Loading ...

Play interactive tourEdit tour

Analysis Report TRA-St-0015-O01.xlsx

Overview

General Information

Sample Name:TRA-St-0015-O01.xlsx
Analysis ID:345208
MD5:63c2af36e2ec6b0c464889473ba19048
SHA1:d1d834ca00c0538a448e64e10231a5c78c09838d
SHA256:129cd5a1fca6d3febd900de6cbecb9e30e22a19d7b2aeda41ee3c1eac54981ba
Tags:VelvetSweatshopxlsx

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM_3
Yara detected FormBook
Drops PE files to the user root directory
Machine Learning detection for dropped file
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Executables Started in Suspicious Folder
Sigma detected: Execution in Non-Executable Folder
Sigma detected: Suspicious Program Location Process Starts
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Contains functionality to detect virtual machines (SLDT)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Drops PE files
Drops PE files to the user directory
Drops certificate files (DER)
Enables debug privileges
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 1100 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • EQNEDT32.EXE (PID: 2556 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2720 cmdline: 'C:\Users\Public\vbc.exe' MD5: C7B2B0FA4A71FE33536148C2584DA7DB)
      • schtasks.exe (PID: 2920 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XaHKwnPuj' /XML 'C:\Users\user\AppData\Local\Temp\tmp2222.tmp' MD5: 97E0EC3D6D99E8CC2B17EF2D3760E8FC)
      • vbc.exe (PID: 2928 cmdline: C:\Users\Public\vbc.exe MD5: C7B2B0FA4A71FE33536148C2584DA7DB)
      • vbc.exe (PID: 2476 cmdline: C:\Users\Public\vbc.exe MD5: C7B2B0FA4A71FE33536148C2584DA7DB)
      • vbc.exe (PID: 2472 cmdline: C:\Users\Public\vbc.exe MD5: C7B2B0FA4A71FE33536148C2584DA7DB)
      • vbc.exe (PID: 2456 cmdline: C:\Users\Public\vbc.exe MD5: C7B2B0FA4A71FE33536148C2584DA7DB)
      • vbc.exe (PID: 2884 cmdline: C:\Users\Public\vbc.exe MD5: C7B2B0FA4A71FE33536148C2584DA7DB)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x2c6660:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x2c68da:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x2d23fd:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x2d1ee9:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x2d24ff:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x2d2677:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x2c72f2:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x2d1164:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0x2c7feb:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x2d809f:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x2d90a2:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x2d5181:$sqlite3step: 68 34 1C 7B E1
    • 0x2d5294:$sqlite3step: 68 34 1C 7B E1
    • 0x2d51b0:$sqlite3text: 68 38 2A 90 C5
    • 0x2d52d5:$sqlite3text: 68 38 2A 90 C5
    • 0x2d51c3:$sqlite3blob: 68 53 D8 7F 8C
    • 0x2d52eb:$sqlite3blob: 68 53 D8 7F 8C
    00000004.00000002.2169219241.00000000023DE000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      Process Memory Space: vbc.exe PID: 2720JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
        Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2556, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2720
        Sigma detected: File Dropped By EQNEDT32EXEShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2556, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\kinsvc[1].exe
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XaHKwnPuj' /XML 'C:\Users\user\AppData\Local\Temp\tmp2222.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XaHKwnPuj' /XML 'C:\Users\user\AppData\Local\Temp\tmp2222.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: 'C:\Users\Public\vbc.exe' , ParentImage: C:\Users\Public\vbc.exe, ParentProcessId: 2720, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XaHKwnPuj' /XML 'C:\Users\user\AppData\Local\Temp\tmp2222.tmp', ProcessId: 2920
        Sigma detected: Executables Started in Suspicious FolderShow sources
        Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2556, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2720
        Sigma detected: Execution in Non-Executable FolderShow sources
        Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2556, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2720
        Sigma detected: Suspicious Program Location Process StartsShow sources
        Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2556, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2720

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Multi AV Scanner detection for submitted fileShow sources
        Source: TRA-St-0015-O01.xlsxVirustotal: Detection: 31%Perma Link
        Source: TRA-St-0015-O01.xlsxReversingLabs: Detection: 22%
        Yara detected FormBookShow sources
        Source: Yara matchFile source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, type: MEMORY
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\Public\vbc.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\kinsvc[1].exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Roaming\XaHKwnPuj.exeJoe Sandbox ML: detected

        Exploits:

        barindex
        Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exeJump to behavior
        Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding

        Compliance:

        barindex
        Uses new MSVCR DllsShow sources
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
        Uses secure TLS version for HTTPS connectionsShow sources
        Source: unknownHTTPS traffic detected: 162.241.148.128:443 -> 192.168.2.22:49165 version: TLS 1.2
        Source: global trafficDNS query: name: spicesherbs.in
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 162.241.148.128:443
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 162.241.148.128:443
        Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BADF7393.emfJump to behavior
        Source: unknownDNS traffic detected: queries for: spicesherbs.in
        Source: E0F5C59F9FA661F6F4C50B87FEF3A15A.2.drString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
        Source: 77EC63BDA74BD0D0E0426DC8F8008506.2.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
        Source: vbc.exe, 00000004.00000002.2170919142.000000001BA40000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
        Source: vbc.exe, 00000004.00000002.2169176262.0000000002371000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: vbc.exe, 00000004.00000002.2170919142.000000001BA40000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
        Source: BADF7393.emf.0.drString found in binary or memory: http://www.day.com/dam/1.0
        Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
        Source: unknownHTTPS traffic detected: 162.241.148.128:443 -> 192.168.2.22:49165 version: TLS 1.2

        E-Banking Fraud:

        barindex
        Yara detected FormBookShow sources
        Source: Yara matchFile source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, type: MEMORY
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15AJump to dropped file

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Office equation editor drops PE fileShow sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\kinsvc[1].exeJump to dropped file
        Source: C:\Users\Public\vbc.exeCode function: 7_2_00BF3F767_2_00BF3F76
        Source: C:\Users\Public\vbc.exeCode function: 7_2_00BF93697_2_00BF9369
        Source: C:\Users\Public\vbc.exeCode function: 7_2_00BFDB4B7_2_00BFDB4B
        Source: C:\Users\Public\vbc.exeCode function: 7_2_00BFD8C77_2_00BFD8C7
        Source: C:\Users\Public\vbc.exeCode function: 7_2_00BFDB417_2_00BFDB41
        Source: TRA-St-0015-O01.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
        Source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: XaHKwnPuj.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@16/14@2/1
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$TRA-St-0015-O01.xlsxJump to behavior
        Source: C:\Users\Public\vbc.exeMutant created: \Sessions\1\BaseNamedObjects\XbELoWjomkFJpgsBcjJbdEN
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRF0C4.tmpJump to behavior
        Source: C:\Windows\System32\schtasks.exeConsole Write: ................................................................................@...............p...............................................Jump to behavior
        Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\f89061884b75dab0e3967d7221e5290d\mscorlib.ni.dllJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: TRA-St-0015-O01.xlsxVirustotal: Detection: 31%
        Source: TRA-St-0015-O01.xlsxReversingLabs: Detection: 22%
        Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
        Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
        Source: unknownProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: unknownProcess created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XaHKwnPuj' /XML 'C:\Users\user\AppData\Local\Temp\tmp2222.tmp'
        Source: unknownProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: unknownProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: unknownProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: unknownProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: unknownProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe' Jump to behavior
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XaHKwnPuj' /XML 'C:\Users\user\AppData\Local\Temp\tmp2222.tmp'Jump to behavior
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exeJump to behavior
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exeJump to behavior
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exeJump to behavior
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exeJump to behavior
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exeJump to behavior
        Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\InProcServer32Jump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\Public\vbc.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
        Source: TRA-St-0015-O01.xlsxInitial sample: OLE indicators vbamacros = False
        Source: TRA-St-0015-O01.xlsxInitial sample: OLE indicators encrypted = True
        Source: initial sampleStatic PE information: section name: .text entropy: 7.78051129047
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Roaming\XaHKwnPuj.exeJump to dropped file
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\kinsvc[1].exeJump to dropped file
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

