxeS0sMmqM.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\uxeS0sMmqM.exe "C:\Users\user\Desktop\uxeS0sMmqM.exe"
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeProcess created: C:\Users\user\Desktop\uxeS0sMmqM.exe "C:\Users\user\Desktop\uxeS0sMmqM.exe"
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeProcess created: C:\Users\user\Desktop\uxeS0sMmqM.exe "C:\Users\user\Desktop\uxeS0sMmqM.exe"Jump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeFile written: C:\Users\user\AppData\Roaming\bekendtgrelsers\Okkupationstroppers\Hjertensgod.iniJump to behavior
      Source: uxeS0sMmqM.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: uxeS0sMmqM.exe, 0000000B.00000001.2302875532.0000000000649000.00000020.00000001.01000000.0000000B.sdmp
      Source: Binary string: mshtml.pdbUGP source: uxeS0sMmqM.exe, 0000000B.00000001.2302875532.0000000000649000.00000020.00000001.01000000.0000000B.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000000.00000002.2303982340.0000000005FB7000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.2932345841.0000000002BD7000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeCode function: 0_2_73971B28 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_73971B28
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeFile created: C:\Users\user\AppData\Local\Temp\nsx9A2C.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeFile created: C:\Users\user\AppData\Local\Temp\nsx9A2C.tmp\LangDLL.dllJump to dropped file
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeAPI/Special instruction interceptor: Address: 66473EB
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeAPI/Special instruction interceptor: Address: 32673EB
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeRDTSC instruction interceptor: First address: 66062C6 second address: 66062C6 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FE67CF23714h 0x00000006 cmp edx, 6BB88DE8h 0x0000000c inc ebp 0x0000000d inc ebx 0x0000000e rdtsc
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeRDTSC instruction interceptor: First address: 32262C6 second address: 32262C6 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FE67D326554h 0x00000006 cmp edx, 6BB88DE8h 0x0000000c inc ebp 0x0000000d inc ebx 0x0000000e rdtsc
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsx9A2C.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsx9A2C.tmp\LangDLL.dllJump to dropped file
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeCode function: 0_2_00405A19 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405A19
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeCode function: 0_2_004065CE FindFirstFileA,FindClose,0_2_004065CE
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeCode function: 0_2_004027AA FindFirstFileA,0_2_004027AA
      Source: uxeS0sMmqM.exe, 0000000B.00000003.2732330924.000000000487F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704693862.000000000487F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2935963583.000000000487F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2859728610.000000000487F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: uxeS0sMmqM.exe, 0000000B.00000002.2935963583.0000000004828000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWhS
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeAPI call chain: ExitProcess graph end nodegraph_0-4431
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeAPI call chain: ExitProcess graph end nodegraph_0-4581
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeCode function: 0_2_00401759 lstrcatA,CompareFileTime,LdrInitializeThunk,SetFileTime,CloseHandle,lstrcatA,0_2_00401759
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeCode function: 0_2_73971B28 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_73971B28
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeProcess created: C:\Users\user\Desktop\uxeS0sMmqM.exe "C:\Users\user\Desktop\uxeS0sMmqM.exe"Jump to behavior
      Source: C:\Users\user\Desktop\uxeS0sMmqM.exeCode function: 0_2_004033B3 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004033B3
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      1
      Masquerading
      OS Credential Dumping21
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
      Process Injection
      1
      Access Token Manipulation
      LSASS Memory3
      File and Directory Discovery
      Remote Desktop Protocol1
      Clipboard Data
      3
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      11
      Process Injection
      Security Account Manager23
      System Information Discovery
      SMB/Windows Admin SharesData from Network Shared Drive3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      DLL Side-Loading
      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture14
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      uxeS0sMmqM.exe68%VirustotalBrowse
      uxeS0sMmqM.exe55%ReversingLabsWin32.Trojan.NSISInject
      uxeS0sMmqM.exe100%AviraHEUR/AGEN.1337977
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nsx9A2C.tmp\LangDLL.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\nsx9A2C.tmp\LangDLL.dll0%VirustotalBrowse
      C:\Users\user\AppData\Local\Temp\nsx9A2C.tmp\System.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\nsx9A2C.tmp\System.dll0%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      drive.google.com
      142.250.181.238
      truefalse
        high
        drive.usercontent.google.com
        142.250.186.161
        truefalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          https://www.google.comuxeS0sMmqM.exe, 0000000B.00000003.2859634332.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2732204178.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704657007.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2576783376.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtduxeS0sMmqM.exe, 0000000B.00000001.2302875532.00000000005F2000.00000020.00000001.01000000.0000000B.sdmpfalse
              high
              http://nsis.sf.net/NSIS_ErroruxeS0sMmqM.exefalse
                high
                https://drive.google.com/uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2935963583.0000000004878000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704693862.0000000004876000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://drive.google.com/ertificatesuxeS0sMmqM.exe, 0000000B.00000003.2859728610.0000000004877000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2732330924.0000000004877000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2935963583.0000000004878000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704693862.0000000004876000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214uxeS0sMmqM.exe, 0000000B.00000001.2302875532.0000000000649000.00000020.00000001.01000000.0000000B.sdmpfalse
                      high
                      http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtduxeS0sMmqM.exe, 0000000B.00000001.2302875532.00000000005F2000.00000020.00000001.01000000.0000000B.sdmpfalse
                        high
                        http://www.ftp.ftp://ftp.gopher.uxeS0sMmqM.exe, 0000000B.00000001.2302875532.0000000000649000.00000020.00000001.01000000.0000000B.sdmpfalse
                          high
                          https://drive.google.com/crosoftuxeS0sMmqM.exe, 0000000B.00000003.2704693862.0000000004876000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://drive.usercontent.google.com/uxeS0sMmqM.exe, 0000000B.00000003.2421361576.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2887165641.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2548968269.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2859634332.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2732204178.000000000488F000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2704657007.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000003.2576783376.000000000488C000.00000004.00000020.00020000.00000000.sdmp, uxeS0sMmqM.exe, 0000000B.00000002.2936058781.000000000488F000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://apis.google.comuxeS0sMmqM.exe, 0000000B.00000003.2859634332.00000