        Boot Survival:

        barindex
        Drops PE files to the user root directoryShow sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: unknownProcess created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XaHKwnPuj' /XML 'C:\Users\user\AppData\Local\Temp\tmp2222.tmp'
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: TRA-St-0015-O01.xlsxStream path 'EncryptedPackage' entropy: 7.99976973003 (max. 8.0)

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM_3Show sources
        Source: Yara matchFile source: 00000004.00000002.2169219241.00000000023DE000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2720, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: vbc.exe, 00000004.00000002.2169219241.00000000023DE000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: vbc.exe, 00000004.00000002.2169219241.00000000023DE000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Users\Public\vbc.exeCode function: 7_2_00BF471C sldt word ptr [edx]7_2_00BF471C
        Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2560Thread sleep time: -360000s >= -30000sJump to behavior
        Source: C:\Users\Public\vbc.exe TID: 824Thread sleep time: -54277s >= -30000sJump to behavior
        Source: C:\Users\Public\vbc.exe TID: 2916Thread sleep time: -60000s >= -30000sJump to behavior
        Source: C:\Users\Public\vbc.exe TID: 2900Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: vbc.exe, 00000004.00000002.2169219241.00000000023DE000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: vbc.exe, 00000004.00000002.2169219241.00000000023DE000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: vbc.exe, 00000004.00000002.2170020694.000000001A782000.00000004.00000001.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
        Source: vbc.exe, 00000004.00000002.2169219241.00000000023DE000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: vbc.exe, 00000004.00000002.2169219241.00000000023DE000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: C:\Users\Public\vbc.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\Public\vbc.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\Public\vbc.exeMemory allocated: page read and write | page guardJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe' Jump to behavior
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XaHKwnPuj' /XML 'C:\Users\user\AppData\Local\Temp\tmp2222.tmp'Jump to behavior
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exeJump to behavior
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exeJump to behavior
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exeJump to behavior
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exeJump to behavior
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exeJump to behavior
        Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\Public\vbc.exe VolumeInformationJump to behavior

        Stealing of Sensitive Information:

        barindex
        Yara detected FormBookShow sources
        Source: Yara matchFile source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, type: MEMORY

        Remote Access Functionality:

        barindex
        Yara detected FormBookShow sources
        Source: Yara matchFile source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, type: MEMORY

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsCommand and Scripting Interpreter1Scheduled Task/Job1Process Injection11Masquerading111OS Credential DumpingQuery Registry1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Virtualization/Sandbox Evasion3LSASS MemorySecurity Software Discovery11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsExploitation for Client Execution13Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion3SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection11NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol2SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information11LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing2Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery12Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        TRA-St-0015-O01.xlsx32%VirustotalBrowse
        TRA-St-0015-O01.xlsx23%ReversingLabsDocument-Office.Trojan.Heuristic

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\Public\vbc.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\kinsvc[1].exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\XaHKwnPuj.exe100%Joe Sandbox ML

        Unpacked PE Files

        No Antivirus matches

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        http://www.%s.comPA0%URL Reputationsafe
        http://www.%s.comPA0%URL Reputationsafe
        http://www.%s.comPA0%URL Reputationsafe
        http://www.%s.comPA0%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        spicesherbs.in
        162.241.148.128
        truefalse
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://www.%s.comPAvbc.exe, 00000004.00000002.2170919142.000000001BA40000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          low
          http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.vbc.exe, 00000004.00000002.2170919142.000000001BA40000.00000002.00000001.sdmpfalse
            high
            http://www.day.com/dam/1.0BADF7393.emf.0.drfalse
              high
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namevbc.exe, 00000004.00000002.2169176262.0000000002371000.00000004.00000001.sdmpfalse
                high

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                162.241.148.128
                unknownUnited States
                46606UNIFIEDLAYER-AS-1USfalse

                General Information

                Joe Sandbox Version:31.0.0 Emerald
                Analysis ID:345208
                Start date:27.01.2021
                Start time:20:33:47
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 8m 25s
                Hypervisor based Inspection enabled:false
                Report type:full
                Sample file name:TRA-St-0015-O01.xlsx
                Cookbook file name:defaultwindowsofficecookbook.jbs
                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                Number of analysed new started processes analysed:12
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.expl.evad.winXLSX@16/14@2/1
                EGA Information:Failed
                HDC Information:
                • Successful, ratio: 5.7% (good quality ratio 3.3%)
                • Quality average: 34.8%
                • Quality standard deviation: 33.3%
                HCA Information:
                • Successful, ratio: 97%
                • Number of executed functions: 2
                • Number of non-executed functions: 6
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .xlsx
                • Found Word or Excel or PowerPoint or XPS Viewer
                • Attach to Office via COM
                • Scroll down
                • Close Viewer
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe
                • Excluded IPs from analysis (whitelisted): 192.35.177.64, 72.247.178.11, 72.247.178.49
                • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, audownload.windowsupdate.nsatc.net, apps.digsigtrust.com, ctldl.windowsupdate.com, a767.dscg3.akamai.net, apps.identrust.com, au-bg-shim.trafficmanager.net
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                20:35:06API Interceptor60x Sleep call for process: EQNEDT32.EXE modified
                20:35:11API Interceptor48x Sleep call for process: vbc.exe modified
                20:35:13API Interceptor1x Sleep call for process: schtasks.exe modified

                Joe Sandbox View / Context

                IPs

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                162.241.148.128SWIFT (MTC 103) 89.xlsxGet hashmaliciousBrowse
                • cassiagumrefined.com/js/file/TH98/86HTe.exe

                Domains

                No context

                ASN

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                UNIFIEDLAYER-AS-1USOrder confirmation 64236000000025 26.01.2021.exeGet hashmaliciousBrowse
                • 192.254.186.135
                printouts of outstanding as of Jan-27-2021.xlsmGet hashmaliciousBrowse
                • 192.185.131.49
                98.docGet hashmaliciousBrowse
                • 192.185.52.115
                0113 INV_PAK.xlsxGet hashmaliciousBrowse
                • 192.185.35.76
                Purchase Order.xlsxGet hashmaliciousBrowse
                • 50.87.169.249
                quote20210126.exe.exeGet hashmaliciousBrowse
                • 70.40.220.182
                Informacion.docGet hashmaliciousBrowse
                • 162.241.224.176
                xl2Ml2iNJe.exeGet hashmaliciousBrowse
                • 162.241.217.108
                file.docGet hashmaliciousBrowse
                • 192.185.52.115
                Remittance Advice 117301.xlsxGet hashmaliciousBrowse
                • 162.214.76.195
                vA0mtZ7JzJ.exeGet hashmaliciousBrowse
                • 162.241.60.214
                INGNhYonmgtGZ9Updf.exeGet hashmaliciousBrowse
                • 74.220.199.9
                Dridex-01-a99e.xlsmGet hashmaliciousBrowse
                • 198.57.200.100
                Inv_1480.xlsGet hashmaliciousBrowse
                • 192.185.217.211
                Mensaje-22-012021.docGet hashmaliciousBrowse
                • 162.241.253.129
                INV5949.xlsGet hashmaliciousBrowse
                • 192.232.216.109
                DOCUMENTS_RECEIVED.htmlGet hashmaliciousBrowse
                • 192.185.112.211
                INV 5047.xlsGet hashmaliciousBrowse
                • 192.185.217.211
                FP4554867134UQ.docGet hashmaliciousBrowse
                • 192.232.250.227
                MENSAJE.docGet hashmaliciousBrowse
                • 192.185.52.115

                JA3 Fingerprints

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                7dcce5b76c8b17472d024758970a406bFinal_Notification.docxGet hashmaliciousBrowse
                • 162.241.148.128
                documenting.docGet hashmaliciousBrowse
                • 162.241.148.128
                SecuriteInfo.com.Heur.3279.xlsmGet hashmaliciousBrowse
                • 162.241.148.128
                Rolled Alloys Possible Infection.docxGet hashmaliciousBrowse
                • 162.241.148.128
                Statement of Account as of Jan_27 2021.xlsmGet hashmaliciousBrowse
                • 162.241.148.128
                printouts of outstanding as of Jan-27-2021.xlsmGet hashmaliciousBrowse
                • 162.241.148.128
                printouts of outstanding as of Jan_27_2021.xlsmGet hashmaliciousBrowse
                • 162.241.148.128
                FACTUUR-INV00012.xlsxGet hashmaliciousBrowse
                • 162.241.148.128
                0007334.xlsxGet hashmaliciousBrowse
                • 162.241.148.128
                Purchase Order.xlsxGet hashmaliciousBrowse
                • 162.241.148.128
                SecuriteInfo.com.Heur.30497.xlsGet hashmaliciousBrowse
                • 162.241.148.128
                case (2553).xlsGet hashmaliciousBrowse
                • 162.241.148.128
                case (1057).xlsGet hashmaliciousBrowse
                • 162.241.148.128
                case (4335).xlsGet hashmaliciousBrowse
                • 162.241.148.128
                case (1522).xlsGet hashmaliciousBrowse
                • 162.241.148.128
                case (4374).xlsGet hashmaliciousBrowse
                • 162.241.148.128
                case (166).xlsGet hashmaliciousBrowse
                • 162.241.148.128
                PAYMENT.xlsxGet hashmaliciousBrowse
                • 162.241.148.128
                case (547).xlsGet hashmaliciousBrowse
                • 162.241.148.128
                Dridex-06-bc1b.xlsmGet hashmaliciousBrowse
                • 162.241.148.128

                Dropped Files

                No context

                Created / dropped Files

                C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                File Type:Microsoft Cabinet archive data, 59134 bytes, 1 file
                Category:dropped
                Size (bytes):59134
                Entropy (8bit):7.995450161616763
                Encrypted:true
                SSDEEP:1536:R695NkJMM0/7laXXHAQHQaYfwlmz8efIqigYDff:RN7MlanAQwEIztTk
                MD5:E92176B0889CC1BB97114BEB2F3C1728
                SHA1:AD1459D390EC23AB1C3DA73FF2FBEC7FA3A7F443
                SHA-256:58A4F38BA43F115BA3F465C311EAAF67F43D92E580F7F153DE3AB605FC9900F3
                SHA-512:CD2267BA2F08D2F87538F5B4F8D3032638542AC3476863A35F0DF491EB3A84458CE36C06E8C1BD84219F5297B6F386748E817945A406082FA8E77244EC229D8F
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: MSCF............,...................I........T.........R.. .authroot.stl.ym&7.5..CK..8T....c_.d...:.(.....].M$[v.4.).E.$7*I.....e..Y..Rq...3.n..u..............|..=H....&..1.1..f.L..>e.6....F8.X.b.1$,.a...n-......D..a....[.....i,+.+..<.b._#...G..U.....n..21*pa..>.32..Y..j...;Ay........n/R... ._.+..<...Am.t.<. ..V..y`.yO..e@../...<#..#......dju*..B......8..H'..lr.....l.I6/..d.].xIX<...&U...GD..Mn.y&.[<(tk.....%B.b;./..`.#h....C.P...B..8d.F...D.k........... 0..w...@(.. @K....?.)ce........\.\......l......Q.Qd..+...@.X..##3..M.d..n6.....p1..)...x0V...ZK.{...{.=#h.v.).....b...*..[...L..*c..a..,...E5X..i.d..w.....#o*+.........X.P...k...V.$...X.r.e....9E.x..=\...Km.......B...Ep...xl@@c1.....p?...d.{EYN.K.X>D3..Z..q.] .Mq.........L.n}........+/l\.cDB0.'.Y...r.[.........vM...o.=....zK..r..l..>B....U..3....Z...ZjS...wZ.M...IW;..e.L...zC.wBtQ..&.Z.Fv+..G9.8..!..\T:K`......m.........9T.u..3h.....{...d[...@...Q.?..p.e.t[.%7..........^.....s.
                C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                File Type:data
                Category:dropped
                Size (bytes):893
                Entropy (8bit):7.366016576663508
                Encrypted:false
                SSDEEP:24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
                MD5:D4AE187B4574036C2D76B6DF8A8C1A30
                SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
                SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
                SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
                Malicious:false
                Reputation:high, very likely benign file
                Preview: 0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.
                C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                File Type:data
                Category:dropped
                Size (bytes):328
                Entropy (8bit):3.0765536003145497
                Encrypted:false
                SSDEEP:6:kKekHbqoN+SkQlPlEGYRMY9z+4KlDA3RUeKlF+adAlf:mku3kPlE99SNxAhUeo+aKt
                MD5:DA24412AA96F1A51D7A1C7F0E63901F0
                SHA1:13B1483CE43D630CCA5F460AB270DA7F764512D9
                SHA-256:613A697AB25376DAA6A23A4F82928456CF95820090B32CB17BAA6C98179DEC8E
                SHA-512:8F8F20E9A916384433A6A439A08286AA0F09D0EDF3542CC56DD0B27D75358EA45D43EC7E213588DEB5760F8CFAFCBFD93C62988096C5A25DCAE73D849DB1E3EA
                Malicious:false
                Reputation:low
                Preview: p...... ........_!O./...(....................................................... ..................&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.e.b.b.a.e.1.d.7.e.a.d.6.1.:.0."...
                C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                File Type:data
                Category:dropped
                Size (bytes):252
                Entropy (8bit):3.0042074090694686
                Encrypted:false
                SSDEEP:3:kkFklNoKmEvfllXlE/QhzllPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB1UAYpFit:kKsmERliBAIdQZV7eAYLit
                MD5:DDA8BE33A50FC45ACBADDE1E16982CF8
                SHA1:BD92A8AEDC28D46640624F4410CDCE3872D4277A
                SHA-256:B4E9CBCAA6B854ADD8D0A0038237F380E2419948DD0C4BF8C4E5F9376AEF6F17
                SHA-512:C71DBD91B99A57B771DF7387961752CC8CCC267AF405FE6B295B8834D54DC6A53D6344DD472D56736E152F0634C66F01EF33FA848867D79D62694207EE8035D4
                Malicious:false
                Reputation:low
                Preview: p...... ....`....a../...(....................................................... ........u.........(...........}...h.t.t.p.:././.a.p.p.s...i.d.e.n.t.r.u.s.t...c.o.m./.r.o.o.t.s./.d.s.t.r.o.o.t.c.a.x.3...p.7.c...".3.7.d.-.5.9.e.7.6.b.3.c.6.4.b.c.0."...
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\kinsvc[1].exe
                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:downloaded
                Size (bytes):508928
                Entropy (8bit):7.7654598154070165
                Encrypted:false
                SSDEEP:12288:S1LhRC+HyykFZ/6/dn3Vsy167F8E6tLvM89GrxD4G:S1/3SXFZ/ad3VRQ8Ltr9Gdp
                MD5:C7B2B0FA4A71FE33536148C2584DA7DB
                SHA1:D449E0DC0D24447634C61987CF0907FB72CF93A4
                SHA-256:DB8923F36B12AC2D21DE6B241E3AC228170456F7DB87DC38552E89F9A4E8903A
                SHA-512:EA5BC49B81DC9FC57A47BC4384C1A56C6157D02AC9F53655DA65A96138D5CFA1244B82562D4B7844E89762154CC1C14896CDEB945F832A9436516F96DFC56393
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                Reputation:low
                IE Cache URL:https://spicesherbs.in/herbs/kinsvc/kinsvc.exe
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=.`.........."...P.................. ........@.. ....................... ............@.................................P...O.......`............................................................................ ............... ..H............text........ ...................... ..`.rsrc...`...........................@..@.reloc..............................@..B........................H.......|...............@....7...........................................0............(....(..........(.....o.....*.....................( ......(!......("......(#......($....*N..(....o....(%....*&..(&....*.s'........s(........s)........s*........s+........*....0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*&..(1....*...0..<........~.....(2.....,!r...p.....(3...o4...s5............~.....
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\284D8619.jpeg
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
                Category:dropped
                Size (bytes):48770
                Entropy (8bit):7.801842363879827
                Encrypted:false
                SSDEEP:768:uLgWImQ6AMqTeyjskbJeYnriZvApugsiKi7iszQ2rvBZzmFz3/soBqZhsglgDQPT:uLgY4MqTeywVYr+0ugbDTzQ27A3UXsgf
                MD5:AA7A56E6A97FFA9390DA10A2EC0C5805
                SHA1:200A6D7ED9F485DD5A7B9D79B596DE3ECEBD834A
                SHA-256:56B1EDECC9A282A9FAAFD95D4D9844608B1AE5CCC8731F34F8B30B3825734974
                SHA-512:A532FE4C52FED46919003A96B882AE6F7C70A3197AA57BD1E6E917F766729F7C9C1261C36F082FBE891852D083EDB2B5A34B0A325B7C1D96D6E58B0BED6C5782
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: ......JFIF.............;CREATOR: gd-jpeg v1.0 (using IJG JPEG v80), quality = 90....C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..R..(...(...(......3Fh.....(....P.E.P.Gj(...(....Q@.%-...(.......P.QKE.%.........;.R.@.E-...(.......P.QKE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'j^.....(...(...(....w...3Fh....E......4w...h.%...................E./J)(......Z)(......Z)(....
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BADF7393.emf
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                Category:dropped
                Size (bytes):653280
                Entropy (8bit):2.898645806967479
                Encrypted:false
                SSDEEP:3072:S34UL0tS6WB0JOqFVY5QcARI/McGdAT9kRLFdtSyUu50yknG/qc+x:84UcLe0JOqQQZR8MDdATCR3tS+jqcC
                MD5:02BE9DEC93BBAE0645D69572E9563911
                SHA1:DDBA1220AA092E00FFAB90155D796D735E93E627
                SHA-256:A9955A402E6FC0BBE4CA2D34DA0BADA39DC9239F3F9FE6F4A71BA6A9EC230B40
                SHA-512:A9963FAD341517EE356156EFAEEC4C3100A3682E8D293A530BB0EF1601D5FB5500593BA9EA29898B72B04B565F3A6EC7FFAD973DBBD070B60239859D2E15C9D9
                Malicious:false
                Reputation:low
                Preview: ....l...........S................@...#.. EMF........(...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..............................................I...c...%...........%...................................R...p................................@."C.a.l.i.b.r.i........................................................................N.T............t........N.T........ ....yQQ........ ............zQQ............O...............................X...%...7...................{ .@................C.a.l.i.b.r.................X.......8....2JQ........t...t....{HQ............dv......%...........%...........%...........!.......................I...c..."...........%...........%...........%...........T...T..........................@.E.@T...........L...............I...c...P... ...6...F...$.......EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CEC07078.jpeg
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
                Category:dropped
                Size (bytes):48770
                Entropy (8bit):7.801842363879827
                Encrypted:false
                SSDEEP:768:uLgWImQ6AMqTeyjskbJeYnriZvApugsiKi7iszQ2rvBZzmFz3/soBqZhsglgDQPT:uLgY4MqTeywVYr+0ugbDTzQ27A3UXsgf
                MD5:AA7A56E6A97FFA9390DA10A2EC0C5805
                SHA1:200A6D7ED9F485DD5A7B9D79B596DE3ECEBD834A
                SHA-256:56B1EDECC9A282A9FAAFD95D4D9844608B1AE5CCC8731F34F8B30B3825734974
                SHA-512:A532FE4C52FED46919003A96B882AE6F7C70A3197AA57BD1E6E917F766729F7C9C1261C36F082FBE891852D083EDB2B5A34B0A325B7C1D96D6E58B0BED6C5782
                Malicious:false
                Preview: ......JFIF.............;CREATOR: gd-jpeg v1.0 (using IJG JPEG v80), quality = 90....C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..R..(...(...(......3Fh.....(....P.E.P.Gj(...(....Q@.%-...(.......P.QKE.%.........;.R.@.E-...(.......P.QKE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'j^.....(...(...(....w...3Fh....E......4w...h.%...................E./J)(......Z)(......Z)(....
                C:\Users\user\AppData\Local\Temp\CabA5C2.tmp
                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                File Type:Microsoft Cabinet archive data, 59134 bytes, 1 file
                Category:dropped
                Size (bytes):59134
                Entropy (8bit):7.995450161616763
                Encrypted:true
                SSDEEP:1536:R695NkJMM0/7laXXHAQHQaYfwlmz8efIqigYDff:RN7MlanAQwEIztTk
                MD5:E92176B0889CC1BB97114BEB2F3C1728
                SHA1:AD1459D390EC23AB1C3DA73FF2FBEC7FA3A7F443
                SHA-256:58A4F38BA43F115BA3F465C311EAAF67F43D92E580F7F153DE3AB605FC9900F3
                SHA-512:CD2267BA2F08D2F87538F5B4F8D3032638542AC3476863A35F0DF491EB3A84458CE36C06E8C1BD84219F5297B6F386748E817945A406082FA8E77244EC229D8F
                Malicious:false
                Preview: MSCF............,...................I........T.........R.. .authroot.stl.ym&7.5..CK..8T....c_.d...:.(.....].M$[v.4.).E.$7*I.....e..Y..Rq...3.n..u..............|..=H....&..1.1..f.L..>e.6....F8.X.b.1$,.a...n-......D..a....[.....i,+.+..<.b._#...G..U.....n..21*pa..>.32..Y..j...;Ay........n/R... ._.+..<...Am.t.<. ..V..y`.yO..e@../...<#..#......dju*..B......8..H'..lr.....l.I6/..d.].xIX<...&U...GD..Mn.y&.[<(tk.....%B.b;./..`.#h....C.P...B..8d.F...D.k........... 0..w...@(.. @K....?.)ce........\.\......l......Q.Qd..+...@.X..##3..M.d..n6.....p1..)...x0V...ZK.{...{.=#h.v.).....b...*..[...L..*c..a..,...E5X..i.d..w.....#o*+.........X.P...k...V.$...X.r.e....9E.x..=\...Km.......B...Ep...xl@@c1.....p?...d.{EYN.K.X>D3..Z..q.] .Mq.........L.n}........+/l\.cDB0.'.Y...r.[.........vM...o.=....zK..r..l..>B....U..3....Z...ZjS...wZ.M...IW;..e.L...zC.wBtQ..&.Z.Fv+..G9.8..!..\T:K`......m.........9T.u..3h.....{...d[...@...Q.?..p.e.t[.%7..........^.....s.
                C:\Users\user\AppData\Local\Temp\TarA5C3.tmp
                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                File Type:data
                Category:dropped
                Size (bytes):152788
                Entropy (8bit):6.316654432555028
                Encrypted:false
                SSDEEP:1536:WIA6c7RbAh/E9nF2hspNuc8odv+1//FnzAYtYyjCQxSMnl3xlUwg:WAmfF3pNuc7v+ltjCQSMnnSx
                MD5:64FEDADE4387A8B92C120B21EC61E394
                SHA1:15A2673209A41CCA2BC3ADE90537FE676010A962
                SHA-256:BB899286BE1709A14630DC5ED80B588FDD872DB361678D3105B0ACE0D1EA6745
                SHA-512:655458CB108034E46BCE5C4A68977DCBF77E20F4985DC46F127ECBDE09D6364FE308F3D70295BA305667A027AD12C952B7A32391EFE4BD5400AF2F4D0D830875
                Malicious:false
                Preview: 0..T...*.H.........T.0..T....1.0...`.H.e......0..D...+.....7.....D.0..D.0...+.....7..........R19%..210115004237Z0...+......0..D.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                C:\Users\user\AppData\Local\Temp\tmp2222.tmp
                Process:C:\Users\Public\vbc.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1621
                Entropy (8bit):5.1546643449463865
                Encrypted:false
                SSDEEP:24:2dH4+SEqCZ7ClNMFi/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBxtn:cbhZ7ClNQi/rydbz9I3YODOLNdq3R
                MD5:2F157857CAC56F3C7E44E7262FD6EAAD
                SHA1:022DCAA46EEEFD345D9BD8DF1870FD0C916E828B
                SHA-256:92991267A638A487B7117A3EBC7F732AD8C253A77149680D45E1289C5144AAD0
                SHA-512:C603FF5AA514DD00881C8CEE9AA8A7A369342844638138F9338900192E9D3ABBA2958E478E95BA7CD21E70F6F7223E4F128629F5212FFE1A43D35171F39E8784
                Malicious:true
                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>user-PC\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>user-PC\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>user-PC\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true</StartWhenAvailable>
                C:\Users\user\AppData\Roaming\XaHKwnPuj.exe
                Process:C:\Users\Public\vbc.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):508928
                Entropy (8bit):7.7654598154070165
                Encrypted:false
                SSDEEP:12288:S1LhRC+HyykFZ/6/dn3Vsy167F8E6tLvM89GrxD4G:S1/3SXFZ/ad3VRQ8Ltr9Gdp
                MD5:C7B2B0FA4A71FE33536148C2584DA7DB
                SHA1:D449E0DC0D24447634C61987CF0907FB72CF93A4
                SHA-256:DB8923F36B12AC2D21DE6B241E3AC228170456F7DB87DC38552E89F9A4E8903A
                SHA-512:EA5BC49B81DC9FC57A47BC4384C1A56C6157D02AC9F53655DA65A96138D5CFA1244B82562D4B7844E89762154CC1C14896CDEB945F832A9436516F96DFC56393
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=.`.........."...P.................. ........@.. ....................... ............@.................................P...O.......`............................................................................ ............... ..H............text........ ...................... ..`.rsrc...`...........................@..@.reloc..............................@..B........................H.......|...............@....7...........................................0............(....(..........(.....o.....*.....................( ......(!......("......(#......($....*N..(....o....(%....*&..(&....*.s'........s(........s)........s*........s+........*....0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*&..(1....*...0..<........~.....(2.....,!r...p.....(3...o4...s5............~.....
                C:\Users\user\Desktop\~$TRA-St-0015-O01.xlsx
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):330
                Entropy (8bit):1.4377382811115937
                Encrypted:false
                SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                MD5:96114D75E30EBD26B572C1FC83D1D02E
                SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                Malicious:true
                Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                C:\Users\Public\vbc.exe
                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:modified
                Size (bytes):508928
                Entropy (8bit):7.7654598154070165
                Encrypted:false
                SSDEEP:12288:S1LhRC+HyykFZ/6/dn3Vsy167F8E6tLvM89GrxD4G:S1/3SXFZ/ad3VRQ8Ltr9Gdp
                MD5:C7B2B0FA4A71FE33536148C2584DA7DB
                SHA1:D449E0DC0D24447634C61987CF0907FB72CF93A4
                SHA-256:DB8923F36B12AC2D21DE6B241E3AC228170456F7DB87DC38552E89F9A4E8903A
                SHA-512:EA5BC49B81DC9FC57A47BC4384C1A56C6157D02AC9F53655DA65A96138D5CFA1244B82562D4B7844E89762154CC1C14896CDEB945F832A9436516F96DFC56393
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=.`.........."...P.................. ........@.. ....................... ............@.................................P...O.......`............................................................................ ............... ..H............text........ ...................... ..`.rsrc...`...........................@..@.reloc..............................@..B........................H.......|...............@....7...........................................0............(....(..........(.....o.....*.....................( ......(!......("......(#......($....*N..(....o....(%....*&..(&....*.s'........s(........s)........s*........s+........*....0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*&..(1....*...0..<........~.....(2.....,!r...p.....(3...o4...s5............~.....

                Static File Info

                General

                File type:CDFV2 Encrypted
                Entropy (8bit):7.9944183504926105
                TrID:
                • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                File name:TRA-St-0015-O01.xlsx
                File size:907776
                MD5:63c2af36e2ec6b0c464889473ba19048
                SHA1:d1d834ca00c0538a448e64e10231a5c78c09838d
                SHA256:129cd5a1fca6d3febd900de6cbecb9e30e22a19d7b2aeda41ee3c1eac54981ba
                SHA512:557108c60fedb061cded9fb1b1c82bc4e5ef6dd338476d90e134d52a6c05832b03028e537139b61f371a8b4ae05d47d3f09ac23a213b9cb3e19e826a6b3fc38e
                SSDEEP:24576:yG4DPNX84Ad4lsmboKda75Cy6pRxLUpvEFwn:yG8PZ84pyZh0yiCsFA
                File Content Preview:........................>...............................................................................~...............z.......|..............................................................................................................................

                File Icon

                Icon Hash:e4e2aa8aa4b4bcb4

                Static OLE Info

                General

                Document Type:OLE
                Number of OLE Files:1

                OLE File "TRA-St-0015-O01.xlsx"

                Indicators

                Has Summary Info:False
                Application Name:unknown
                Encrypted Document:True
                Contains Word Document Stream:False
                Contains Workbook/Book Stream:False
                Contains PowerPoint Document Stream:False
                Contains Visio Document Stream:False
                Contains ObjectPool Stream:
                Flash Objects Count:
                Contains VBA Macros:False

                Streams

                Stream Path: \x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace, File Type: data, Stream Size: 64
                General
                Stream Path:\x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace
                File Type:data
                Stream Size:64
                Entropy:2.73637206947
                Base64 Encoded:False
                Data ASCII:. . . . . . . . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . .
                Data Raw:08 00 00 00 01 00 00 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 54 00 72 00 61 00 6e 00 73 00 66 00 6f 00 72 00 6d 00 00 00
                Stream Path: \x6DataSpaces/DataSpaceMap, File Type: data, Stream Size: 112
                General
                Stream Path:\x6DataSpaces/DataSpaceMap
                File Type:data
                Stream Size:112
                Entropy:2.7597816111
                Base64 Encoded:False
                Data ASCII:. . . . . . . . h . . . . . . . . . . . . . . E . n . c . r . y . p . t . e . d . P . a . c . k . a . g . e . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . D . a . t . a . S . p . a . c . e . . .
                Data Raw:08 00 00 00 01 00 00 00 68 00 00 00 01 00 00 00 00 00 00 00 20 00 00 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 65 00 64 00 50 00 61 00 63 00 6b 00 61 00 67 00 65 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 00 00
                Stream Path: \x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary, File Type: data, Stream Size: 200
                General
                Stream Path:\x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary
                File Type:data
                Stream Size:200
                Entropy:3.13335930328
                Base64 Encoded:False
                Data ASCII:X . . . . . . . L . . . { . F . F . 9 . A . 3 . F . 0 . 3 . - . 5 . 6 . E . F . - . 4 . 6 . 1 . 3 . - . B . D . D . 5 . - . 5 . A . 4 . 1 . C . 1 . D . 0 . 7 . 2 . 4 . 6 . } . N . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:58 00 00 00 01 00 00 00 4c 00 00 00 7b 00 46 00 46 00 39 00 41 00 33 00 46 00 30 00 33 00 2d 00 35 00 36 00 45 00 46 00 2d 00 34 00 36 00 31 00 33 00 2d 00 42 00 44 00 44 00 35 00 2d 00 35 00 41 00 34 00 31 00 43 00 31 00 44 00 30 00 37 00 32 00 34 00 36 00 7d 00 4e 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00
                Stream Path: \x6DataSpaces/Version, File Type: data, Stream Size: 76
                General
                Stream Path:\x6DataSpaces/Version
                File Type:data
                Stream Size:76
                Entropy:2.79079600998
                Base64 Encoded:False
                Data ASCII:< . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . D . a . t . a . S . p . a . c . e . s . . . . . . . . . . . . .
                Data Raw:3c 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00 72 00 2e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 73 00 01 00 00 00 01 00 00 00 01 00 00 00
                Stream Path: EncryptedPackage, File Type: data, Stream Size: 896520
                General
                Stream Path:EncryptedPackage
                File Type:data
                Stream Size:896520
                Entropy:7.99976973003
                Base64 Encoded:True
                Data ASCII:. . . . . . . . . . + o . ] . . . @ . . . . g s J . . j . . . . ^ 6 . . . . . . . . . . A > . ' . . . w . p . V = , ; J . _ B e F . . . . . . . . . . . . . . . . . . F . . Z . . . . . . . . . . . . F . . Z . . . . . . . . . . . . F . . Z . . . . . . . . . . . . F . . Z . . . . . . . . . . . . F . . Z . . . . . . . . . . . . F . . Z . . . . . . . . . . . . F . . Z . . . . . . . . . . . . F . . Z . . . . . . . . . . . . F . . Z . . . . . . . . . . . . F . . Z . . . . . . . . . . . . F . . Z . . . . . . . .
                Data Raw:f3 ad 0d 00 00 00 00 00 f0 1d 2b 6f d0 5d d0 0d f9 40 84 af d3 80 20 67 73 4a f2 ad 6a c5 a0 cd c9 5e 36 8d f6 be c0 bc 03 f0 e8 18 05 41 3e bb 27 da f3 eb 77 bc 70 ca 56 3d 2c 3b 4a dc 5f 42 65 46 b4 a2 0f 92 ba d3 05 04 0b 18 88 d8 80 e1 02 d5 af 0b 46 07 ec 5a 05 04 0b 18 88 d8 80 e1 02 d5 af 0b 46 07 ec 5a 05 04 0b 18 88 d8 80 e1 02 d5 af 0b 46 07 ec 5a 05 04 0b 18 88 d8 80 e1
                Stream Path: EncryptionInfo, File Type: data, Stream Size: 224
                General
                Stream Path:EncryptionInfo
                File Type:data
                Stream Size:224
                Entropy:4.55845197116
                Base64 Encoded:False
                Data ASCII:. . . . $ . . . . . . . $ . . . . . . . . f . . . . . . . . . . . . . . . . . . . . . . M . i . c . r . o . s . o . f . t . . E . n . h . a . n . c . e . d . . R . S . A . . a . n . d . . A . E . S . . C . r . y . p . t . o . g . r . a . p . h . i . c . . P . r . o . v . i . d . e . r . . . . . . . . [ q . n $ . . . > . . o . . . . . G . . [ . . , n % C . . h & . . . . . . . . . . > . I l { S J . ' . . . . . . K / . . # M . . . . .
                Data Raw:04 00 02 00 24 00 00 00 8c 00 00 00 24 00 00 00 00 00 00 00 0e 66 00 00 04 80 00 00 80 00 00 00 18 00 00 00 00 00 00 00 00 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 45 00 6e 00 68 00 61 00 6e 00 63 00 65 00 64 00 20 00 52 00 53 00 41 00 20 00 61 00 6e 00 64 00 20 00 41 00 45 00 53 00 20 00 43 00 72 00 79 00 70 00 74 00 6f 00 67 00 72 00 61 00 70 00 68 00

                Network Behavior

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Jan 27, 2021 20:35:07.590151072 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:07.748012066 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:07.748229027 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:07.757462025 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:07.915226936 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:07.921597958 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:07.921638966 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:07.921669960 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:07.921843052 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:07.967900038 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:08.129703045 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:08.129851103 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.671431065 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.834105968 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.834187984 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.834243059 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.834299088 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.834338903 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.834352970 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.834389925 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.834424019 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.834462881 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.834484100 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.834501028 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.834537983 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.834567070 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.834592104 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.834647894 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.834705114 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.834719896 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.834908962 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.836659908 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.994482040 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994538069 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994570971 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994600058 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994640112 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994677067 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994714975 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994751930 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994790077 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994796991 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.994831085 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.994837046 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994867086 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.994879961 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994899035 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.994913101 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.994927883 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994945049 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.994977951 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.994988918 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.995068073 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.995132923 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.995172977 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.995274067 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.995351076 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.995373011 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.995441914 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.995445967 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.995482922 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.995507956 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.995521069 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.995533943 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.995563984 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.001457930 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153412104 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153491020 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153531075 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153568029 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153606892 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153614044 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153634071 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153656960 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153666019 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153709888 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153717041 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153757095 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153793097 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153795004 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153820992 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153834105 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153846025 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153871059 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153908968 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153934002 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153949022 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153960943 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153990030 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153995991 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154040098 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154056072 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154078007 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154088974 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154115915 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154134035 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154155016 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154192924 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154217005 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154231071 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154267073 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154294968 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154341936 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154356956 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154386044 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154400110 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154423952 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154464960 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154480934 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154504061 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154540062 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154563904 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154577971 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154591084 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154616117 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154664040 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154675961 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154704094 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154706955 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154743910 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154782057 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154803038 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154819965 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154830933 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154855967 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154861927 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154894114 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154908895 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154931068 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154936075 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154978037 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154990911 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.155473948 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.159099102 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.159151077 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.159202099 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.159265995 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.159275055 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.168236017 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.314445019 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.314482927 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.314502954 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.314523935 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.314614058 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.314891100 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.314919949 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.314940929 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.314941883 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.314965010 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.314990997 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.315016031 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.315037012 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.315058947 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.315067053 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.315080881 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.315102100 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.315124035 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.315136909 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.315145016 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.315145969 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.315160990 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.315174103 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.315175056 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.315197945 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.315201044 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.315215111 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.315227985 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.315234900 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.315256119 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.315257072 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.315272093 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.315277100 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.315296888 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.315298080 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.315313101 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.315335989 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.317754984 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.318834066 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.318867922 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.318891048 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.318911076 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.318912983 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.318932056 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.318936110 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.318953991 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.318974972 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.318974972 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.318990946 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.318994999 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.318996906 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.319015026 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.319015980 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.319041014 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.319044113 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.319063902 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.319078922 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.319082975 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.319084883 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.319111109 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.319140911 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.319179058 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.319201946 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.319221973 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.319231033 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.319242954 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.319262981 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.319283009 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.319303036 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.319307089 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.319322109 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.319323063 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.319327116 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.319329023 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.319341898 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.319344997 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.319348097 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.319364071 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.319370985 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.319391012 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.319394112 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.319411993 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.319412947 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.319432020 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.319462061 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.322061062 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.328030109 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.328067064 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.328150034 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.329677105 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.472450972 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.472496986 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.472588062 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.472913980 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.472949028 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.472979069 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.473010063 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.473010063 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.473040104 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.473040104 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.473054886 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.473071098 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.473098993 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.473108053 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.473114967 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.473140001 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.473170042 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.473169088 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.473184109 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.473196983 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.473207951 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.473261118 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.475298882 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.475327969 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.475353003 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.475377083 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.475399971 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.475402117 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.475423098 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.475434065 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.475440025 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.475461960 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.475464106 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.475486994 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.475497961 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.475511074 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.475519896 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.475536108 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.475544930 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.475595951 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.476619005 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.476644993 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.476667881 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.476691008 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.476691961 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.476717949 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.476717949 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.476742983 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.476758957 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.476789951 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.476810932 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.476938963 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.476975918 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.477005959 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.477025032 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.477181911 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.479650974 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.479687929 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.479713917 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.479738951 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.479763031 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.479789972 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.479813099 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.479814053 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.479841948 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.479846001 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.479867935 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.479876995 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.479892015 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.479917049 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.479921103 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.479942083 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.479943037 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.479959011 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.479976892 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.479983091 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.480010033 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.480026007 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.480036974 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.480038881 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.480062008 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.480062008 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.480101109 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.480108976 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.484184027 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.485753059 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.485776901 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.485811949 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.485833883 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.487268925 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.487337112 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.633162975 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.633207083 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.633234978 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.633270979 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.633306980 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.633344889 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.633413076 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.633415937 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.633460045 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.633476019 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.633496046 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.633532047 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.633537054 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.633591890 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.633593082 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.633630037 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.633651972 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.633667946 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.633687019 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.633704901 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.633728981 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.633750916 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.633778095 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.633791924 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.633810997 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.633831024 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.633865118 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.633867979 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.633888960 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.633893967 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.633934975 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.633941889 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.633955002 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.633970976 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.633980989 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634007931 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634037018 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634053946 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634059906 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634095907 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634118080 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634131908 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634161949 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634167910 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634171963 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634205103 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634228945 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634242058 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634259939 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634277105 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634296894 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634315014 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634344101 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634358883 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634361982 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634399891 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634423971 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634437084 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634454966 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634474039 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634489059 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634512901 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634538889 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634546995 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634563923 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634584904 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634594917 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634622097 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634649038 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634666920 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634680033 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634710073 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634732008 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634747028 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634776115 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634783983 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634784937 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634819984 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634855032 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634859085 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634880066 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634891033 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634902954 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634927988 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634953976 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.634973049 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.634980917 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635014057 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635035038 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635050058 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635085106 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635085106 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635104895 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635122061 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635149956 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635159016 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635170937 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635195971 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635215998 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635231018 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635248899 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635277987 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635286093 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635319948 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635335922 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635356903 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635377884 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635392904 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635396004 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635432005 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635452032 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635467052 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635493994 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635509014 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635524035 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635545015 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635571003 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635590076 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635597944 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635629892 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635649920 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635667086 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635684013 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635704994 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635741949 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635756016 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635780096 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635796070 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635817051 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635854006 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635862112 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635890007 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635900974 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635905981 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635942936 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.635958910 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.635994911 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636049032 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636095047 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636107922 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636137962 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636156082 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636176109 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636187077 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636212111 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636231899 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636249065 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636260033 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636284113 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636308908 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636321068 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636332989 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636359930 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636384964 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636405945 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636435032 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636446953 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636461973 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636487007 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636514902 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636523962 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636562109 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636569023 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636596918 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636626005 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636652946 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636672020 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636682034 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636718035 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636718988 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636734962 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636755943 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636763096 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636795044 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636811972 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636831045 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636847973 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636868000 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636878967 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636905909 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636934042 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636953115 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.636955023 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.636993885 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.637012005 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.637037039 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.637038946 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.637084961 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.637092113 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.637125969 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.637140989 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.637160063 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.637176037 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.637197018 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.637212038 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.637233973 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.637263060 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.637270927 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.637284994 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.637307882 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.637336016 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.637346983 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.637350082 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.637408018 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.637422085 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.637481928 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.637489080 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.637522936 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.637532949 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.637571096 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.637639046 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.637655020 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640024900 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640053988 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640078068 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640100956 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640125036 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640126944 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640147924 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640147924 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640156031 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640173912 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640178919 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640187025 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640207052 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640230894 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640233040 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640245914 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640254974 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640265942 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640279055 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640302896 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640305042 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640325069 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640327930 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640337944 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640353918 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640377998 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640386105 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640389919 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640414953 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640428066 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640439034 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640456915 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640464067 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640470028 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640491009 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640511036 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640513897 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640536070 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640537977 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640546083 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640563965 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640593052 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640593052 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640608072 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640619993 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640641928 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640645027 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640666008 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640669107 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640680075 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640691996 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640716076 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640721083 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640733004 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640739918 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640762091 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640763998 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640774012 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640793085 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640819073 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640820980 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640835047 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640846014 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640866995 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640873909 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.640886068 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.640918016 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.644349098 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.644417048 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.645977974 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.646004915 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.646028996 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.646051884 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.646053076 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.646075010 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.646080017 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.646091938 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.647586107 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.647612095 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.647653103 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.650585890 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.654222965 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.658325911 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.795356035 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795383930 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795402050 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795417070 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795429945 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795447111 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795464039 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795480967 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795497894 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795517921 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795536041 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795552969 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795568943 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795584917 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795600891 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795619011 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795629025 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.795634985 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795654058 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795659065 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.795672894 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795681953 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.795691013 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795707941 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795725107 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795756102 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.795775890 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.795778990 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.795789957 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795808077 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795818090 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795820951 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.795831919 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795849085 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795866013 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795874119 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.795883894 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795902014 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795907974 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.795918941 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795937061 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795950890 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.795953035 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795974970 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.795989990 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.795991898 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796010017 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796026945 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796036005 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.796045065 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796061993 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796068907 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.796078920 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796097994 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796113014 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.796119928 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796139002 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796149969 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.796158075 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796170950 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796184063 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796186924 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.796197891 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796215057 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796227932 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796236992 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.796247005 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796263933 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796274900 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.796283007 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796302080 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796318054 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.796323061 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796343088 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796360016 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796363115 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.796372890 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796391010 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796403885 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796407938 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.796416044 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796428919 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796446085 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796458960 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.796463966 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796483040 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796494961 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796504021 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.796530008 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.796550035 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.796595097 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.802664995 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.822133064 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.979959011 CET44349165162.241.148.128192.168.2.22

                UDP Packets

                TimestampSource PortDest PortSource IPDest IP
                Jan 27, 2021 20:35:07.327306032 CET5219753192.168.2.228.8.8.8
                Jan 27, 2021 20:35:07.516894102 CET53521978.8.8.8192.168.2.22
                Jan 27, 2021 20:35:07.517139912 CET5219753192.168.2.228.8.8.8
                Jan 27, 2021 20:35:07.573364019 CET53521978.8.8.8192.168.2.22
                Jan 27, 2021 20:35:08.400657892 CET5309953192.168.2.228.8.8.8
                Jan 27, 2021 20:35:08.448559046 CET53530998.8.8.8192.168.2.22
                Jan 27, 2021 20:35:08.454209089 CET5283853192.168.2.228.8.8.8
                Jan 27, 2021 20:35:08.502331018 CET53528388.8.8.8192.168.2.22
                Jan 27, 2021 20:35:08.989140034 CET6120053192.168.2.228.8.8.8
                Jan 27, 2021 20:35:09.045689106 CET53612008.8.8.8192.168.2.22
                Jan 27, 2021 20:35:09.051862001 CET4954853192.168.2.228.8.8.8
                Jan 27, 2021 20:35:09.110131025 CET53495488.8.8.8192.168.2.22

                DNS Queries

                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Jan 27, 2021 20:35:07.327306032 CET192.168.2.228.8.8.80x1168Standard query (0)spicesherbs.inA (IP address)IN (0x0001)
                Jan 27, 2021 20:35:07.517139912 CET192.168.2.228.8.8.80x1168Standard query (0)spicesherbs.inA (IP address)IN (0x0001)

                DNS Answers

                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Jan 27, 2021 20:35:07.516894102 CET8.8.8.8192.168.2.220x1168No error (0)spicesherbs.in162.241.148.128A (IP address)IN (0x0001)
                Jan 27, 2021 20:35:07.573364019 CET8.8.8.8192.168.2.220x1168No error (0)spicesherbs.in162.241.148.128A (IP address)IN (0x0001)

                HTTPS Packets

                TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                Jan 27, 2021 20:35:07.921669960 CET162.241.148.128443192.168.2.2249165CN=webmail.spicesherbs.in CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Sun Dec 20 14:59:03 CET 2020 Wed Oct 07 21:21:40 CEST 2020Sat Mar 20 14:59:03 CET 2021 Wed Sep 29 21:21:40 CEST 2021771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021

                Code Manipulations

                Statistics

                CPU Usage

                Click to jump to process

                Memory Usage

                Click to jump to process

                High Level Behavior Distribution

                Click to dive into process behavior distribution

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:20:34:46
                Start date:27/01/2021
                Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                Wow64 process (32bit):false
                Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                Imagebase:0x13fba0000
                File size:27641504 bytes
                MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:20:35:06
                Start date:27/01/2021
                Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                Wow64 process (32bit):true
                Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                Imagebase:0x400000
                File size:543304 bytes
                MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:20:35:10
                Start date:27/01/2021
                Path:C:\Users\Public\vbc.exe
                Wow64 process (32bit):false
                Commandline:'C:\Users\Public\vbc.exe'
                Imagebase:0xbf0000
                File size:508928 bytes
                MD5 hash:C7B2B0FA4A71FE33536148C2584DA7DB
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.2169219241.00000000023DE000.00000004.00000001.sdmp, Author: Joe Security
                Antivirus matches:
                • Detection: 100%, Joe Sandbox ML
                Reputation:low

                General

                Start time:20:35:13
                Start date:27/01/2021
                Path:C:\Windows\System32\schtasks.exe
                Wow64 process (32bit):false
                Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XaHKwnPuj' /XML 'C:\Users\user\AppData\Local\Temp\tmp2222.tmp'
                Imagebase:0xffa90000
                File size:285696 bytes
                MD5 hash:97E0EC3D6D99E8CC2B17EF2D3760E8FC
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate

                General

                Start time:20:35:13
                Start date:27/01/2021
                Path:C:\Users\Public\vbc.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\Public\vbc.exe
                Imagebase:0xbf0000
                File size:508928 bytes
                MD5 hash:C7B2B0FA4A71FE33536148C2584DA7DB
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                General

                Start time:20:35:14
                Start date:27/01/2021
                Path:C:\Users\Public\vbc.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\Public\vbc.exe
                Imagebase:0xbf0000
                File size:508928 bytes
                MD5 hash:C7B2B0FA4A71FE33536148C2584DA7DB
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                General

                Start time:20:35:14
                Start date:27/01/2021
                Path:C:\Users\Public\vbc.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\Public\vbc.exe
                Imagebase:0xbf0000
                File size:508928 bytes
                MD5 hash:C7B2B0FA4A71FE33536148C2584DA7DB
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                General

                Start time:20:35:15
                Start date:27/01/2021
                Path:C:\Users\Public\vbc.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\Public\vbc.exe
                Imagebase:0xbf0000
                File size:508928 bytes
                MD5 hash:C7B2B0FA4A71FE33536148C2584DA7DB
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                General

                Start time:20:35:15
                Start date:27/01/2021
                Path:C:\Users\Public\vbc.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\Public\vbc.exe
                Imagebase:0xbf0000
                File size:508928 bytes
                MD5 hash:C7B2B0FA4A71FE33536148C2584DA7DB
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                Disassembly

                Code Analysis

                Reset < >

                  Executed Functions

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.2171587743.000007FE8AC60000.00000040.00000001.sdmp, Offset: 000007FE8AC60000, based on PE: false
                  Similarity
                  • API ID: CreateProcess
                  • String ID:
                  • API String ID: 963392458-0
                  • Opcode ID: d3b2ecb0584bcabb3462a72d841f7a250a7ebd46a74fa14eb38b7655359a4448
                  • Instruction ID: 400c531a88d0dd63631d488b6f51aa25058597bcdc07d3da728f704b90c85386
                  • Opcode Fuzzy Hash: d3b2ecb0584bcabb3462a72d841f7a250a7ebd46a74fa14eb38b7655359a4448
                  • Instruction Fuzzy Hash: F2028030918A8D8FEBA4EF18D8557E977E1FB59300F00512EDC4ED72A1DB74AA41CB82
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.2171587743.000007FE8AC60000.00000040.00000001.sdmp, Offset: 000007FE8AC60000, based on PE: false
                  Similarity
                  • API ID: CreateProcess
                  • String ID:
                  • API String ID: 963392458-0
                  • Opcode ID: 1089152f5c3f76e3b02f9abc2bd473e0d9ca96a3d9e316b699e896b8980ba572
                  • Instruction ID: 6333381acece8aedd1e86b9d1bfdeef9105db3bb2baa3a84eccb0d40b3a096b6
                  • Opcode Fuzzy Hash: 1089152f5c3f76e3b02f9abc2bd473e0d9ca96a3d9e316b699e896b8980ba572
                  • Instruction Fuzzy Hash: 66028030918A8D8FEBA4EF18C8557E977E1FB59300F10412EDC4ED72A1DB74AA41CB82
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Non-executed Functions

                  Executed Functions

                  Non-executed Functions

                  Memory Dump Source
                  • Source File: 00000007.00000002.2158187292.0000000000BF2000.00000020.00020000.sdmp, Offset: 00BF0000, based on PE: true
                  • Associated: 00000007.00000002.2158181923.0000000000BF0000.00000002.00020000.sdmp Download File
                  • Associated: 00000007.00000002.2158232465.0000000000C6E000.00000002.00020000.sdmp Download File
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3a4ea542a5e41e358646434d93346b22f2ce750e66d4540627a667b053e1d7e4
                  • Instruction ID: dcf077e1cd4ec9ac87a1fdf447ae1475f38ba750f66ef37d18db3cd22e6d19b1
                  • Opcode Fuzzy Hash: 3a4ea542a5e41e358646434d93346b22f2ce750e66d4540627a667b053e1d7e4
                  • Instruction Fuzzy Hash: E0D2592140E7C26FD7434B7449756E2BFF1AE5722430E49DBC4C08F8A3E219696ADB72
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000007.00000002.2158187292.0000000000BF2000.00000020.00020000.sdmp, Offset: 00BF0000, based on PE: true
                  • Associated: 00000007.00000002.2158181923.0000000000BF0000.00000002.00020000.sdmp Download File
                  • Associated: 00000007.00000002.2158232465.0000000000C6E000.00000002.00020000.sdmp Download File
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 08a3aa3f5b224b0a2f65f6eacfffc444e61aa453c2ad9c61738be3dd24837d2f
                  • Instruction ID: 89fd81f0de328d7da588910a9b138f494e0ddbd46e1c5389072d1e29f10a34f9
                  • Opcode Fuzzy Hash: 08a3aa3f5b224b0a2f65f6eacfffc444e61aa453c2ad9c61738be3dd24837d2f
                  • Instruction Fuzzy Hash: 9582F16244E7C25FD7038B745C751E2BFB5AEA321430E48CBC4C08F4A3E618696EE766
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000007.00000002.2158187292.0000000000BF2000.00000020.00020000.sdmp, Offset: 00BF0000, based on PE: true
                  • Associated: 00000007.00000002.2158181923.0000000000BF0000.00000002.00020000.sdmp Download File
                  • Associated: 00000007.00000002.2158232465.0000000000C6E000.00000002.00020000.sdmp Download File
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: aed2c9439312bc40d6a19d4f8eaa9e4343f6e2ed493a109501f9dba3bf6378ba
                  • Instruction ID: 553d763f45f9c501dbc094b2029cadf0e1682cad1989274f3de61393553f9ae8
                  • Opcode Fuzzy Hash: aed2c9439312bc40d6a19d4f8eaa9e4343f6e2ed493a109501f9dba3bf6378ba
                  • Instruction Fuzzy Hash: AF912532409361AFD3934F74D8959F23BF9EF0732031606E6E5818B062E3694EA1CBB1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000007.00000002.2158187292.0000000000BF2000.00000020.00020000.sdmp, Offset: 00BF0000, based on PE: true
                  • Associated: 00000007.00000002.2158181923.0000000000BF0000.00000002.00020000.sdmp Download File
                  • Associated: 00000007.00000002.2158232465.0000000000C6E000.00000002.00020000.sdmp Download File
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a455cdf3d16b1e9ba759e1de2064ff897ee9df580ec8cb39558af35f41396cfe
                  • Instruction ID: a2ad7b2a16ffefd0bb331d76ab2831cd386bc3b887296c783dcf6a13324fc1f7
                  • Opcode Fuzzy Hash: a455cdf3d16b1e9ba759e1de2064ff897ee9df580ec8cb39558af35f41396cfe
                  • Instruction Fuzzy Hash: 3371772908F3917FC3625B75AC668FB7F989D5313430907EAB4A4450E3E84947A9CAF3
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000007.00000002.2158187292.0000000000BF2000.00000020.00020000.sdmp, Offset: 00BF0000, based on PE: true
                  • Associated: 00000007.00000002.2158181923.0000000000BF0000.00000002.00020000.sdmp Download File
                  • Associated: 00000007.00000002.2158232465.0000000000C6E000.00000002.00020000.sdmp Download File
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 57a212ed398d42084cbd080e8760e4cb24752f39603a22def9196ba0ca150545
                  • Instruction ID: 077e96028187a026040091868710ebab65206fbcee93f0ece5a4bed2e7d752df
                  • Opcode Fuzzy Hash: 57a212ed398d42084cbd080e8760e4cb24752f39603a22def9196ba0ca150545
                  • Instruction Fuzzy Hash: 0471772908F3917FC3625675AC668FB7F989953130308079AB4B8450E3E84957A9C6F3
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000007.00000002.2158187292.0000000000BF2000.00000020.00020000.sdmp, Offset: 00BF0000, based on PE: true
                  • Associated: 00000007.00000002.2158181923.0000000000BF0000.00000002.00020000.sdmp Download File
                  • Associated: 00000007.00000002.2158232465.0000000000C6E000.00000002.00020000.sdmp Download File
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2e98126764dc75492317816b0e0412c6389223381b99e132c440bee266d7d6d2
                  • Instruction ID: db7e5cfbf62dc1d7e8332e6b11db389318702bd7d94ced9fc50d5617dd886c79
                  • Opcode Fuzzy Hash: 2e98126764dc75492317816b0e0412c6389223381b99e132c440bee266d7d6d2
                  • Instruction Fuzzy Hash: 8DE0460A00FAC19EE71327B03B36ADA7F35AE93310B0984C3D0802A2A3A8000754D272
                  Uniqueness

                  Uniqueness Score: -1.00%